Subscribe

Social Media Links

Insights

 | 4 minute read

Ankura CTIX FLASH Update – April 1, 2026

Malware Activity


Threat Actor Activity

Iran-linked Handala Hacks and Leaks FBI Director Kash Patel’s Personal Email

Iran-linked hacktivist group Handala Hack Team breached the personal Gmail account of FBI Director Kash Patel and leaked a cache of personal photos and older emails from 2010 and 2019. The FBI and U.S. Department of Justice confirmed the compromise but stressed that the data is historical and contains no government information, adding that mitigation steps have been taken. Handala framed the leak as retaliation for recent U.S. actions, including the FBI- and DOJ-led seizure of four (4) domains operated by Iran’s Ministry of Intelligence and Security (MOIS) and a $10 million U.S. bounty on Handala members, as well as broader US-Iran tensions. The seized domains were used for hack-and-leak operations, doxxing Israeli military and government personnel, threatening dissidents and journalists, and amplifying MOIS information operations. Assessed as a persona for Iran’s Ministry of Intelligence and Security, Handala has a broader record of disruptive and destructive activity, including wiping tens of thousands of devices at medical technology giant Stryker and targeting IT and service providers via compromised VPN accounts, RDP, and custom wiper malware. U.S. authorities warn that Handala and other MOIS actors also use social engineering and Telegram-based malware to spy on dissidents and opposition groups. The Patel incident underscores Handala’s focus on psychological impact, signaling, and high-profile targets rather than financial gain, and highlights the continued risk to Western officials and critical suppliers amid the U.S.-Israel-Iran conflict.


Vulnerabilities

Actively Exploited F5 BIG-IP APM Vulnerability Escalates from DoS to Critical RCE Threat

Cybersecurity firm F5 Networks has reclassified a vulnerability affecting BIG-IP Access Policy Manager (APM), from a denial-of-service (DoS) issue to a critical pre-authentication remote code execution (RCE) flaw following new findings in March 2026, with active exploitation now confirmed in the wild. The vulnerability, tracked as CVE-2025-53521, enables unauthenticated attackers to execute arbitrary code on affected systems with configured access policies, facilitating webshell deployment, including fileless variants operating in memory, and potentially leading to full system compromise. The Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog and mandated remediation by no later than March 30, 2026. With over 240,000 BIG-IP instances exposed online, the attack surface remains significant, and researchers have observed active scanning activity targeting specific REST API endpoints to enumerate device information. F5 has released extensive indicators of compromise, including suspicious file artifacts, altered system binaries, anomalous log entries tied to unauthorized iControl REST API access and SELinux tampering, as well as stealthy HTTP traffic patterns designed to obscure attacker activity. Historically targeted by both nation-state and financially motivated threat actors for network intrusion, lateral movement, data exfiltration, and destructive attacks, BIG-IP devices represent a high-value target, and this reclassification from a lower-priority DoS vulnerability to actively exploited RCE underscores a substantial escalation in risk, requiring immediate patching, log analysis, and adherence to incident response and forensic best practices. CTIX analysts urge all administrators to patch their instances and follow the F5 guidelines to prevent exploitation.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with