Handala wiper attacks, APT28 implant devs are back, Signal's verification problems
HomeThree Buddy Problem › Episode

Handala wiper attacks, APT28 implant devs are back, Signal's verification problems

1:44:00 Mar 14, 2026
About this episode
(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Three Buddy Problem - Episode 89: We discuss Iran hacktivist group 'Handala' wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran's cyber retaliation is as scary as the headlines suggest. Plus, ESET's discovery that Russia's APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit's proliferation chain. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (raw, AI-generated)TLPBLACK SolutionsKim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped SystemsStryker Cyberattack Adds to Fears of New Front in Iran WarBloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims CreditWho is Handala? (Malpedia)Palo Alto: Increased Risk of Wiper Attacks
Select an episode
0:00 0:00