This is the most significant week for defense sector cyber threats since Operation Epic Fury began. Iranian-linked group Handala breached FBI Director Kash Patel’s personal Gmail account on March 27, publishing over 300 emails and personal photographs — a direct retaliation after the FBI seized Handala’s operational domains and the State Department posted a $10 million reward for the group’s members. The same group previously conducted the destructive attack against medical technology company Stryker that wiped employee devices in real time. This week, Handala also claimed to have published personal data of Lockheed Martin employees stationed in the Middle East.
Simultaneously, the ShinyHunters extortion group breached the European Commission’s AWS cloud environment on March 30, claiming over 350GB of stolen data including databases, internal documents, and employee information. ShinyHunters has been on an unprecedented campaign — also responsible for voice phishing attacks targeting Okta and Microsoft SSO environments, the TELUS Digital breach involving 1 petabyte of data including FBI background checks, and multiple identity-based intrusions across sectors.
Identity has become the primary attack surface. Attackers are logging in, not breaking in. Infostealer malware listings linked to LummaC2 surged 72% as stolen credentials are commoditized on underground marketplaces. On the vulnerability front, F5 reclassified a BIG-IP APM vulnerability to critical RCE on March 30 after confirming active exploitation. Microsoft SharePoint CVE-2026-20963 is under active exploitation. A Citrix NetScaler critical flaw is under active reconnaissance. And a supply chain attack compromised the Telnyx Python package on PyPI, hiding credential-stealing malware inside a WAV audio file.
The bottom line: if Handala can breach the FBI Director’s email, they can reach your organization. Identity and credential hygiene are no longer optional — they are the perimeter. Immediate priority actions are listed under each threat item below.