Fri, 22 May 2026
Fri 1447/12/05AH (22-05-2026AD)

Latest News

Iranian Hackers Claim to Expose CIA-Mossad Network Hidden Inside a Charity; What We Know and What We Don’t

22 May, 2026 15:48

An Iranian hacking group has made one of its most provocative claims to date: that a Western charitable organization served as a covert operational and financial platform for joint CIA and Mossad intelligence activities — and that over 639,000 internal documents now prove it.

The claim is extraordinary. The evidence, as presented, requires serious scrutiny before any conclusions are drawn.

Who Is Handala and What Did They Actually Claim?

Handala is an Iranian-linked cyber group that has operated for several years, consistently targeting Israeli and American institutions. The group positions itself as a resistance actor rather than a purely criminal enterprise, framing its operations in explicitly political terms.

In its latest operation, Handala claims to have breached the servers of an organization called Passion for a Purpose, a registered charitable entity. According to the group, behind the humanitarian branding, this organization functioned as a logistical, financial, and communications backbone for Israeli intelligence — channeling funds, coordinating covert meetings, and maintaining operational cover for field assets across multiple countries.

The group claims the leaked archive includes confidential contracts, financial transaction records, donor details, records of clandestine meetings, and sensitive correspondence between intelligence-linked individuals.

The Verification Problem

Before treating these claims as established fact, several critical questions must be asked — and currently cannot be answered.

No independent cybersecurity firm has verified the authenticity of the leaked documents. No Western intelligence agency has confirmed the breach. The documents have not been analyzed by neutral forensic investigators whose findings are publicly available. Handala has strong strategic incentives to exaggerate, fabricate, or selectively present material in ways that serve Iranian state interests — particularly during a period of active military confrontation between Iran, Israel, and the United States.

Intelligence-linked hack-and-leak operations are a well-documented tool of information warfare. The documents may be entirely genuine. They may be partially genuine with fabricated elements inserted. They may be genuine documents stripped of context that would change their meaning entirely. Without independent verification, all three possibilities remain open.

This does not mean the claims should be dismissed. It means they should be held carefully, pending evidence.

A Pattern of Escalating Claims

What makes Handala noteworthy beyond this single operation is the accumulated scale of its claimed operations. The group previously alleged it breached Unit 8200 — the Israeli military’s elite signals intelligence division — obtaining material related to AI-driven surveillance and psychological influence programs. It claimed to have accessed the personal phone of former Israeli military chief Herzi Halevi, extracting over 19,000 files including meeting recordings and strategic planning documents.

Other claimed operations include extracting 197 gigabytes of data from the Soreq Nuclear Research Center, and breaching PSK Wind Technologies, a defense contractor involved in Iron Dome command-and-control infrastructure. The group also alleged access to emails belonging to former Israeli Prime Minister Ehud Barak, purportedly revealing connections to Jeffrey Epstein.

Each of these claims, if verified, would represent a significant intelligence failure. Taken together as a pattern, they suggest either a genuinely capable and persistent threat actor — or a sophisticated disinformation campaign designed to create the impression of penetration regardless of what was actually accessed.

Why Charities Are Legitimate Intelligence Targets

Setting aside the specific claims, the broader phenomenon Handala is pointing toward has solid historical grounding. Intelligence agencies worldwide — including the CIA, Mossad, MI6, and others — have a documented history of using nominally civilian organizations as operational covers. Aid organizations, research institutes, cultural foundations, and humanitarian groups have all served as platforms for intelligence activity in various historical contexts.

This does not mean every charity is compromised. It means the model Handala describes is real and has precedent — which is precisely what makes their specific allegations harder to simply dismiss and simultaneously harder to simply accept.

What This Operation Reveals About the Information War

Regardless of the documents’ ultimate authenticity, this operation demonstrates something important about the current conflict environment. Iran is fighting on multiple fronts simultaneously — military, diplomatic, economic, and informational. The cyber and information warfare dimension is not supplementary to that conflict. It is central to it.

Releasing hundreds of thousands of documents — whether genuine, fabricated, or mixed — forces adversaries into a defensive posture. Intelligence agencies must now conduct internal reviews. Organizations named must manage reputational damage. Journalists must spend resources investigating. Western publics receive a narrative of CIA-Mossad coordination operating through civilian cover, whether or not that narrative holds up under scrutiny.

The information operation succeeds at some level simply by existing.

The Responsible Position

The honest assessment at this stage is that Handala has made serious allegations, released a large volume of claimed evidence, and provided no independently verified proof. The allegations may be true, partially true, or constructed for strategic effect.

What is verifiable is that a conflict between Iran and Western intelligence infrastructure is actively underway — in the air, at sea, through sanctions, and increasingly through cyberspace and information operations.

This story deserves continued scrutiny, not credulous acceptance and not reflexive dismissal.

Catch all the World News, Breaking News Event and Trending News Updates on GTV News


Join Our Whatsapp Channel GTV Whatsapp Official Channel to get the Daily News Update & Follow us on Google News.

Scroll to Top