The Handala hacking group has claimed responsibility for a cyber attack on the SSV Blockchain Network, a platform reportedly linked to Israeli intelligence operations.
The group announced the breach via a social media post, revealing that they spent four months infiltrating the network and exfiltrated 8 terabytes (TB) of highly sensitive data.
This incident marks another high-profile operation by Handala, known for its politically motivated cyber activities targeting Israeli entities.
Sensitive Data Exfiltrated and Leaked
According to reports from HackManac, the stolen data includes developer identities, financial documents, contracts, transaction logs, emails, Know Your Customer (KYC) documents, and even recordings of meetings and calls.

To substantiate their claims, the group leaked 1 TB of the data as a proof of concept (PoC), asserting that the information is valued at over one million dollars.
The leaked data’s content underscores the potential severity of this breach, including risks to financial integrity, operational security, and personal privacy.
Handala’s actions appear to be politically motivated rather than financially driven.
The group has previously targeted critical Israeli infrastructure and technology sectors as part of its ideological campaign.
This latest attack aligns with their broader strategy to challenge Israeli technological capabilities and expose vulnerabilities in its systems.
Implications for Blockchain Security
This breach raises critical questions about blockchain security, particularly for platforms handling sensitive data.
While blockchain technology is often lauded for its tamper-proof design and decentralized structure, this incident highlights vulnerabilities in associated systems and operational practices.
Experts suggest that breaches like this could result from weaknesses in access management or insufficient cybersecurity measures during integration with external systems.
The SSV Blockchain Network breach also reflects broader concerns about the security of distributed ledger technologies (DLTs) in high-stakes environments.
Cybersecurity analysts emphasize the need for robust governance policies, identity management frameworks, and regular threat assessments to mitigate such risks.
Also Read: