{"id":39866,"date":"2026-03-28T10:52:36","date_gmt":"2026-03-28T02:52:36","guid":{"rendered":"https:\/\/sgbuzz.com\/?p=39866"},"modified":"2026-03-28T10:52:36","modified_gmt":"2026-03-28T02:52:36","slug":"kash-patels-personal-email-account-was-accessed-by-hackers-linked-to-iran","status":"publish","type":"post","link":"https:\/\/sgbuzz.com\/?p=39866","title":{"rendered":"Kash Patel&#8217;s personal email account was accessed by hackers linked to Iran"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-article-body=\"true\">\n<p class=\"col-body mb-4 leading-7 text-[18px] md:leading-8 break-words min-w-0 charcoal-color\">A hacking group called Handala has gained access to FBI Director Kash Patel&#8217;s email account, <em>Reuters<\/em> reports. The group published content from Patel&#8217;s email on their website as proof, including photos of Patel &#8220;sniffing and smoking cigars&#8221; and &#8220;making a face while taking a picture of himself in the mirror with a \u200blarge bottle of rum.&#8221;<\/p>\n<p class=\"col-body mb-4 leading-7 text-[18px] md:leading-8 break-words min-w-0 charcoal-color\"><em>TechCrunch<\/em> was able to independently confirm that at least some of the emails Handala stole were from Patel&#8217;s account by checking information used by mail delivery systems that\u2019s stored in an email&#8217;s header. Several stolen emails included a cryptographic signature that linked them to Patel&#8217;s account. The FBI has also separately confirmed that the Director&#8217;s account was hacked. &#8220;The FBI is aware of malicious actors targeting Director Patel&#8217;s personal email information, and we have taken all necessary steps to mitigate potential risks associated with this activity,&#8221; the Bureau told <em>TechCrunch<\/em>. &#8220;The information in question is historical in nature and involves no government information.&#8221;<\/p>\n<p class=\"col-body mb-4 leading-7 text-[18px] md:leading-8 break-words min-w-0 charcoal-color\">The FBI is offering up to $10 million in rewards for more information about the hackers who targeted Patel&#8217;s account. Handala presents as a pro-Palestinian hacking group online, but is believed to be one of several aliases used by cyberintelligence units working for the Iranian government, <em>Reuters<\/em> writes. Groups affiliated with Iran have targeted officials in the US before. In August 2024, the FBI shared that a separate group, APT42, was trying to gain access to both the Trump and Harris campaigns. Three men associated with APT42 were later charged that September.<\/p>\n<p class=\"col-body mb-4 leading-7 text-[18px] md:leading-8 break-words min-w-0 charcoal-color\">Handala has appeared to become more active during the current conflict between the US, Israel and Iran. According to <em>Reuters<\/em>, the group claimed to be behind a cyber attack on Stryker, a medical devices company, earlier in March. Handala also said it accessed and published personal data from Lockheed Martin employees stationed in the Middle East.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/cybersecurity\/kash-patels-personal-email-account-was-accessed-by-hackers-linked-to-iran-212618474.html?src=rss\" target=\"_blank\" rel=\"noopener\">Read Full Article At Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A hacking group called Handala has gained access to FBI Director Kash Patel&#8217;s email account, Reuters reports. The group published content from Patel&#8217;s email on&#8230;<\/p>\n","protected":false},"author":1,"featured_media":39867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[32],"tags":[19162,594,12044,16610,16621,19160,5275,19161,6478],"class_list":["post-39866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-gadgets-reviews","tag-accessed","tag-account","tag-email","tag-hackers","tag-iran","tag-kash","tag-linked","tag-patels","tag-personal","wpcat-32-id"],"_links":{"self":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/39866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=39866"}],"version-history":[{"count":0,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/39866\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/media\/39867"}],"wp:attachment":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=39866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=39866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=39866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}