The United States has just announced a reward of 10 million dollars for the capture of Iranian hackers who hacked the personal email of FBI Director Kash Patel.
In late March 2026, the digital landscape was shaken by two high-profile cyberattacks orchestrated by the Handala Hack Team, a pro-Iranian group associated by Western intelligence with Iran’s Ministry of Intelligence. The group targeted the personal data of employees at defense titan Lockheed Martin and successfully breached the private email account of FBI Director Kash Patel. These incidents unfolded against a backdrop of unprecedented government transparency regarding unidentified aerial phenomena (UAP). Just a month earlier, in February 2026, President Donald Trump had issued a direct mandate to the Pentagon and other federal agencies to declassify files concerning non-human intelligence and anomalous phenomena. This shift was further signaled by the White House registering domains such as alien.gov and aliens.gov, fueling intense speculation across global media and the scientific community.
The hacker group Handala Hack claims to have hacked Lockheed Martin.
Lockheed Martin has long been at the center of allegations regarding clandestine reverse-engineering programs involving non-human technologies. These claims gained significant traction in 2023 when former intelligence officer David Grusch testified under oath before Congress, asserting the existence of secret initiatives to recover and study off-world craft. Grusch specifically named private defense contractors, including Lockheed Martin’s renowned Skunk Works division, as key participants in these efforts. While figures like the late Senator Harry Reid supported such narratives, the Pentagon and the All-domain Anomaly Resolution Office (AARO) have consistently and categorically denied the existence of any programs involving the possession or engineering of extraterrestrial materials. Nevertheless, the topic remains a central pillar of the ongoing public disclosure discourse.
The Iranian hacker group Handala Hack, which hacked Lockheed Martin, hacked the personal photos of FBI Director Каша Пателя
On March 27, 2026, the Handala collective announced it had compromised the personal Gmail account of FBI Director Kash Patel. The hackers subsequently leaked over 300 archived emails, primarily dating from 2010 to 2019, along with personal photographs and Patel’s professional resume. The leaked correspondence included details from his tenure at the Department of Justice; however, both the FBI and the DOJ have confirmed that no classified government information was compromised in the breach. FBI spokesperson Ben Williamson clarified that the incident was limited to a private account and that comprehensive measures have been implemented to mitigate any potential security risks arising from the exposure of personal data.
Just twenty-four hours prior to the Patel leak, Handala claimed to have exfiltrated the personal information of 28 senior Lockheed Martin engineers stationed in the Middle East, specifically those operating in Israel. The group published names and contact details, issuing a chilling ultimatum for the employees to vacate the region within 48 hours or face personal harm. Furthermore, the hackers hinted at the theft of sensitive technical documentation related to the F-35 fighter jet program. Lockheed Martin, however, was quick to refute these claims, stating there was no evidence of a breach within their corporate infrastructure. A company representative emphasized that their operations, systems, and data remained secure and unaffected by the group's claims of infiltration.
These strikes are viewed as part of a broader offensive by Handala, which previously targeted the American medical technology firm Stryker. Cybersecurity experts, including those from Check Point, suggest that the group’s tactics are designed for psychological impact as much as technical disruption. Within the UFO research community, the timing of the Lockheed Martin attack was immediately interpreted as a potential catalyst for disclosure, despite a lack of direct evidence linking the cyberattack to the government's declassification efforts. The intersection of cyber warfare and the UAP narrative has created a unique environment where digital breaches are viewed through the lens of hidden state secrets and corporate cover-ups.
The events of March 2026 underscore the persistent vulnerability of personal accounts in the era of sophisticated hybrid warfare. As the official UAP disclosure process continues to unfold, these cyber incidents gain additional resonance, feeding public theories about hidden reverse-engineering programs even when no state secrets are actually revealed. While the FBI and major defense contractors are aggressively bolstering their security protocols, these breaches demonstrate the increasingly blurred line between geopolitical cyber conflict and the public’s fascination with one of the most enduring mysteries of the modern age. The situation serves as a stark reminder that in the digital age, personal data can become a weapon in much larger ideological and informational battles.