
Iran’s intelligence apparatus didn’t just hack—it allegedly used U.S.-reachable websites to threaten dissidents with violence, and DOJ says it just pulled the plug.
Story Snapshot
- The Justice Department says it seized four domains tied to Iran’s Ministry of Intelligence and Security (MOIS) used for propaganda, harassment, and claiming cyberattacks.
- DOJ alleges the sites were part of “psychological operations,” including threats aimed at dissidents, journalists, and other targeted communities.
- Officials say the infrastructure was used to claim responsibility for hacks, including activity tied to Albania in 2022 and a destructive malware claim in March 2026.
- The action highlights how foreign actors can blend cyberattacks with intimidation campaigns that reach into U.S. public space online.
DOJ Seizes Domains Used for Propaganda and Threat Campaigns
The Justice Department announced a court-authorized seizure of four internet domains it says were operated by Iran’s MOIS to conduct cyber-enabled psychological operations. DOJ identified the domains as Justicehomeland[.]org, Handala-Hack[.]to, Karmabelow80[.]org, and Handala-Redwanted[.]to, alleging they were used to spread propaganda, harass targets, and publicize claims of cyberattacks. Officials framed the seizure as a direct disruption of an infrastructure designed to intimidate and amplify hostile messaging online.
Attorney General Pamela Bondi said the department’s goal was to deactivate networks that, according to the government, were inciting real-world violence while pushing extremist-style messaging. FBI Director Kash Patel said investigators intend to identify the actors behind death threats and cyberattacks and pursue accountability. DOJ’s announcement emphasized that the domains were not merely “influence” pages, but tools used alongside threats, harassment, and alleged claims of responsibility for damaging activity.
How the Alleged Operation Worked Across Years and Targets
DOJ described the seized websites as a multi-year platform for MOIS messaging that mixed propaganda with intimidation. The department cited documented episodes where operators used Justicehomeland[.]org to claim responsibility for stealing sensitive documents from Albanian government organizations on July 15, 2022, and again on September 9, 2022. DOJ also said Handala-hack[.]to was used in March 2026 to claim credit for a destructive malware attack against a U.S.-based multinational medical technologies firm.
The government further alleged the operation targeted Iranian dissidents and journalists inside and outside the United States, as well as other groups, including Israeli persons and members of the Iranian diaspora. DOJ said an associated email account—Handala_Team@outlook[.]com—was used to send death threats, including messages offering bounties for violence against identified targets. Those allegations matter because they move the story beyond “speech” online and into coercion, intimidation, and attempted recruitment for harm.
What’s Confirmed vs. What’s Still Unverified in Public Reporting
The most concrete, verifiable outcome is the domain seizure itself: DOJ says the sites are no longer operational and were taken under court authority. Beyond that, much of the public evidence flows from government filings and statements, not independent third-party cybersecurity. DOJ referenced an affidavit describing the operational scope, but portions are reportedly redacted, which limits the public’s ability to validate specific identities, locations, and technical details.
This distinction matters for readers who want facts without spin. The U.S. government’s attribution to MOIS is an official position supported by its investigation, but the information does not include outside confirmation from private-sector threat intelligence teams or international monitors. At the same time, the government’s description aligns with a broader, well-documented pattern: hostile regimes using cyber tools not just to steal data, but to intimidate critics and project fear across borders.
Why This Matters for Americans Focused on Security and Limited Government
Foreign psychological operations exploit America’s open internet and free society, and that creates a hard balance: protect lawful speech while shutting down infrastructure allegedly used for threats and coercion. DOJ’s framing focused on the latter—domains that the department says were tied to death threats and incitement—rather than mere dissenting political viewpoints. If those allegations are accurate, disrupting the domains is less about policing opinions and more about stopping intimidation networks that target people for political reasons.
The broader takeaway is practical: cyber conflict now routinely blends hacking, propaganda, and harassment, reaching from overseas intelligence services into everyday online spaces Americans use. DOJ noted it has taken similar actions before, including a separate disruption of Russian government-directed influence infrastructure. For the public, the next test will be whether investigators can attribute responsibility beyond domains—identifying operators, deterring copycat infrastructure, and hardening U.S. institutions against foreign intimidation campaigns that thrive in information chaos.
Sources:
Justice Department Disrupts Iranian Cyber-Enabled Psychological Operations
Justice Department Disrupts Covert Russian Government-Sponsored Foreign Malign Influence
DOJ issues sweeping new domestic terrorism directive












