Void Manticore

BLUF (Bottom Line Up Front)

Void Manticore (Microsoft: Storm-0842) is an Iranian state-sponsored threat actor assessed with high confidence to operate under the direction of the Ministry of Intelligence and Security (MOIS) or IRGC Cyber Command. Distinguished from espionage-focused Iranian APTs by its emphasis on destructive wiper malware and psychological warfare operations, Void Manticore executes hack-and-leak campaigns paired with data destruction to maximise cognitive impact — primarily targeting Israel, Albania, and Gulf state infrastructure.


Organizational Profile

  • Type: State-sponsored APT (Iran)
  • Attributed to: MOIS / IRGC Cyber Command
  • Microsoft Designation: Storm-0842
  • Operational Focus: Destructive cyber operations + information warfare (not espionage)
  • Active Since: ~2020 (confirmed destructive operations)

Strategic Objectives

  1. Maximise psychological and reputational damage to Israeli civilian and government infrastructure
  2. Execute retaliatory operations in response to Israeli/US kinetic or cyber actions against Iran
  3. Conduct hack-and-leak operations exposing Israeli-aligned intelligence networks
  4. Signal Iranian offensive cyber capacity as strategic deterrence

Capabilities & Methods

DomainCapabilityKey Tools
Destructive CyberHighBiBi Wiper (Linux/Windows), Cl Wiper, Partition Wipers
Hack-and-LeakHighExfiltration + Telegram / dark web publication
Psychological OperationsMedium-High”Karma” personae; fabricated leak sites
Infrastructure TargetingMediumICS/SCADA reconnaissance

Signature Tool: BiBi Wiper

Deployed during October 2023 escalation, BiBi Wiper (named as deliberate psychological provocation referencing PM Netanyahu’s nickname) targets Linux and Windows systems. Unlike ransomware, it destroys data with no decryption path — the destruction is the operational objective.


Documented Operations

OperationTargetDateMethod
Albanian Government AttackAlbanian state infrastructureJul–Sep 2022Wiper + ransomware decoy; prompted NATO invocation
BiBi Wiper CampaignIsraeli private sector, logisticsOct–Nov 2023Linux/Windows wipers post-Oct 7
”Karma” Leak OperationsIsraeli personal data2023–2024Exfiltration + Telegram publication

Key Relationships


Key Connections


Sources

  1. Microsoft Threat Intelligence — Storm-0842 profile (2023)
  2. Check Point Research — BiBi Wiper technical analysis (2023)
  3. Mandiant/Google TAG — Iranian APT ecosystem mapping