Connect with us

NEWS

Vivo X300 Ultra Hits India At Rs 1,59,999, X300 FE From Rs 79,999

Published

on

Vivo started selling the X300 Ultra and X300 FE in India on Thursday, marking the first time the company has shipped its top-tier Ultra phone to the country. The Ultra costs Rs 1,59,999 for the only 16GB RAM and 512GB storage variant. Counterpoint Research’s India smartphone Q1 2026 analysis shows India’s smartphone market declined 3% year-on-year in Q1 2026, marking its weakest quarter in six years, making this launch a deliberate bet on the segment still holding up. The compact X300 FE starts at Rs 79,999 for the 12GB+256GB variant and Rs 89,999 for the 12GB+512GB model. Both run OriginOS 6 on Android 16 and pack ZEISS-tuned camera systems.

The Ultra ships with optional 200mm and 400mm telephoto extender lenses, sold separately or bundled in a Rs 2,09,999 Photography Kit. Both phones are made at vivo India’s Greater Noida facility, which a recent retail-channel note placed at approximately 8,000 workers.

This is one of the priciest Vivo phones ever sold in India. It pushes the brand into a tier it had long ceded to Apple, Samsung, and the Xiaomi Ultra line. The launch arrives in a market where premium is the only segment still expanding.

Price Breakdown And What Each Variant Costs

The X300 Ultra sells in a single 16GB+512GB configuration in Eclipse Black and Victory Green for Rs 1,59,999. Vivo’s full Photography Kit, per the X300 Ultra India launch press release, pairs the phone with the 400mm ZEISS Telephoto Extender Gen 2 Ultra, the 200mm Telephoto Extender Gen 2, and the vivo Imaging Grip for Rs 2,09,999. Buyers wanting accessories alone can pick up the Zeiss Telephoto Extender Gen 2 Ultra (400mm) for INR 27,999, along with the vivo Imaging Grip Kit priced at INR 11,999, plus the 200mm extender at Rs 15,999.

On the FE side, prices start at Rs 79,999 for 12GB+256GB and Rs 89,999 for 12GB+512GB. It ships in Urban Olive, Noir Black, and Lilac Purple. The FE accessory bundle, including the base phone, the 200mm ZEISS Telephoto Extender Gen 2, and an accessory kit, lands at Rs 95,997 after a Rs 4,000 launch discount.

Model Variant Price (Rs) Colours
X300 Ultra 16GB + 512GB 1,59,999 Eclipse Black, Victory Green
X300 Ultra Photography Kit Phone + 400mm + 200mm + Grip 2,09,999 Eclipse Black, Victory Green
X300 FE 12GB + 256GB 79,999 Urban Olive, Lilac Purple, Noir Black
X300 FE 12GB + 512GB 89,999 Urban Olive, Lilac Purple, Noir Black

Inside The X300 Ultra’s ZEISS Master Lens Setup

The Ultra leads with three ZEISS-tuned rear cameras at fixed prime focal lengths. Its primary lens is a 35mm 200MP Sony LYTIA 901 (1/1.12-inch) sensor at f/1.85, with CIPA 6.5 stabilisation. The ultrawide is a 14mm 50MP Sony LYT-818 at f/2.0 with OIS. Its telephoto is an 85mm ZEISS Gimbal-Like Stabilisation APO Telephoto with a 200MP sensor, featuring OIS rated at CIPA 7.0 and 60fps AF tracking in Snapshot mode.

All three lenses carry ZEISS T* coating and Super Blue Glass to reduce flare and ghosting. The selfie camera is a 50MP autofocus unit at f/2.45. The 60fps AF tracking in snapshot mode is designed to handle fast subjects in sports, wildlife, and concerts, a workload where most phones still rely on digital crop or burst-mode tricks.

Behind the cameras sits vivo’s dedicated Pro Imaging Chip VS1+, a 6nm imaging processor capable of up to 80 trillion operations per second, which works in parallel with the SoC to handle RAW domain processing, noise control, and dynamic range with 20% faster image output speeds than its predecessor. A new 5MP Multispectral Sensor with 12 Color Channels and an Upgraded Flicker Sensor feeds vivo Color Science with per-pixel ambient light analysis.

Video is where the Ultra makes its hardest claim. It supports 4K 120fps 10-bit Log recording across all three rear lenses, with consistent colour science and dynamic range between focal lengths. The 6.82-inch 2K ZEISS Master Color AMOLED runs at 144Hz with 1-144Hz adaptive range, peak brightness reaches 4,500 nits locally and 1800 nits globally. A 6,600mAh semi-solid-state battery handles power with 100W wired and 40W wireless FlashCharge. Vivo quotes an AnTuTu score above 4.2 million.

What The X300 FE Brings In A Smaller Body

The FE goes compact without giving up the basics. Its 16.04 cm (6.31 inch) compact display with 5000 nits brightness runs at 120Hz. The Snapdragon 8 Gen 5 runs vivo’s all-big-core Oryon configuration, paired with LPDDR5X Ultra memory and UFS 4.1 storage. A 4005 mm² VC liquid cooling system with high-performance thermal graphite keeps thermals stable under load.

Cameras follow a more focused ZEISS-tuned setup. The X300 FE India launch press release lists a 50MP Sony IMX921 f/1.57 OIS sensor, an 8MP ultrawide lens, and a 50MP Sony IMX882 f/2.65 OIS telephoto lens that offers 3x optical zoom. The 50MP front camera carries autofocus. The FE supports the 200mm ZEISS Telephoto Extender Gen 2, the first time vivo’s external lens system has reached an FE-tier device.

A 6,500mAh battery powers the phone with 90W wired and 40W wireless FlashCharge. Vivo positions this as India’s Biggest Battery of 6500 mAh in Screen Size Category. The FE carries IP68 and IP69 ratings and an aerospace-grade aluminium frame, matching the Ultra’s durability in a much lighter chassis.

The Photography Kit Reframes The Real Price

Strip out the marketing and the X300 Ultra splits into two products: a Rs 1,59,999 smartphone and a Rs 50,000 accessory system that converts it into a long-lens camera. Vivo wants premium buyers to pick up the bundle rather than the phone alone.

The 400mm Telephoto Extender Gen 2 Ultra uses a Kepler-inspired optical design with two groups of 15 high-transmittance glass elements and high-precision manufacturing, designed to meet APO imaging standards. The 200mm version, which works with both the Ultra and FE, has been slimmed from 210g to 153g without losing optical quality, according to vivo’s global X300 Ultra launch announcement.

Vivo’s Imaging Grip Kit adds physical controls familiar to anyone who shoots with a DSLR. An independent review noted that the grip carries a physical shutter, multifunction dial, zoom lever, video recording button, and standard tripod thread underneath. Its built-in 2300mAh battery can help top up the phone’s own battery in a pinch. A function button can shortcut to the Album app, Street Photography mode, or toggle the extender on or off.

Product manager Vikas Tagra, who heads the X-series for vivo India, framed the kit as a creator tool first in the launch materials.

“Designed as an ultimate toolkit for creators, it is built keeping professional demands in mind, offering an ultra experience across imaging, videography, and performance.”

Launch Offers And Effective Pricing

Vivo has loaded both phones with offers that meaningfully cut the sticker. On the Ultra, the effective price for the bundle comes down to INR 1,95,997 instead of INR 1,99,997 after the Rs 4,000 instant discount. The X300 FE bundle (phone, 200mm extender, accessory kit) hits Rs 95,997 after the same Rs 4,000 cut.

Most of the offers stack. You can take the bank cashback and the no-cost EMI together, but the instant discount applies only on the bundles, not the phone alone.

  • Rs 4,000 instant discount on the Ultra Photography Kit and the FE bundle
  • 10% instant cashback on select bank cards (SBI, Kotak, American Express, DBS, IDFC First, Axis Bank), plus HDFC for the online channel
  • 24-month no-cost EMI from around Rs 6,667 a month for the Ultra and Rs 4,000 a month for the FE bundle
  • One-year extended warranty free, up to 60% off on the V-Shield screen-damage protection plan starting at Rs 2,499
  • Jio 5,000GB cloud storage for 18 months plus Google Gemini Pro benefits
  • Up to 60% assured buyback on the Ultra at Rs 15,991 and up to 70% on the FE at Rs 799
  • Rs 5,000 upgrade bonus on the FE for select users

How The Ultra Stacks Up Against Rival Flagships

The X300 Ultra lands in the same lane as the Samsung Galaxy S26 Ultra, Xiaomi 17 Ultra, Apple iPhone 17 Pro Max, and the imminent Oppo Find X9 Ultra. Most run the Snapdragon 8 Elite Gen 5 chipset, with Apple staying on its A19 Pro. The real differentiators are cameras, battery, and software support length.

Oppo’s Find X9 Ultra is the clearest local rival. Retail listings expect it to land at around Rs 1,39,999, undercutting Vivo by Rs 20,000. Oppo’s quad-camera setup includes a 200 MP main sensor, a 200 MP 3x periscope telephoto lens, a 50 MP 10x telephoto camera, and a 50 MP ultrawide sensor.

The Find X9 Ultra also brings a larger battery and faster wireless charging. Where Oppo emphasises versatility and reach, Vivo focuses on optical purity, with ZEISS-tuned prime focal lengths and a gimbal-grade APO telephoto designed to chase fast subjects without softness.

Vivo counters with precision, but software is the soft spot. The X300 Ultra runs OriginOS 6 based on Android 16, with five major OS updates and seven years of security patches promised. While this is a decent policy, brands like Google, Samsung, and Apple offer seven years of OS updates for their flagships. For buyers who keep flagships for the full upgrade cycle, that gap matters.

What The India Market Backdrop Says

The X300 Ultra arrives at an unusual moment. India’s smartphone market shrank in Q1 2026 for the first time in years. IDC’s India smartphone Q1 2026 tracker analysis pegged the decline at 4.1% year-over-year to 31.0 million units, with the decline reflecting a structural shift in demand patterns rather than a short-term slowdown. Counterpoint’s own reading called this the country’s weakest first quarter in six years.

Underneath the headline numbers, premium has been the one resilient corner. IDC reported that the premium $600-$800 band grew 32% year-over-year while sub-$100 phones collapsed 59%. The average selling price reached a record $302, increasing 10.4% year-over-year. Vivo’s X-series rode that wave through 2025 with the X series grew 185% YoY, supported by the ZEISS camera partnership and the introduction of the X200 FE.

Sanyam Chaurasia, Principal Analyst at Omdia, told Business Standard the shift is structural, not seasonal. “India’s smartphone market is structurally shifting upward as rising component costs reset the entry price floor,” Chaurasia said. The DRAM and NAND shortage that started in late 2025 has pushed memory prices up 4x over the past three quarters, and brands have responded by chasing margin in the premium tier.

Frequently Asked Questions

When Does The Vivo X300 Ultra Go On Sale In India?

Sales started Thursday, May 14, 2026, across Flipkart, Amazon, vivo’s India e-store, and partner retail outlets. Pre-bookings opened on May 6 alongside the official launch event. All other offers are valid until May 31, 2026, including the Rs 4,000 instant discount on bundle kits and the 10% bank cashback on HDFC, SBI, and Axis cards. After that, standard pricing resumes.

Is The Vivo Photography Kit Worth The Extra Rs 50,000?

Only if you shoot beyond 5x zoom regularly. The kit adds the 400mm and 200mm ZEISS extenders plus a grip with a 2,300mAh battery, a physical shutter, and a tripod thread. Casual users will rarely need 400mm reach. Wildlife shooters, concert photographers, and sports stringers get the most value. Skip the kit if you stay inside the phone’s built-in 14mm to 85mm prime range.

Will The 200mm Telephoto Extender Gen 2 Work With My Older Vivo X200 Ultra?

No, not yet. The Gen 2 extender is engineered for the X300 series mount system. For now, the reverse isn’t possible, so you can’t use either of these two lenses with the X300 Pro until Vivo releases an update to make that possible (coming soon, apparently). There is no confirmed date for X200 series support. The previous-generation 200mm extender remains available separately for X200 Ultra owners.

How Long Will Vivo Update The X300 Ultra And X300 FE?

Vivo has committed to five Android OS upgrades and seven years of security patches on both phones, starting from Android 16. That means the X300 Ultra should receive Android 21 and patches through 2033. The policy trails the seven-year OS commitments now standard from Samsung, Google Pixel, and Apple on their respective 2025 and 2026 flagships, so factor that in if you plan to keep the phone for the full update window.

Where Can I Get The Lowest Effective Price On The Vivo X300 Ultra?

The phone is identically priced at Rs 1,59,999 on Flipkart, Amazon, and vivo’s e-store. The lowest effective price comes from stacking offers. Use an HDFC, SBI, or Axis card for 10% cashback on the bundle, take the Rs 4,000 flat discount on the Photography Kit, and add the 24-month no-cost EMI. The combination can save roughly Rs 24,000 to Rs 28,000 on the bundle before the buyback bonus kicks in.

Both phones arrive in an Indian market where the budget tier is collapsing and the premium tier is the only place left to grow. Vivo’s bet is that creators and enthusiasts will pay Rs 1,59,999, and another Rs 50,000 for the kit, to get the ZEISS Triple Prime system and a 400mm reach. Most won’t take that bait. The ones who do are the buyers Vivo has spent five X-series generations engineering toward.

Logan Pierce is a writer and web publisher with over seven years of experience covering consumer technology. He has published work on independent tech blogs and freelance bylines covering Android devices, privacy focused software, and budget gadgets. Logan founded Oton Technology to publish clear, no nonsense tech news and reviews based on real hands on testing. He has personally tested and reviewed dozens of mid range and budget Android phones, written extensively about app privacy, and built and managed multiple WordPress publications over the past decade. Logan holds a bachelor's degree in English and studied digital marketing at a certificate level.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

NEWS

Microsoft Adds Cloud Kill Switch For Bad Windows Drivers

Published

on

Microsoft will switch on Cloud-Initiated Driver Recovery in September 2026, handing its engineers a remote kill switch for faulty drivers shipped through Windows Update. When the Hardware Dev Center shiproom rejects a driver for quality reasons, the system uninstalls it from affected PCs and reinstates the last approved version. No user click. No OEM patch cycle. The announcement landed on May 13, 2026, with testing on selected shipping labels running through August.

That’s the news. The mechanism Microsoft just installed inside Windows Update is harder to summarize, and the limits matter more than the marketing.

How The Rollback Reaches Your PC

The pipeline is plain. Microsoft’s Hardware Dev Center shiproom, the internal release board that approves every driver bound for Windows Update, can now flag a published driver for forced recovery. Affected devices receive a rollback instruction over the same delivery pipe that pushed the bad driver out in the first place. The previous known-good driver, or the next best version still cleared by the shiproom, takes its place.

No new client software runs on the PC. No OEM tool has to be installed. The recovery uses the existing Plug and Play driver stack and the flighting and publishing services already wired into every Windows 10 and Windows 11 machine that pulls updates from Microsoft.

The targeting is narrow on purpose. A shipping label, the metadata record that defines which hardware receives a given driver, is the smallest unit Microsoft acts on. Devices outside that label go untouched. A PC that has no other approved driver to fall back to is also skipped, because reverting an audio chip or a Wi-Fi radio to nothing would break the function the rollback is supposed to fix.

Why The September Window Looks Pointed

The timing is loaded. Microsoft confirmed on May 15, 2026 that Windows Update has been silently downgrading manually installed Nvidia, AMD, and Intel graphics drivers because of overly broad hardware ID matching. The fix, called CHID Narrowing, runs as a pilot from April through September 2026 before wider enforcement in late 2026 or early 2027.

Two days before the recovery announcement, Dell pushed a faulty SupportAssist 5.5.16.0 build that triggered reboot loops on Windows 11 laptops every 30 minutes. Owners spent the weekend booting into Safe Mode to uninstall a driver Dell had quietly approved through Windows Update. That class of failure, a vendor driver passing initial validation and then misbehaving in production, looks like exactly what the new recovery feature is built to catch, as documented in the May 2026 Dell SupportAssist BSOD reboot loop incident.

Behind both episodes sits the long shadow of July 19, 2024, when a malformed CrowdStrike Falcon Sensor channel file took down roughly 8.5 million Windows machines worldwide. CrowdStrike’s CSagent.sys driver loaded into kernel mode and crashed before Windows could recover. Airlines grounded fleets. Hospitals deferred care.

Microsoft has been rebuilding around that failure mode ever since. The Windows Resiliency Initiative, unveiled at Ignite in late 2024 by Microsoft’s then-CVP for Windows and Devices Pavan Davuluri, set the direction. “We’re working together across the industry and will improve reliability, based on lessons from July, with new changes and standards in the OS,” Davuluri said. Cloud-Initiated Driver Recovery is the first of those changes shipping inside the OS rather than as a partner program.

Microsoft will run manual validation on selected shipping labels between now and August, then flip the system on for all shiproom rejections in September. No specific September date or phased Windows 10 versus Windows 11 schedule has been published.

The Quiet Limits Of Microsoft’s Kill Switch

Cloud-Initiated Driver Recovery has a narrow scope. It only acts on drivers that flow through Windows Update and get rejected by the shiproom after publication. A bad driver downloaded directly from Nvidia’s website, AMD’s site, or a vendor’s support page is invisible to the system. So is a manufacturer’s standalone installer.

The CrowdStrike case is the awkward example. Falcon Sensor’s content updates were never gated through the Windows Update shiproom, and Microsoft cannot remote-rollback them. The new feature would not have prevented the July 2024 outage, and Microsoft is not claiming otherwise. CISA’s emergency advisory on the July 19, 2024 CrowdStrike incident still describes the remediation that affected enterprises had to walk machine by machine.

  • In scope: Drivers published through the Hardware Dev Center and distributed via Windows Update.
  • Out of scope: Drivers installed directly from OEM or vendor websites, security-vendor kernel drivers updated outside Windows Update, and any driver Microsoft has no approved fallback for.
  • Device-side condition: The PC must still be able to reach Windows Update and must have a previous approved driver or compatible alternative available.

Inside The Shiproom That Now Holds A Recall Button

Most Windows users have never heard of the driver shiproom. Every wireless card, audio codec, graphics chip, and printer driver that lands on a Windows PC through Windows Update passes through it. Hardware vendors submit signed driver packages to the Hardware Dev Center portal. Microsoft engineers review crash telemetry, install-failure rates, blue-screen counts, and compatibility flags before approving publication. The cadence is laid out in Microsoft Learn’s Driver Ship Room release cadence documentation.

What changes in September is what the shiproom can do after a driver is already out. Before, a rejection blocked further publication. The flawed driver already on millions of machines kept running until the vendor pushed a corrected version, which could take days or weeks. Now the shiproom can pull the existing copy back.

Microsoft’s Hardware Dev Center announcement blog post on May 13, 2026 describes the mechanism as “coordinated updates to the PnP driver stack and the driver flighting and publishing services.” Translation: the same plumbing that delivers new drivers now also delivers takedown orders.

The internal trigger is a publishing request rejection. If a vendor submits a follow-up driver and the shiproom flags it for quality reasons during gradual rollout, the previous-but-flawed version on user devices can be rolled back to whatever shipped before it. No new tooling. No new agent. A new outcome from an existing review.

Hardware Partners Get A Notification, Not A Veto

OEMs and chip vendors will be informed through existing shiproom channels when Microsoft initiates a recovery on one of their drivers. There is no published opt-out. Partners can submit a corrected build through the usual Hardware Dev Center publishing process, and once it passes shiproom evaluation, Windows Update distributes it the normal way, per Microsoft Learn’s driver lifecycle and publishing guide.

Microsoft framed the workflow change in a single line on its Hardware Dev Center blog.

“This change reduces the time between a driver issue being identified and impacted devices being recovered, since recovery is initiated entirely by Microsoft. Once an updated driver has been received and approved, it will be published to Windows Update as always,” Microsoft’s Hardware Dev Center team wrote on May 13, 2026.

The Bigger Driver Quality Reset At Redmond

Driver recovery is one piece. Microsoft is also tightening how new drivers reach machines in the first place. The CHID Narrowing pilot, running through September 2026, replaces the current four-part hardware ID matching with a tighter two-part HWID plus Computer Hardware ID system. The goal is to stop Windows Update from offering a 2024 OEM driver to a PC where the user has just installed a 2026 manufacturer build.

Microsoft has acknowledged the problem directly. “The result: customers who actively manage their display drivers experience unwanted downgrades through Windows Update,” the company wrote in a support document updated this month.

The kernel-side work sits under the Windows Resiliency Initiative. Microsoft is building a new Windows endpoint security platform that lets antivirus and EDR vendors run detection logic outside the kernel, in user mode, where a misbehaving sensor takes the application down instead of the operating system. A private preview was extended to select Microsoft Virus Initiative partners in mid-2025, an arc summarized in Microsoft’s Windows IT Pro Windows Resiliency best practices post.

The thinking behind it traces back to David Weston’s July 2024 Microsoft Security blog on integrating third-party security tools after the outage. “Kernel drivers provide security benefits at the cost of resilience,” wrote Weston, Corporate Vice President for Enterprise and OS Security. The new platform is the long answer to that tradeoff.

Patch management specialists who track these releases say the operational picture is more complicated than the headline reads. Susan Bradley, the Microsoft MVP who edits the patch advisory column at AskWoody and writes Windows security tips for CSO Online, has spent the past year warning enterprise admins that Windows Update’s quality is uneven across categories, with driver pushes a recurring source of disruption.

None of these initiatives replaces the staging discipline an enterprise needs. Deployment rings, Windows Update for Business policies, Intune approval workflows, and OEM validation still belong in the change-management playbook. Cloud-Initiated Driver Recovery backstops the failures that slip through. It does not replace the rings that stop most of them.

Frequently Asked Questions

Will I See A Notification When Windows Rolls Back A Driver?

Microsoft has not confirmed an end-user notification yet. The Hardware Dev Center blog post describes the recovery as fully automatic, with the Windows Update pipeline delivering the rollback and uninstalling the rejected driver without user intervention. If you want to confirm a recovery happened on your PC after September 2026, check Device Manager’s driver version history or the Windows Update history pane for entries dated after a known driver problem.

Can IT Admins Opt Out Of Cloud-Initiated Driver Recovery?

Microsoft has not published opt-out controls. Existing Windows Update for Business and Intune deferral policies will likely still apply, because the recovery rides the same delivery pipeline as normal driver updates. Enterprise admins should monitor the Hardware Dev Center channel and the Windows IT Pro blog for policy documentation between May and August 2026, the validation testing window Microsoft has confirmed.

Does This Fix The CrowdStrike-Style Kernel Crash Problem?

No. CrowdStrike’s Falcon Sensor channel updates ship outside Windows Update, so Microsoft cannot reach them with this feature. The separate Windows Resiliency Initiative, which lets security vendors run outside kernel mode through a new Microsoft Virus Initiative platform, is the answer to that class of failure. Cloud-Initiated Driver Recovery only covers drivers that flow through the Hardware Dev Center shiproom and Windows Update.

Will My Manually Installed Nvidia Or AMD Driver Get Rolled Back?

No, unless Windows Update later replaces it with a shipped driver that the shiproom then rejects. Drivers downloaded directly from Nvidia, AMD, Intel, or any vendor’s site live outside the system entirely. The companion CHID Narrowing change, piloting April through September 2026, is the fix for Windows Update overwriting manually installed GPU drivers in the first place.

Microsoft has not committed to a specific September date or a phased rollout across Windows 10 and Windows 11. The features that depend on the same plumbing, including CHID Narrowing and the user-mode security pieces of the Windows Resiliency Initiative, sit on overlapping timelines that will define the second half of 2026 for Windows reliability. Whether Microsoft uses the new recall button often, and how openly it reports when it does, is the question every IT pro will be watching from September on.

Continue Reading

NEWS

Iran’s Handala Hackers Dox 2,379 Marines Across the Persian Gulf

Published

on

The Iran-linked Handala Hack Team published what it described as the names and phone numbers of 2,379 US Marines stationed in the Persian Gulf on April 28, hours after Marines in Bahrain began receiving WhatsApp messages threatening drone and missile strikes. The Wall Street Journal first reported the leak. US Central Command referred questions to the Naval Criminal Investigative Service while authenticity assessments continued. Check Point Research has tied the persona to an Iranian intelligence unit.

The breach is the most public escalation yet in a digital campaign tied to the US-Israeli war on Iran that opened in late February. Handala styles itself as a pro-Palestinian hacktivist outfit, but the US Department of Justice and multiple cybersecurity vendors attribute the group to Iran’s Ministry of Intelligence and Security. The Telegram message described the release as proof of the group’s intelligence superiority and called US base security an empty illusion. Service members in Bahrain reported identical WhatsApp threats a day earlier from what appeared to be a hijacked Bahraini business phone number.

Telegram Dump Lists 2,379 Names With Visible Data Gaps

The group posted the data to its public Telegram channel on Tuesday, April 28, with a message claiming the release was only a sample and that further publications could include tens of thousands more service members. Independent reporters who reviewed the file flagged a long list of integrity problems. Some rows contained incomplete phone numbers. Some name fields held what appeared to be military contract identifiers rather than names.

The group also claimed it holds home addresses, family information, base details, shopping habits, and nightly leisure routines for thousands of additional troops. Researchers at Bitdefender and Cybernews note those data points could have been assembled from breached commercial data brokers, social media profiles, and credential dumps rather than pulled from a single secure system. The point of a campaign like this is not to prove a particular intrusion but to put a name, a phone number, and a location in front of a Marine and a Marine’s family at the same time.

Reporters Found Incomplete Phone Numbers in the Sample

When reporters dialed two dozen numbers from the leaked sample, most reached automated voice messaging systems. In three cases, names left on voicemails matched names from the file. One person confirmed their identity but hung up after being told about the leak. Another said they could not answer questions and referred the reporter to the Navy’s public affairs office.

That verification sample is small, but the result fits a deliberate pattern. The group does not need every entry to be authentic. It needs enough authentic entries for a Marine reading the list to feel exposed and for a journalist verifying the leak to confirm at least some hits.

WhatsApp Threats Land at Naval Support Activity Bahrain

According to Stars and Stripes’ reporting from Bahrain, the threats arrived on Monday, April 27, sent through WhatsApp to service members stationed in Bahrain, which hosts US Naval Forces Central Command. Stars and Stripes reviewed identical messages received by two different service members. The texts came from what appeared to be a Bahraini cell number tied to a legitimate business on the island, indicating the number had been spoofed or hijacked.

The messages warned recipients that their identities were known to Iranian missile units and that they would be targeted by Shahed drones and Kheibar and Ghadeer missiles. Recipients were told to call their families and say their final goodbyes. The messages also referenced Iran’s claimed casualties at a primary school in Minab, in southern Iran’s Hormozgan province, struck in the early days of the conflict. Similar threats reached residents in Israel the same day, according to The Jerusalem Post. CENTCOM referred questions about the messages to NCIS. NCIS did not say how many people received them.

Check Point Ties Handala to the MOIS Persona Void Manticore

Check Point Research’s published analysis of the group assesses Handala Hack as one of three online personas operated by an Iranian threat actor it tracks as Void Manticore. The same cluster is known in other vendor frameworks as Red Sandstorm, Banished Kitten, and Cobalt Mystique. Check Point links the actor to Iran’s Ministry of Intelligence and Security and traces its operations as far back as 2022, when the Homeland Justice persona was used in destructive wiper attacks against Albanian government agencies.

The cluster typically gains initial access through compromised credentials or supply-chain footholds at IT service providers, then moves laterally using RDP and basic tunneling tools, and deploys destructive wipers alongside hack-and-leak releases. Recent Handala campaigns have routed traffic through Starlink IP ranges to bypass Iranian government internet blackouts. The cluster’s tactics have stayed consistent since 2022, which means strengthening defenses against credential theft and supply-chain footholds remains the most direct counter for would-be victims.

From Albania to Stryker to the FBI Director’s Inbox

Public Handala claims over the past four months include the following high-profile operations:

  • A January 2026 takeover of public-address systems at roughly 20 Israeli kindergartens, triggering air-raid sirens and Arabic-language broadcasts in classrooms.
  • A March 2026 cyberattack on US medical device maker Stryker, branded Operation Epic Fury, in which the group says it wiped more than 200,000 systems across 79 countries and exfiltrated 50 terabytes of data. Stryker confirmed severe, global disruption affecting all company laptops in a Securities and Exchange Commission filing.
  • An April 2026 breach of FBI Director Kash Patel’s personal Gmail account, with the group publishing more than 300 emails from the inbox.
  • The current April 28 release of personal data on 2,379 US Marines.

Justin Moore, a threat intelligence researcher at Palo Alto Networks’ Unit 42, described Handala to Wired earlier this year as a group that combined the noisy playbook of a hacktivist outfit with the destructive capabilities of a nation-state, calling it a primary cyber-retaliatory arm for the Iranian regime.

Navy Memo Already Warned Sailors of Operation Epic Fury

Two weeks before the Marines leak, then-Navy Secretary John Phelan issued an April 17 unclassified memo to Department of the Navy personnel warning of adversary cyber actors conducting a social engineering campaign against sailors, Marines, and their families. The Hill’s coverage of the unclassified memo reports it named Operation Epic Fury as the catalyst and called on personnel to lock down social media accounts, switch on multi-factor authentication, and ask family members to scrub identifying images and information from public posts.

Phelan asked sailors to turn off Bluetooth and Wi-Fi when not in use, avoid public Wi-Fi, treat dating apps that request personal information with caution, and set social profiles to the highest privacy setting. The memo went out before Phelan was abruptly removed from his post on April 22 by Defense Secretary Pete Hegseth, in a dispute reported to involve shipbuilding strategy and an unrelated First Amendment ruling. The Navy guidance acknowledges, in effect, that personal devices are now part of the attack surface for force protection.

Fifth Fleet’s 2.5 Million Square Miles Multiplies the Risk

The Persian Gulf is not an ordinary posting. The US 5th Fleet, operationally run through US Naval Forces Central Command at Naval Support Activity Bahrain, covers about 2.5 million square miles of water across 21 countries, including the Arabian Gulf, the Red Sea, the Gulf of Oman, the Gulf of Aden, the Arabian Sea, and parts of the Indian Ocean. Its area encompasses three of the world’s most heavily monitored maritime chokepoints: the Strait of Hormuz, the Suez Canal, and Bab el-Mandeb.

CENTCOM’s wider area of responsibility spans more than 4 million square miles and roughly 560 million people. About 1.34 million active-duty US service members were on the books as of December 2025, according to USAFacts, and a significant share rotate through CENTCOM postings. In a region where Iranian forces have already seized commercial vessels and the US Navy has imposed a blockade on Iranian ports, a phone number paired with a duty station and a deployment pattern is operationally sensitive information.

FBI, IBM, and Verizon Reports Frame the Wider Stakes

Iran-linked operations are running on top of a global cyber baseline that is already breaking records.

Report Headline figure Year
FBI Internet Crime Complaint Center Nearly $21 billion in cyber-enabled crime losses 2025
IBM Cost of a Data Breach $4.44 million global average breach cost (down 9%) 2025
IBM Cost of a Data Breach $10.22 million record US average breach cost 2025
Verizon Data Breach Investigations Report 30% of breaches involved a third party, doubled from 15% 2025
FBI IC3 2024 report $16.6 billion in losses, a 33% rise year over year 2024

The FBI’s 2025 Internet Crime Report announcement placed total cyber-enabled crime losses at nearly $21 billion, with cryptocurrency and artificial intelligence-related complaints among the costliest categories. IBM’s 2025 Cost of a Data Breach Report, conducted by the Ponemon Institute, found the global average breach cost fell 9 percent to $4.44 million, the first decline in five years, while the US average climbed to a record $10.22 million. Verizon’s 2025 Data Breach Investigations Report found third-party involvement in confirmed breaches doubled to 30 percent of cases, a shift driven largely by supply-chain compromises and service-provider intrusions.

Iranian operators sit inside this trend rather than outside it. Check Point researchers have documented Void Manticore deploying commodity infostealers purchased on criminal forums, such as Rhadamanthys, alongside custom wipers in phishing campaigns. That pairing complicates attribution and pulls criminal tooling directly into state intelligence operations.

April CISA Advisory Connects to a Broader Iranian Pattern

On April 7, CISA, the FBI, the NSA, and the Department of Energy issued a joint advisory warning that Iranian-affiliated advanced persistent threat actors were exploiting internet-exposed programmable logic controllers at US water, wastewater, energy, and local-government facilities. The agencies attributed operational disruption and financial loss to the activity and tied it to escalating hostilities with Iran. The advisory builds on a December 2023 alert against the IRGC-linked CyberAv3ngers persona, which compromised at least 75 Unitronics PLC devices across multiple US states.

Lee Sult, chief investigator at the cybersecurity firm Binalyze, gave Cybernews a blunt read on what the Marines leak means in that wider context after the data was published.

Even when ceasefires are declared and deals are made, groups like Handala should still be considered an active threat and a warfighting asset of the Iranian regime. They make a statement that they will target anyone and everyone perceived as an enemy of Iran.

Sult described Handala as objectively active, opportunistic, and growing in confidence, mixing destruction, leaks, intimidation, and psychological warfare. He argued that Iran’s conventional military reach is now constrained enough that cyber will remain its dominant retaliatory tool through any pause in fighting.

Personal Data Sits Inside the Force-Protection Perimeter

Handala’s stated intent is to make individual Marines and their relatives feel watched, whether or not the underlying records came from a current intrusion. That distinction matters less to a service member receiving a WhatsApp message naming their family than to a security researcher reviewing the leak afterward. Threat intelligence firms and the Navy memo converge on a similar list of responses for affected service members and their commands:

  1. Identity-protection and credit-monitoring support for service members named in the leak and their families.
  2. Audit of contact information held by personnel offices, base contractors, and supply-chain IT vendors.
  3. Review of personal-device exposure across messaging apps, dating apps, social media, and dual-use phones.
  4. Continuous monitoring of dark-web markets and Telegram channels for military-linked records being resold.
  5. Sanctions, indictments, and infrastructure seizures targeting named MOIS operators and their commercial proxies.

The US Treasury Department sanctioned Yahya Hosseini Panjaki, the MOIS deputy intelligence minister tied by independent researchers to the Handala persona, in September 2024. According to Iran International reporting cited by BeyondTrust analysts, he was killed in a March 2026 Israeli strike on MOIS headquarters. His death has not visibly slowed Handala’s tempo, suggesting the operations are institutional rather than dependent on a single figure.

That is the harder lesson sitting under the April 28 dump. The Marines whose names appeared on a Telegram channel did not see classified materials leak. They saw a public statement that their families, schedules, and phone numbers are catalogued by a foreign intelligence service and can be published at any time. That is force protection, not data protection. The Pentagon’s response will need to treat scattered personal data, third-party data brokers, and commercial messaging apps as part of the same defensive perimeter as the bases themselves.

Continue Reading

NEWS

BTS Jungkook Hack: $25.5M Cybercrime Kingpin Extradited From Thailand

Published

on

South Korea brought home the second mastermind of a hacking syndicate that drained roughly $25.5 million from the country’s wealthiest accounts, the Ministry of Justice confirmed this week. The 40-year-old Chinese national arrived at Incheon International Airport from Bangkok on Wednesday, May 13, 2026, ending an extradition file that ran through three Interpol-backed operations and months of Thai court hearings. He is the second ringleader from the same syndicate to be marched through Incheon in nine months.

BTS member Jungkook sat near the top of a target list that ranged from famous entertainers to conglomerate chairmen and venture-company CEOs. Hackers used his stolen identity to open unauthorised brokerage accounts in January 2024 in an attempt to lift 8.4 billion won worth of HYBE shares before BigHit Music froze the trade. He had just begun mandatory military service.

An 11-Month Treaty File Closes At Incheon

The handover capped a chase that began long before the perp walk. The ministry requested the suspect’s provisional arrest from Thai authorities in May last year, followed by a formal extradition request in August. Korea waited through three months of Thai court processing before formally requesting transfer.

Korean prosecutors and investigators were dispatched to Thailand in July 2025 to coordinate with officials from the Thai Prosecutor General’s Office and the Thai National Police. Authorities from both countries also conducted frequent video conferences from October to December 2025. The final ministerial sign-off came this week, per the Justice Ministry’s account in the Korea Times extradition briefing.

A joint operation in Thailand in May 2025 led to the arrest of a 36-year-old Chinese accomplice along with 16 other members of the group. Authorities also secured custody of the latest suspect at the same location. The 40-year-old then stayed on a provisional detention hold while Seoul worked through nine more months of paperwork.

The first ringleader, a 36-year-old Chinese national, was extradited to Korea, indicted and detained in August last year. Identified as Jeon, he is now facing 11 charges, with court proceedings ongoing in Seoul.

How $25.5 Million Slipped Out of Korea’s Elite Accounts

From August 2023 to April 2024, the syndicate allegedly siphoned off more than 38 billion won ($25.5 million) by using illegally obtained personal data to gain access to victims’ bank and cryptocurrency accounts, according to the Ministry of Justice’s statement to the Korea Herald. Another attempt to steal 25 billion won (~ $16.8 million) from 10 people was thwarted only by financial intervention in the eleventh hour.

The breach trail started inside government infrastructure. The hacking group meticulously breached six government and public agency websites to gain resident registration numbers and authentication credentials of 258 high-profile targets.

The target list was not random. Investigators say the group covertly looked into the account balances of as many as 258 people, ranging from famous entertainers to conglomerate chairmen and venture-company CEOs, with 258 high-net-worth Koreans in the crosshairs.

  • $25.5M lifted from victim accounts between August 2023 and April 2025
  • $16.8M second-wave attempt blocked at the eleventh hour
  • 258 high-net-worth Koreans on the target list
  • 89 victims whose names were used to register cloned SIM cards
  • 6 government and public agency websites breached
  • 18 members of the syndicate now in custody

The Budget Carrier Backdoor That Broke Two-Factor Authentication

The crew did not crack a single financial firewall. They walked through the front door using cloned identities.

The hacker ring made use of a loophole in South Korea’s budget mobile carrier system and exploited the mechanism of remote SIM card activation, which helped them bypass in-person verification and enabled them to register phones in the names of 89 victims. That gap let the syndicate intercept every SMS-based one-time password the banks pushed.

Korea’s MVNO market is built for prepaid SIM activation customers can complete entirely online. Larger telcos still require in-person ID checks at retail stores. The syndicate picked the path of least resistance and ran it across 89 cloned identities.

These cloned identities allowed them to even cross the two-factor authentication required to drain accounts. Brokerage logins, crypto exchange withdrawals, and password resets routed straight to attacker handsets.

“This technique compromises SMS-based MFA by transferring the target’s phone number to the attacker,” says Matthew Gardiner, Product Marketing Manager at Proofpoint, in the firm’s SIM swapping threat reference. Bitsight’s threat research team places telecommunications among the most-targeted industries for SIM-swap fraud, noting in its State of the Underground report that compromising telecom infrastructure or personnel lets attackers reassign phone numbers and bypass multi-factor authentication, per the firm’s SIM swapping breakdown.

Why Jungkook Made the Perfect Mark

Jungkook checked every box the syndicate looked for. Wealthy. Recognizable. Out of the loop.

Jungkook was reported to have had his securities account identity stolen in January 2024, shortly after entering the military, with 33,500 shares of HYBE stock worth approximately 8.4 billion won taken. The group transferred 33,500 HYBE shares into accounts they controlled.

The hacker took away shares from the singer’s account and sold a portion to a third party. Jeon allegedly sold about 100 million won (approx. 73,000 USD) worth of stocks under Jungkook’s name to a third party, and Jungkook later recovered the funds through a civil lawsuit in March 2024.

Investigators also found that Jeon used the names of a top-30 chaebol leader, a venture company CEO, and others to commit further crimes. Both names remain redacted in court filings. “The suspect admits to some of the allegations while denying others,” police said during a press briefing after his August 2025 detention hearing.

The hackers were also particularly looking for known figures who are currently serving in the military or incarcerated, to take advantage of their absence. The Seoul Metropolitan Police Agency framed the case’s stakes during a briefing reported by Yonhap News Agency.

“As this case has very large social repercussions, we will conduct a strict investigation with not a shred of doubt.”

SIM Cloning Is Outpacing Carrier Defenses Worldwide

The Jungkook case lands inside a global spike. In 2024, the FBI’s Internet Crime Complaint Center (IC3) received 982 complaints related specifically to SIM swapping attacks, with total reported losses exceeding $26 million, according to VikingCloud’s IC3 data analysis. While this represents a slight dip from the peak of $68 million in 2021, experts say attackers are becoming more selective, targeting victims with higher-value digital assets like cryptocurrency and brokerage accounts.

In a separate US case, attackers used SIM swaps to steal $400 million in cryptocurrency from 50 victims, including one company.

Federal cybersecurity agencies have moved against the underlying weakness. CISA put it plainly: “Do not use SMS as a second factor for authentication.” Organizations must also remain compliant with evolving regulations, such as the FCC’s new rules designed to combat SIM swapping.

Group-IB’s 2026 SIM swap evolution analysis frames the wider shift bluntly. The High-Tech Crime Trends Report 2026 reveals how this shift has industrialized cybercrime, exposed the limits of perimeter-based defenses, and elevated identity and trust as the new primary attack surfaces.

Korea’s case shows the wall buckles when the gate is automated. Cheap MVNO portals built for convenience let the syndicate impersonate 89 people without ever speaking to a human.

Inside the 18-Member Syndicate Now in Custody

With both leaders and the other 16 members now under governmental custody, the Ministry of Justice has confirmed the end to this specific transnational fraud. The Seoul Metropolitan Police plan to apply for an arrest warrant for the 40-year-old after an intensive investigation.

Korea JoongAng Daily reported the ring was headed by two individuals attending the same university, who orchestrated the acts from their bases in China and Thailand. A judge at the Seoul Central District Court issued the original arrest warrant on Jeon on charges of violating the Information and Communications Network Act and the Act on the Aggravated Punishment of Specific Economic Crimes, and his trial will keep Korea-Thailand cooperation in play through at least 2026.

Jungkook avoided personal loss. The next 257 names on the list mostly did not. Whether Korean prosecutors can recover the won that already crossed into crypto wallets, and whether MVNO regulators close the SIM activation loophole before the next syndicate spins up, are the only questions still open.

Continue Reading

Trending