NEWS
Android Contextual Suggestions Hits Stable on Pixel 10 Before I/O
Google has pushed Contextual Suggestions, an Android-wide version of the Pixel 10’s flagship Magic Cue feature, from beta into the stable channel this week. The new feature can predict the next steps you might take based on where you are or what you’re doing, and it’s now starting to roll out in the stable channel.
The rollout is narrow so far. According to Android Authority’s stable rollout report, colleague Adamya Sharma recently spotted Contextual Suggestions on her Pixel 10 running a stable version of Android 16, while 9to5Google says the setting is appearing across the full Pixel 10 series, Pixel 10a included, on Google Play services version 26.18. Older Pixels and Android 17 beta builds are not yet seeing it. The expansion arrives days before Google I/O 2026 opens in Mountain View, where many more AI features are expected to land across Google products next week.
A Pixel-Style AI Helper Spreads Beyond Magic Cue
The feature reads your routines and serves up an action before you ask. Back in December last year, Google was working on a toned-down version of the Pixel 10’s Magic Cue that would be available across a broader range of Android devices, called Contextual suggestions, which provides AI-generated suggestions for actions you can take based on activities you frequently engage in. For instance, you arrive at the gym, or your regular workout spot, and your favorite music app fires up automatically.
The Settings copy hasn’t shifted. It offers “suggestions from your apps and services based on your routine activities and locations,” and explains that AI learns from your usage patterns and recommends what you can do. Contextual Suggestions are essentially a more mature version of Android’s App Actions, which suggest actions for a particular app, but instead combine cues from different apps.
That last point matters. App Actions never crossed the line into routine prediction. Contextual Suggestions does.

What the Feature Will Actually Do
Google lists two concrete examples in the feature description. Your music app might suggest a playlist at the gym that you often listen to during your evening workout, and if you often cast sports games to your living room TV on Saturdays, your device can suggest casting at the right time.
Both examples lean on the same two signals: location and time of day. The AI watches what you do, when, and where, then quietly pre-stages the obvious next move. No chat interface, no prompt, no Gemini call. It either fires or it doesn’t.
Where to Find It in Settings
The toggle lives four levels deep. If you’re looking to use Contextual suggestions on your phone, you should find them under Settings, Google Services, All services, Others; on a Pixel, you can tap your profile picture at the top of Settings, then tap All services, then Others.
It’s entirely possible your device doesn’t have the feature yet, and Android Authority’s reporter notes none of his devices do either, with the publication still watching for a broader rollout.
Quick rollout snapshot:
- December 2025: First surfaced in Google Play Services version 25.49.32 beta for a small group of users.
- May 2026: Now rolling out on the Pixel 10 series, including the Pixel 10a, running Android 16 with stable version 26.18 of Google Play services.
- Older Pixels: Not currently appearing on older Pixel phones or Android 17 beta releases.
- Path: Settings, Google Services, All services, Others.
Privacy: What Stays on Your Phone
Google’s data story is firm in places and quiet in others. The feature uses AI to suggest actions and stores the information on your device in an encrypted form. What the description does not spell out is whether the AI processing itself happens locally or in the cloud.
December reporting filled in the rest. All the processing happens locally on your device in an “encrypted space,” and the data supposedly never leaves your device unless you desire for it to do so for reasons such as sharing a bug report. Stored data is automatically deleted after 60 days, with a “Manage your data” option to clear it sooner. Apps cannot access any data about Contextual Suggestions; they only receive the AI’s final prediction, such as a signal that suggests showing a music shortcut or offering a casting option.
What Google has not disclosed: which model powers the predictions. The Pixel 10’s Magic Cue, by contrast, runs on a stack the company has spelled out publicly.
How It Stacks Up Against Pixel 10’s Magic Cue
Magic Cue is the marquee AI feature Google unveiled at Made by Google. It debuted on August 20 at the event as Google’s boldest attempt to make the smartphone truly intelligent. The two features share DNA. They are not the same product.
| Attribute | Magic Cue (Pixel 10) | Contextual Suggestions |
|---|---|---|
| Eligible devices | Pixel 10, Pro, Pro XL, Pro Fold | Full Pixel 10 series, Pixel 10a included |
| AI model | Gemini Nano plus Private AI Compute cloud | Not disclosed |
| Hardware required | Tensor G5 | Not specified |
| Data sources | Gmail, Calendar, Messages, Screenshots, Contacts | Routine activity and location |
| Trigger style | Cross-app in-context suggestions | Routine and location prediction |
Magic Cue is made possible by the powerful Tensor G5 chip and the latest version of Gemini Nano, Google’s AI model designed to run on-device. Three months after the Pixel 10 launch, Google added Private AI Compute, a “secure, fortified space for processing” sensitive user data that Google cannot access, which takes advantage of Google’s end-to-end AI stack including CPUs and Cloud TPUs. That stack is detailed in Google’s Magic Cue feature explainer. Contextual Suggestions has no public equivalent answer yet.
The Pixel 10a is the most interesting wrinkle. Magic Cue is only available on Google’s Tensor G5 Pixel 10 phones, which means the budget-priced Pixel 10a is out, as it has the older Tensor G4. The Pixel 10a is, however, on the Contextual Suggestions list, giving the cheaper hardware its first taste of Google’s proactive AI direction.
Reviewers gave the full Magic Cue version positive marks. Harish Jonnalagadda, Senior Editor at Android Central, wrote after a month using the Pixel 10 Pro XL:
“I found Magic Cue to be quite handy.”
That is the standard Google now wants to scale down for the rest of Android.
A Quiet Stable Drop Just Before Google I/O
The timing isn’t accidental. Slipping Contextual Suggestions into stable now, without a launch blog post, hands Google something to demo on the I/O stage without acting as if the feature appeared overnight. The company’s documentation on the broader Magic Cue family already lives on a dedicated Pixel Phone Help support page, suggesting an information layer is ready when more devices come online.
Google has been doing this kind of routine prediction for years, going all the way back to Google Now in the early 2010s, which makes it a bit surprising it took the company this long to do this with AI.
For non-Pixel users the wait continues. Samsung, OnePlus, and the rest of the Android base are still outside the rollout window, and Google has not said when, or whether, Contextual Suggestions will reach them in the same form.
Frequently Asked Questions
How Do I Check If My Pixel Has Contextual Suggestions?
Open Settings, tap your profile picture at the top, then choose All services and scroll to Others. If Contextual suggestions appears there, you have it. As of May 2026, the setting is rolling out on the Pixel 10 series, Pixel 10a included, running Android 16 with stable Google Play services 26.18. If you don’t see it, you are not in the current wave yet.
Will My Pixel 10a Ever Get Magic Cue?
Probably not in its current form. The full Magic Cue feature is limited to the Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold, all of which use the Tensor G5. The Pixel 10a runs the older Tensor G4 and was left out at launch. Contextual Suggestions is the lighter substitute Google is offering instead.
Does My Data Leave the Phone?
No, not by default. Google says the activity data is kept encrypted on the device, and reporting on the December beta indicated processing happens locally inside an encrypted space. The data does not leave the device unless you choose to share it, for example through a bug report.
How Long Does Google Keep the Data?
Up to 60 days. Coverage of the December rollout reported that stored activity data is automatically deleted after that window. You can clear it sooner using the Manage your data option inside the feature’s settings page.
Can I Turn Contextual Suggestions Off?
Yes. The toggle is in the same Settings screen where the feature appears. Switching it off stops the device from generating new predictions. You can also clear stored data manually from that same screen.
The feature you’ve been hoping for may already be sitting in Settings, four taps deep. The rest of Android, including older Pixels, still has to wait for an invitation Google hasn’t sent.
NEWS
Microsoft Adds Cloud Kill Switch For Bad Windows Drivers
Microsoft will switch on Cloud-Initiated Driver Recovery in September 2026, handing its engineers a remote kill switch for faulty drivers shipped through Windows Update. When the Hardware Dev Center shiproom rejects a driver for quality reasons, the system uninstalls it from affected PCs and reinstates the last approved version. No user click. No OEM patch cycle. The announcement landed on May 13, 2026, with testing on selected shipping labels running through August.
That’s the news. The mechanism Microsoft just installed inside Windows Update is harder to summarize, and the limits matter more than the marketing.
How The Rollback Reaches Your PC
The pipeline is plain. Microsoft’s Hardware Dev Center shiproom, the internal release board that approves every driver bound for Windows Update, can now flag a published driver for forced recovery. Affected devices receive a rollback instruction over the same delivery pipe that pushed the bad driver out in the first place. The previous known-good driver, or the next best version still cleared by the shiproom, takes its place.
No new client software runs on the PC. No OEM tool has to be installed. The recovery uses the existing Plug and Play driver stack and the flighting and publishing services already wired into every Windows 10 and Windows 11 machine that pulls updates from Microsoft.
The targeting is narrow on purpose. A shipping label, the metadata record that defines which hardware receives a given driver, is the smallest unit Microsoft acts on. Devices outside that label go untouched. A PC that has no other approved driver to fall back to is also skipped, because reverting an audio chip or a Wi-Fi radio to nothing would break the function the rollback is supposed to fix.

Why The September Window Looks Pointed
The timing is loaded. Microsoft confirmed on May 15, 2026 that Windows Update has been silently downgrading manually installed Nvidia, AMD, and Intel graphics drivers because of overly broad hardware ID matching. The fix, called CHID Narrowing, runs as a pilot from April through September 2026 before wider enforcement in late 2026 or early 2027.
Two days before the recovery announcement, Dell pushed a faulty SupportAssist 5.5.16.0 build that triggered reboot loops on Windows 11 laptops every 30 minutes. Owners spent the weekend booting into Safe Mode to uninstall a driver Dell had quietly approved through Windows Update. That class of failure, a vendor driver passing initial validation and then misbehaving in production, looks like exactly what the new recovery feature is built to catch, as documented in the May 2026 Dell SupportAssist BSOD reboot loop incident.
Behind both episodes sits the long shadow of July 19, 2024, when a malformed CrowdStrike Falcon Sensor channel file took down roughly 8.5 million Windows machines worldwide. CrowdStrike’s CSagent.sys driver loaded into kernel mode and crashed before Windows could recover. Airlines grounded fleets. Hospitals deferred care.
Microsoft has been rebuilding around that failure mode ever since. The Windows Resiliency Initiative, unveiled at Ignite in late 2024 by Microsoft’s then-CVP for Windows and Devices Pavan Davuluri, set the direction. “We’re working together across the industry and will improve reliability, based on lessons from July, with new changes and standards in the OS,” Davuluri said. Cloud-Initiated Driver Recovery is the first of those changes shipping inside the OS rather than as a partner program.
Microsoft will run manual validation on selected shipping labels between now and August, then flip the system on for all shiproom rejections in September. No specific September date or phased Windows 10 versus Windows 11 schedule has been published.
The Quiet Limits Of Microsoft’s Kill Switch
Cloud-Initiated Driver Recovery has a narrow scope. It only acts on drivers that flow through Windows Update and get rejected by the shiproom after publication. A bad driver downloaded directly from Nvidia’s website, AMD’s site, or a vendor’s support page is invisible to the system. So is a manufacturer’s standalone installer.
The CrowdStrike case is the awkward example. Falcon Sensor’s content updates were never gated through the Windows Update shiproom, and Microsoft cannot remote-rollback them. The new feature would not have prevented the July 2024 outage, and Microsoft is not claiming otherwise. CISA’s emergency advisory on the July 19, 2024 CrowdStrike incident still describes the remediation that affected enterprises had to walk machine by machine.
- In scope: Drivers published through the Hardware Dev Center and distributed via Windows Update.
- Out of scope: Drivers installed directly from OEM or vendor websites, security-vendor kernel drivers updated outside Windows Update, and any driver Microsoft has no approved fallback for.
- Device-side condition: The PC must still be able to reach Windows Update and must have a previous approved driver or compatible alternative available.
Inside The Shiproom That Now Holds A Recall Button
Most Windows users have never heard of the driver shiproom. Every wireless card, audio codec, graphics chip, and printer driver that lands on a Windows PC through Windows Update passes through it. Hardware vendors submit signed driver packages to the Hardware Dev Center portal. Microsoft engineers review crash telemetry, install-failure rates, blue-screen counts, and compatibility flags before approving publication. The cadence is laid out in Microsoft Learn’s Driver Ship Room release cadence documentation.
What changes in September is what the shiproom can do after a driver is already out. Before, a rejection blocked further publication. The flawed driver already on millions of machines kept running until the vendor pushed a corrected version, which could take days or weeks. Now the shiproom can pull the existing copy back.
Microsoft’s Hardware Dev Center announcement blog post on May 13, 2026 describes the mechanism as “coordinated updates to the PnP driver stack and the driver flighting and publishing services.” Translation: the same plumbing that delivers new drivers now also delivers takedown orders.
The internal trigger is a publishing request rejection. If a vendor submits a follow-up driver and the shiproom flags it for quality reasons during gradual rollout, the previous-but-flawed version on user devices can be rolled back to whatever shipped before it. No new tooling. No new agent. A new outcome from an existing review.
Hardware Partners Get A Notification, Not A Veto
OEMs and chip vendors will be informed through existing shiproom channels when Microsoft initiates a recovery on one of their drivers. There is no published opt-out. Partners can submit a corrected build through the usual Hardware Dev Center publishing process, and once it passes shiproom evaluation, Windows Update distributes it the normal way, per Microsoft Learn’s driver lifecycle and publishing guide.
Microsoft framed the workflow change in a single line on its Hardware Dev Center blog.
“This change reduces the time between a driver issue being identified and impacted devices being recovered, since recovery is initiated entirely by Microsoft. Once an updated driver has been received and approved, it will be published to Windows Update as always,” Microsoft’s Hardware Dev Center team wrote on May 13, 2026.
The Bigger Driver Quality Reset At Redmond
Driver recovery is one piece. Microsoft is also tightening how new drivers reach machines in the first place. The CHID Narrowing pilot, running through September 2026, replaces the current four-part hardware ID matching with a tighter two-part HWID plus Computer Hardware ID system. The goal is to stop Windows Update from offering a 2024 OEM driver to a PC where the user has just installed a 2026 manufacturer build.
Microsoft has acknowledged the problem directly. “The result: customers who actively manage their display drivers experience unwanted downgrades through Windows Update,” the company wrote in a support document updated this month.
The kernel-side work sits under the Windows Resiliency Initiative. Microsoft is building a new Windows endpoint security platform that lets antivirus and EDR vendors run detection logic outside the kernel, in user mode, where a misbehaving sensor takes the application down instead of the operating system. A private preview was extended to select Microsoft Virus Initiative partners in mid-2025, an arc summarized in Microsoft’s Windows IT Pro Windows Resiliency best practices post.
The thinking behind it traces back to David Weston’s July 2024 Microsoft Security blog on integrating third-party security tools after the outage. “Kernel drivers provide security benefits at the cost of resilience,” wrote Weston, Corporate Vice President for Enterprise and OS Security. The new platform is the long answer to that tradeoff.
Patch management specialists who track these releases say the operational picture is more complicated than the headline reads. Susan Bradley, the Microsoft MVP who edits the patch advisory column at AskWoody and writes Windows security tips for CSO Online, has spent the past year warning enterprise admins that Windows Update’s quality is uneven across categories, with driver pushes a recurring source of disruption.
None of these initiatives replaces the staging discipline an enterprise needs. Deployment rings, Windows Update for Business policies, Intune approval workflows, and OEM validation still belong in the change-management playbook. Cloud-Initiated Driver Recovery backstops the failures that slip through. It does not replace the rings that stop most of them.
Frequently Asked Questions
Will I See A Notification When Windows Rolls Back A Driver?
Microsoft has not confirmed an end-user notification yet. The Hardware Dev Center blog post describes the recovery as fully automatic, with the Windows Update pipeline delivering the rollback and uninstalling the rejected driver without user intervention. If you want to confirm a recovery happened on your PC after September 2026, check Device Manager’s driver version history or the Windows Update history pane for entries dated after a known driver problem.
Can IT Admins Opt Out Of Cloud-Initiated Driver Recovery?
Microsoft has not published opt-out controls. Existing Windows Update for Business and Intune deferral policies will likely still apply, because the recovery rides the same delivery pipeline as normal driver updates. Enterprise admins should monitor the Hardware Dev Center channel and the Windows IT Pro blog for policy documentation between May and August 2026, the validation testing window Microsoft has confirmed.
Does This Fix The CrowdStrike-Style Kernel Crash Problem?
No. CrowdStrike’s Falcon Sensor channel updates ship outside Windows Update, so Microsoft cannot reach them with this feature. The separate Windows Resiliency Initiative, which lets security vendors run outside kernel mode through a new Microsoft Virus Initiative platform, is the answer to that class of failure. Cloud-Initiated Driver Recovery only covers drivers that flow through the Hardware Dev Center shiproom and Windows Update.
Will My Manually Installed Nvidia Or AMD Driver Get Rolled Back?
No, unless Windows Update later replaces it with a shipped driver that the shiproom then rejects. Drivers downloaded directly from Nvidia, AMD, Intel, or any vendor’s site live outside the system entirely. The companion CHID Narrowing change, piloting April through September 2026, is the fix for Windows Update overwriting manually installed GPU drivers in the first place.
Microsoft has not committed to a specific September date or a phased rollout across Windows 10 and Windows 11. The features that depend on the same plumbing, including CHID Narrowing and the user-mode security pieces of the Windows Resiliency Initiative, sit on overlapping timelines that will define the second half of 2026 for Windows reliability. Whether Microsoft uses the new recall button often, and how openly it reports when it does, is the question every IT pro will be watching from September on.
NEWS
Iran’s Handala Hackers Dox 2,379 Marines Across the Persian Gulf
The Iran-linked Handala Hack Team published what it described as the names and phone numbers of 2,379 US Marines stationed in the Persian Gulf on April 28, hours after Marines in Bahrain began receiving WhatsApp messages threatening drone and missile strikes. The Wall Street Journal first reported the leak. US Central Command referred questions to the Naval Criminal Investigative Service while authenticity assessments continued. Check Point Research has tied the persona to an Iranian intelligence unit.
The breach is the most public escalation yet in a digital campaign tied to the US-Israeli war on Iran that opened in late February. Handala styles itself as a pro-Palestinian hacktivist outfit, but the US Department of Justice and multiple cybersecurity vendors attribute the group to Iran’s Ministry of Intelligence and Security. The Telegram message described the release as proof of the group’s intelligence superiority and called US base security an empty illusion. Service members in Bahrain reported identical WhatsApp threats a day earlier from what appeared to be a hijacked Bahraini business phone number.
Telegram Dump Lists 2,379 Names With Visible Data Gaps
The group posted the data to its public Telegram channel on Tuesday, April 28, with a message claiming the release was only a sample and that further publications could include tens of thousands more service members. Independent reporters who reviewed the file flagged a long list of integrity problems. Some rows contained incomplete phone numbers. Some name fields held what appeared to be military contract identifiers rather than names.
The group also claimed it holds home addresses, family information, base details, shopping habits, and nightly leisure routines for thousands of additional troops. Researchers at Bitdefender and Cybernews note those data points could have been assembled from breached commercial data brokers, social media profiles, and credential dumps rather than pulled from a single secure system. The point of a campaign like this is not to prove a particular intrusion but to put a name, a phone number, and a location in front of a Marine and a Marine’s family at the same time.
Reporters Found Incomplete Phone Numbers in the Sample
When reporters dialed two dozen numbers from the leaked sample, most reached automated voice messaging systems. In three cases, names left on voicemails matched names from the file. One person confirmed their identity but hung up after being told about the leak. Another said they could not answer questions and referred the reporter to the Navy’s public affairs office.
That verification sample is small, but the result fits a deliberate pattern. The group does not need every entry to be authentic. It needs enough authentic entries for a Marine reading the list to feel exposed and for a journalist verifying the leak to confirm at least some hits.

WhatsApp Threats Land at Naval Support Activity Bahrain
According to Stars and Stripes’ reporting from Bahrain, the threats arrived on Monday, April 27, sent through WhatsApp to service members stationed in Bahrain, which hosts US Naval Forces Central Command. Stars and Stripes reviewed identical messages received by two different service members. The texts came from what appeared to be a Bahraini cell number tied to a legitimate business on the island, indicating the number had been spoofed or hijacked.
The messages warned recipients that their identities were known to Iranian missile units and that they would be targeted by Shahed drones and Kheibar and Ghadeer missiles. Recipients were told to call their families and say their final goodbyes. The messages also referenced Iran’s claimed casualties at a primary school in Minab, in southern Iran’s Hormozgan province, struck in the early days of the conflict. Similar threats reached residents in Israel the same day, according to The Jerusalem Post. CENTCOM referred questions about the messages to NCIS. NCIS did not say how many people received them.
Check Point Ties Handala to the MOIS Persona Void Manticore
Check Point Research’s published analysis of the group assesses Handala Hack as one of three online personas operated by an Iranian threat actor it tracks as Void Manticore. The same cluster is known in other vendor frameworks as Red Sandstorm, Banished Kitten, and Cobalt Mystique. Check Point links the actor to Iran’s Ministry of Intelligence and Security and traces its operations as far back as 2022, when the Homeland Justice persona was used in destructive wiper attacks against Albanian government agencies.
The cluster typically gains initial access through compromised credentials or supply-chain footholds at IT service providers, then moves laterally using RDP and basic tunneling tools, and deploys destructive wipers alongside hack-and-leak releases. Recent Handala campaigns have routed traffic through Starlink IP ranges to bypass Iranian government internet blackouts. The cluster’s tactics have stayed consistent since 2022, which means strengthening defenses against credential theft and supply-chain footholds remains the most direct counter for would-be victims.
From Albania to Stryker to the FBI Director’s Inbox
Public Handala claims over the past four months include the following high-profile operations:
- A January 2026 takeover of public-address systems at roughly 20 Israeli kindergartens, triggering air-raid sirens and Arabic-language broadcasts in classrooms.
- A March 2026 cyberattack on US medical device maker Stryker, branded Operation Epic Fury, in which the group says it wiped more than 200,000 systems across 79 countries and exfiltrated 50 terabytes of data. Stryker confirmed severe, global disruption affecting all company laptops in a Securities and Exchange Commission filing.
- An April 2026 breach of FBI Director Kash Patel’s personal Gmail account, with the group publishing more than 300 emails from the inbox.
- The current April 28 release of personal data on 2,379 US Marines.
Justin Moore, a threat intelligence researcher at Palo Alto Networks’ Unit 42, described Handala to Wired earlier this year as a group that combined the noisy playbook of a hacktivist outfit with the destructive capabilities of a nation-state, calling it a primary cyber-retaliatory arm for the Iranian regime.
Navy Memo Already Warned Sailors of Operation Epic Fury
Two weeks before the Marines leak, then-Navy Secretary John Phelan issued an April 17 unclassified memo to Department of the Navy personnel warning of adversary cyber actors conducting a social engineering campaign against sailors, Marines, and their families. The Hill’s coverage of the unclassified memo reports it named Operation Epic Fury as the catalyst and called on personnel to lock down social media accounts, switch on multi-factor authentication, and ask family members to scrub identifying images and information from public posts.
Phelan asked sailors to turn off Bluetooth and Wi-Fi when not in use, avoid public Wi-Fi, treat dating apps that request personal information with caution, and set social profiles to the highest privacy setting. The memo went out before Phelan was abruptly removed from his post on April 22 by Defense Secretary Pete Hegseth, in a dispute reported to involve shipbuilding strategy and an unrelated First Amendment ruling. The Navy guidance acknowledges, in effect, that personal devices are now part of the attack surface for force protection.
Fifth Fleet’s 2.5 Million Square Miles Multiplies the Risk
The Persian Gulf is not an ordinary posting. The US 5th Fleet, operationally run through US Naval Forces Central Command at Naval Support Activity Bahrain, covers about 2.5 million square miles of water across 21 countries, including the Arabian Gulf, the Red Sea, the Gulf of Oman, the Gulf of Aden, the Arabian Sea, and parts of the Indian Ocean. Its area encompasses three of the world’s most heavily monitored maritime chokepoints: the Strait of Hormuz, the Suez Canal, and Bab el-Mandeb.
CENTCOM’s wider area of responsibility spans more than 4 million square miles and roughly 560 million people. About 1.34 million active-duty US service members were on the books as of December 2025, according to USAFacts, and a significant share rotate through CENTCOM postings. In a region where Iranian forces have already seized commercial vessels and the US Navy has imposed a blockade on Iranian ports, a phone number paired with a duty station and a deployment pattern is operationally sensitive information.
FBI, IBM, and Verizon Reports Frame the Wider Stakes
Iran-linked operations are running on top of a global cyber baseline that is already breaking records.
| Report | Headline figure | Year |
|---|---|---|
| FBI Internet Crime Complaint Center | Nearly $21 billion in cyber-enabled crime losses | 2025 |
| IBM Cost of a Data Breach | $4.44 million global average breach cost (down 9%) | 2025 |
| IBM Cost of a Data Breach | $10.22 million record US average breach cost | 2025 |
| Verizon Data Breach Investigations Report | 30% of breaches involved a third party, doubled from 15% | 2025 |
| FBI IC3 2024 report | $16.6 billion in losses, a 33% rise year over year | 2024 |
The FBI’s 2025 Internet Crime Report announcement placed total cyber-enabled crime losses at nearly $21 billion, with cryptocurrency and artificial intelligence-related complaints among the costliest categories. IBM’s 2025 Cost of a Data Breach Report, conducted by the Ponemon Institute, found the global average breach cost fell 9 percent to $4.44 million, the first decline in five years, while the US average climbed to a record $10.22 million. Verizon’s 2025 Data Breach Investigations Report found third-party involvement in confirmed breaches doubled to 30 percent of cases, a shift driven largely by supply-chain compromises and service-provider intrusions.
Iranian operators sit inside this trend rather than outside it. Check Point researchers have documented Void Manticore deploying commodity infostealers purchased on criminal forums, such as Rhadamanthys, alongside custom wipers in phishing campaigns. That pairing complicates attribution and pulls criminal tooling directly into state intelligence operations.
April CISA Advisory Connects to a Broader Iranian Pattern
On April 7, CISA, the FBI, the NSA, and the Department of Energy issued a joint advisory warning that Iranian-affiliated advanced persistent threat actors were exploiting internet-exposed programmable logic controllers at US water, wastewater, energy, and local-government facilities. The agencies attributed operational disruption and financial loss to the activity and tied it to escalating hostilities with Iran. The advisory builds on a December 2023 alert against the IRGC-linked CyberAv3ngers persona, which compromised at least 75 Unitronics PLC devices across multiple US states.
Lee Sult, chief investigator at the cybersecurity firm Binalyze, gave Cybernews a blunt read on what the Marines leak means in that wider context after the data was published.
Even when ceasefires are declared and deals are made, groups like Handala should still be considered an active threat and a warfighting asset of the Iranian regime. They make a statement that they will target anyone and everyone perceived as an enemy of Iran.
Sult described Handala as objectively active, opportunistic, and growing in confidence, mixing destruction, leaks, intimidation, and psychological warfare. He argued that Iran’s conventional military reach is now constrained enough that cyber will remain its dominant retaliatory tool through any pause in fighting.
Personal Data Sits Inside the Force-Protection Perimeter
Handala’s stated intent is to make individual Marines and their relatives feel watched, whether or not the underlying records came from a current intrusion. That distinction matters less to a service member receiving a WhatsApp message naming their family than to a security researcher reviewing the leak afterward. Threat intelligence firms and the Navy memo converge on a similar list of responses for affected service members and their commands:
- Identity-protection and credit-monitoring support for service members named in the leak and their families.
- Audit of contact information held by personnel offices, base contractors, and supply-chain IT vendors.
- Review of personal-device exposure across messaging apps, dating apps, social media, and dual-use phones.
- Continuous monitoring of dark-web markets and Telegram channels for military-linked records being resold.
- Sanctions, indictments, and infrastructure seizures targeting named MOIS operators and their commercial proxies.
The US Treasury Department sanctioned Yahya Hosseini Panjaki, the MOIS deputy intelligence minister tied by independent researchers to the Handala persona, in September 2024. According to Iran International reporting cited by BeyondTrust analysts, he was killed in a March 2026 Israeli strike on MOIS headquarters. His death has not visibly slowed Handala’s tempo, suggesting the operations are institutional rather than dependent on a single figure.
That is the harder lesson sitting under the April 28 dump. The Marines whose names appeared on a Telegram channel did not see classified materials leak. They saw a public statement that their families, schedules, and phone numbers are catalogued by a foreign intelligence service and can be published at any time. That is force protection, not data protection. The Pentagon’s response will need to treat scattered personal data, third-party data brokers, and commercial messaging apps as part of the same defensive perimeter as the bases themselves.
NEWS
BTS Jungkook Hack: $25.5M Cybercrime Kingpin Extradited From Thailand
South Korea brought home the second mastermind of a hacking syndicate that drained roughly $25.5 million from the country’s wealthiest accounts, the Ministry of Justice confirmed this week. The 40-year-old Chinese national arrived at Incheon International Airport from Bangkok on Wednesday, May 13, 2026, ending an extradition file that ran through three Interpol-backed operations and months of Thai court hearings. He is the second ringleader from the same syndicate to be marched through Incheon in nine months.
BTS member Jungkook sat near the top of a target list that ranged from famous entertainers to conglomerate chairmen and venture-company CEOs. Hackers used his stolen identity to open unauthorised brokerage accounts in January 2024 in an attempt to lift 8.4 billion won worth of HYBE shares before BigHit Music froze the trade. He had just begun mandatory military service.
An 11-Month Treaty File Closes At Incheon
The handover capped a chase that began long before the perp walk. The ministry requested the suspect’s provisional arrest from Thai authorities in May last year, followed by a formal extradition request in August. Korea waited through three months of Thai court processing before formally requesting transfer.
Korean prosecutors and investigators were dispatched to Thailand in July 2025 to coordinate with officials from the Thai Prosecutor General’s Office and the Thai National Police. Authorities from both countries also conducted frequent video conferences from October to December 2025. The final ministerial sign-off came this week, per the Justice Ministry’s account in the Korea Times extradition briefing.
A joint operation in Thailand in May 2025 led to the arrest of a 36-year-old Chinese accomplice along with 16 other members of the group. Authorities also secured custody of the latest suspect at the same location. The 40-year-old then stayed on a provisional detention hold while Seoul worked through nine more months of paperwork.
The first ringleader, a 36-year-old Chinese national, was extradited to Korea, indicted and detained in August last year. Identified as Jeon, he is now facing 11 charges, with court proceedings ongoing in Seoul.

How $25.5 Million Slipped Out of Korea’s Elite Accounts
From August 2023 to April 2024, the syndicate allegedly siphoned off more than 38 billion won ($25.5 million) by using illegally obtained personal data to gain access to victims’ bank and cryptocurrency accounts, according to the Ministry of Justice’s statement to the Korea Herald. Another attempt to steal 25 billion won (~ $16.8 million) from 10 people was thwarted only by financial intervention in the eleventh hour.
The breach trail started inside government infrastructure. The hacking group meticulously breached six government and public agency websites to gain resident registration numbers and authentication credentials of 258 high-profile targets.
The target list was not random. Investigators say the group covertly looked into the account balances of as many as 258 people, ranging from famous entertainers to conglomerate chairmen and venture-company CEOs, with 258 high-net-worth Koreans in the crosshairs.
- $25.5M lifted from victim accounts between August 2023 and April 2025
- $16.8M second-wave attempt blocked at the eleventh hour
- 258 high-net-worth Koreans on the target list
- 89 victims whose names were used to register cloned SIM cards
- 6 government and public agency websites breached
- 18 members of the syndicate now in custody
The Budget Carrier Backdoor That Broke Two-Factor Authentication
The crew did not crack a single financial firewall. They walked through the front door using cloned identities.
The hacker ring made use of a loophole in South Korea’s budget mobile carrier system and exploited the mechanism of remote SIM card activation, which helped them bypass in-person verification and enabled them to register phones in the names of 89 victims. That gap let the syndicate intercept every SMS-based one-time password the banks pushed.
Korea’s MVNO market is built for prepaid SIM activation customers can complete entirely online. Larger telcos still require in-person ID checks at retail stores. The syndicate picked the path of least resistance and ran it across 89 cloned identities.
These cloned identities allowed them to even cross the two-factor authentication required to drain accounts. Brokerage logins, crypto exchange withdrawals, and password resets routed straight to attacker handsets.
“This technique compromises SMS-based MFA by transferring the target’s phone number to the attacker,” says Matthew Gardiner, Product Marketing Manager at Proofpoint, in the firm’s SIM swapping threat reference. Bitsight’s threat research team places telecommunications among the most-targeted industries for SIM-swap fraud, noting in its State of the Underground report that compromising telecom infrastructure or personnel lets attackers reassign phone numbers and bypass multi-factor authentication, per the firm’s SIM swapping breakdown.
Why Jungkook Made the Perfect Mark
Jungkook checked every box the syndicate looked for. Wealthy. Recognizable. Out of the loop.
Jungkook was reported to have had his securities account identity stolen in January 2024, shortly after entering the military, with 33,500 shares of HYBE stock worth approximately 8.4 billion won taken. The group transferred 33,500 HYBE shares into accounts they controlled.
The hacker took away shares from the singer’s account and sold a portion to a third party. Jeon allegedly sold about 100 million won (approx. 73,000 USD) worth of stocks under Jungkook’s name to a third party, and Jungkook later recovered the funds through a civil lawsuit in March 2024.
Investigators also found that Jeon used the names of a top-30 chaebol leader, a venture company CEO, and others to commit further crimes. Both names remain redacted in court filings. “The suspect admits to some of the allegations while denying others,” police said during a press briefing after his August 2025 detention hearing.
The hackers were also particularly looking for known figures who are currently serving in the military or incarcerated, to take advantage of their absence. The Seoul Metropolitan Police Agency framed the case’s stakes during a briefing reported by Yonhap News Agency.
“As this case has very large social repercussions, we will conduct a strict investigation with not a shred of doubt.”
SIM Cloning Is Outpacing Carrier Defenses Worldwide
The Jungkook case lands inside a global spike. In 2024, the FBI’s Internet Crime Complaint Center (IC3) received 982 complaints related specifically to SIM swapping attacks, with total reported losses exceeding $26 million, according to VikingCloud’s IC3 data analysis. While this represents a slight dip from the peak of $68 million in 2021, experts say attackers are becoming more selective, targeting victims with higher-value digital assets like cryptocurrency and brokerage accounts.
In a separate US case, attackers used SIM swaps to steal $400 million in cryptocurrency from 50 victims, including one company.
Federal cybersecurity agencies have moved against the underlying weakness. CISA put it plainly: “Do not use SMS as a second factor for authentication.” Organizations must also remain compliant with evolving regulations, such as the FCC’s new rules designed to combat SIM swapping.
Group-IB’s 2026 SIM swap evolution analysis frames the wider shift bluntly. The High-Tech Crime Trends Report 2026 reveals how this shift has industrialized cybercrime, exposed the limits of perimeter-based defenses, and elevated identity and trust as the new primary attack surfaces.
Korea’s case shows the wall buckles when the gate is automated. Cheap MVNO portals built for convenience let the syndicate impersonate 89 people without ever speaking to a human.
Inside the 18-Member Syndicate Now in Custody
With both leaders and the other 16 members now under governmental custody, the Ministry of Justice has confirmed the end to this specific transnational fraud. The Seoul Metropolitan Police plan to apply for an arrest warrant for the 40-year-old after an intensive investigation.
Korea JoongAng Daily reported the ring was headed by two individuals attending the same university, who orchestrated the acts from their bases in China and Thailand. A judge at the Seoul Central District Court issued the original arrest warrant on Jeon on charges of violating the Information and Communications Network Act and the Act on the Aggravated Punishment of Specific Economic Crimes, and his trial will keep Korea-Thailand cooperation in play through at least 2026.
Jungkook avoided personal loss. The next 257 names on the list mostly did not. Whether Korean prosecutors can recover the won that already crossed into crypto wallets, and whether MVNO regulators close the SIM activation loophole before the next syndicate spins up, are the only questions still open.
-
CRYPTO1 week agoAndreessen Horowitz Bets $2.2B on Crypto’s Quiet Cycle
-
CRYPTO6 days agoCathie Wood Calls SpaceX IPO Demand ‘Voracious’ Ahead Of $1.75T Debut
-
APPS2 weeks agoGoogle’s Buried Page Reveals 500 Niche Websites Still Making Cash
-
AI1 week agoGoogle AI Overviews Adds Subscribed Label, Reddit Quotes Inline
-
NEWS1 week agoHormuud Bets $19 Down Will Finally Pull Somalia Online
-
NEWS1 week agoGhana CSA Plants Office In Ho As Volta Cybercrime Climbs
-
NEWS1 week agoApple Strikes Preliminary Deal For Intel To Make iPhone And Mac Chips
-
GAMING1 week agoAsha Sharma Reshuffles Xbox Leadership In Race To Project Helix
