By
Gigabit Systems
December 25, 2025
•
20 min read

A Messaging App Breach Took Down a Former Prime Minister
What the Bennett Telegram Hack Really Shows
Former Israeli Prime Minister Naftali Bennett has confirmed that his Telegram account was compromised, after an Iranian-linked hacker group leaked private conversations, contacts, and photos online.
While Bennett maintains that his phone itself was not hacked, he acknowledged that attackers gained access to his Telegram account “through various means.” That distinction matters — and it exposes a much larger cybersecurity lesson.
This was not a device failure.
It was an account takeover.
What Happened
The Iranian hacker group “Handala”, known for targeting Israeli political and security figures, claimed it breached Bennett’s phone. Initial responses from Bennett’s office denied a hack, stating the device was no longer in use.
Hours later, leaked Telegram chats appeared online.
Among the exposed material:
Bennett’s Telegram contact list, allegedly including senior officials and security figures
Private conversations with aides
Messages containing disparaging remarks about political rivals
Photos reportedly taken from the compromised account
After the leaks circulated, Bennett clarified that while the phone itself was not breached, access to his Telegram account was obtained, possibly through another compromised device belonging to an aide.
Israel’s Shin Bet is now reportedly investigating the incident.
Why This Was Possible
Modern espionage rarely requires physical phone access.
Common Telegram takeover paths include:
Compromised secondary devices
SIM-swap attacks
Stolen session tokens
Phishing for verification codes
Weak or reused passwords
MFA gaps or fallback weaknesses
Once an attacker controls the account, they inherit:
Past conversations
Contacts
Media
Ongoing access
Implicit trust from recipients
The phone becomes irrelevant.
The identity is the target.
The Strategic Message Behind the Leak
The hackers branded the breach “Operation Octopus”, mocking Bennett’s long-standing rhetoric about confronting Iran as a central “octopus” controlling regional threats.
Their message was clear:
You believed you were cutting off the arms.
You didn’t realize the octopus was already holding you.
This was psychological warfare layered on top of a technical compromise — a hallmark of modern state-aligned cyber operations.
Why This Matters Beyond Politics
If a former prime minister can lose control of a messaging account, so can:
Executives
Law firm partners
Healthcare administrators
School leadership
Journalists
Activists
SMB owners
Encrypted apps do not protect you if the account itself is taken over.
Account security — not encryption — is now the weakest link.
The Real Lesson
This breach wasn’t about Telegram.
It wasn’t about Bennett’s phone.
It was about account hygiene, identity security, and trust boundaries.
Modern attacks don’t break devices.
They borrow identities.
The Provocative Takeaway
You don’t need your phone hacked to lose everything on it.
If attackers get your account, they get your voice, your history, and your credibility.
That’s the new frontline of cyber warfare.
70% of all cyber attacks target small businesses, I can help protect yours.
#️⃣ #cybersecurity #accounttakeover #Telegram #MSP #nationstateattacks