{"id":15951,"date":"2026-03-12T19:10:16","date_gmt":"2026-03-12T19:10:16","guid":{"rendered":"https:\/\/newestek.com\/?p=15951"},"modified":"2026-03-12T19:10:16","modified_gmt":"2026-03-12T19:10:16","slug":"medical-giant-stryker-crippled-after-iranian-hackers-remotely-wipe-computers","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15951","title":{"rendered":"Medical giant Stryker crippled after Iranian hackers remotely wipe computers"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>A major cyberattack on US medical supplies giant Stryker has resulted in thousands of devices being remotely wiped, after a pro-Iranian hacking group may have compromised the company\u2019s Microsoft Intune management system.<\/p>\n<p>Details remain sketchy, but what appears to have happened on Wednesday at one of the world\u2019s largest medical supplies companies could, if confirmed, yet rival the scale of the infamous 2012 <a href=\"https:\/\/www.computerworld.com\/article\/1429113\/shamoon-malware-cripples-windows-pcs-to-cover-tracks.html\" target=\"_blank\">Shamoon incident<\/a> in which 30,000 computers belonging to Saudi Aramco were wiped. Stryker has 56,000 employees worldwide.<\/p>\n<p><a href=\"https:\/\/www.irishtimes.com\/ireland\/2026\/03\/11\/thousands-of-irish-workers-affected-by-cyberattack-on-us-medtech-firm-stryker\/\" target=\"_blank\" rel=\"noreferrer noopener\">In Ireland<\/a>, thousands of Stryker employees were unable to log into their computers, while others around the globe took to <a href=\"https:\/\/www.reddit.com\/r\/cybersecurity\/comments\/1rqopq0\/stryker_hit_by_handala_intune_managed_devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Reddit<\/a> <a href=\"https:\/\/x.com\/neeraj_pradhan\/status\/2031779296256344453\" target=\"_blank\" rel=\"noreferrer noopener\">and X<\/a> to complain that multiple devices had been wiped.<\/p>\n<h2 class=\"wp-block-heading\" id=\"no-indication-of-malware\">\u2018No indication of malware\u2019<\/h2>\n<p>\u201cAt this time, there is no indication of malware or ransomware and we believe the situation is contained to our internal Microsoft environment only,\u201d read the company\u2019s <a href=\"https:\/\/www.stryker.com\/us\/en\/about\/news\/2026\/a-message-to-our-customers-03-2026.html\" target=\"_blank\" rel=\"noreferrer noopener\">Thursday update<\/a>.<\/p>\n<p>A day earlier, the severity of the ongoing disruption caused Stryker to <a href=\"https:\/\/d18rn0p25nwr6d.cloudfront.net\/CIK-0000310764\/7fd1068c-1cef-4fd3-8a20-8c086e15da56.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">file a more detailed report<\/a> with the US Securities and Exchange Commission (SEC).<\/p>\n<p>\u201cThe incident has caused, and is expected to continue to cause, disruptions and limitations of access to certain of the Company\u2019s information systems and business applications,\u201d Stryker said. \u201cWhile the Company is working diligently to restore affected functions and systems access, the timeline for a full restoration is not yet known.\u201d<\/p>\n<p>Such a filing is only a requirement where a publicly-traded company suffers an attack that investors might consider to be materially significant.<\/p>\n<p>The fact that multiple devices were affected, including BYOD mobile devices, points to a compromise of the company\u2019s Microsoft Intune management system. While this has not been confirmed, a successful Intune compromise would have allowed the attackers to wipe devices remotely, without having to deploy malware.<\/p>\n<h2 class=\"wp-block-heading\" id=\"handala-claims-credit\">Handala claims credit<\/h2>\n<p>The Handala threat group quickly claimed responsibility for the attack. While the group\u2019s involvement is just a claim for now, Stryker employees reportedly saw a version of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Handala\" target=\"_blank\" rel=\"noreferrer noopener\">Handala logo<\/a> \u2013 a cartoon of a Palestinian boy with his back turned and hands crossed behind him \u2013 on affected devices.<\/p>\n<p>Handala\u2019s identity is hard to ascertain. Palo Alto has connected it to Iran\u2019s Ministry of Intelligence and Security (MOIS) via a second identity, Void Manticore. Other security vendors use different names, including Banished Kitten, and Storm-842.<\/p>\n<p>The group\u2019s political motivation is less mysterious. In <a href=\"https:\/\/handala-hack.to\/stryker-corporation-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">a website statement<\/a>, the group styled the cyberattack as a response to the February 28 <a href=\"https:\/\/en.wikipedia.org\/wiki\/2026_Minab_school_attack\" target=\"_blank\" rel=\"noreferrer noopener\">attack on a school in the Iranian city of Minab<\/a>, which killed up to 170 children and adults.<\/p>\n<p>\u201cWe announce to the world that in retaliation for the brutal attack on the Minab school and in response to ongoing cyber assaults against the infrastructure of the Axis of Resistance, our major cyber operation has been executed with complete success,\u201d it said. \u201cIn this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"critical-flaw\">Critical flaw<\/h2>\n<p>If Intune was the route to compromise, the first job for Stryker\u2019s forensics team will be to work out how attackers got into the system.<\/p>\n<p>\u201cStryker uses Entra for authentication, which integrates everything into this with single sign-on, including the software that builds and updates all devices, including servers, laptops, and phones,\u201d commented <a href=\"https:\/\/www.linkedin.com\/in\/rob-demain-01733468\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">Rob Demain<\/a>, CEO of security managed security company, e2e-assure.<\/p>\n<p>\u201cThis is a best practice design pattern, but with a critical flaw: if it\u2019s compromised, the attacker has access to wipe all devices, which seems to be what has happened here. Initial access is likely to be via credential theft, typically Adversary-in-the-Middle (AitM).\u201d<\/p>\n<p>Compromising such a critical system suggests a significant security failure, said <a href=\"https:\/\/www.linkedin.com\/in\/abbottjon\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">Jon Abbott<\/a>, CEO and co-founder of security management company ThreatAware.<\/p>\n<p>\u201cThe attackers have either tricked the helpdesk into resetting admin credentials, as we saw with the Scattered Spider attacks, taken over an admin\u2019s machine, or spear phished an admin directly,\u201d said Abbott.\u00a0<\/p>\n<p>\u201cIt seems unlikely the attackers could have pulled this off without someone making a critical basic mistake. Anyone granting access to an admin account needs to step up their verification checks. Many of our clients now require three-way video calls before resetting admin credentials, bringing together the admin, their manager, and the service desk operator.\u201d\u00a0<\/p>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/4140572\/iranian-cyberattacks-fail-to-materialize-but-threat-remains-acute.html\" target=\"_blank\">Security companies predicted<\/a> that pro-Iranian groups would target US companies with wiping attacks when the war started. This is a rise in threat level with a clear message: Iranian nation state actors are now aggressively targeting US companies and their supply chains, and will spare nobody. Every weakness and mistake will be leveraged.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A major cyberattack on US medical supplies giant Stryker has resulted in thousands of devices being remotely wiped, after a pro-Iranian hacking group may have compromised the company\u2019s Microsoft Intune management system. Details remain sketchy, but what appears to have happened on Wednesday at one of the world\u2019s largest medical supplies companies could, if confirmed, yet rival the scale of the infamous 2012 Shamoon incident&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15951\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15951","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15951"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15951\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}