HomeCyber SecurityIran-linked group claims wiper assault and takedown of medical gadget maker Stryker | information – Cyber Tech
Iran-linked group claims wiper assault and takedown of medical gadget maker Stryker | information – Cyber Tech
March 13, 2026
The professional-Palestinian, Iran-linked group Handala claimed accountability for a cyberattack on Michigan-based Stryker that disrupted the medical gadget producer’s community.In a March 12 assertion to its clients, Stryker mentioned it had “no indication that it was malware or ransomware” and the group believed the state of affairs was contained to the corporate’s inside Microsoft surroundings solely.Regardless of the corporate’s assertion, Handala reportedly claimed it stole 50 terabytes of knowledge, wiping greater than 200,000 techniques, servers and cellular gadgets that Handala mentioned pressured Stryker to close down its operations.Denis Calderone, principal and CTO at Suzu Labs, mentioned this cyberattack represents the second clear instance because the Iran struggle began practically two weeks in the past of focusing on in opposition to U.S. corporations with shut ties to Israel.Calderone mentioned final week we noticed MuddyWater hit a U.S. defense-aerospace provider focusing on its Israeli operations, and now Handala attacked an organization with DOD contracts and an Israeli medical tech acquisition.Associated studying:“These teams are deciding on targets primarily based on Israeli enterprise relationships, and Handala is sort of actually a entrance for Void Manticore, linked to Iran’s Ministry of Intelligence,” mentioned Calderone. “Calling them hacktivists understates what they’re.”Collin Hogue-Spears, senior director of answer administration at Black Duck, mentioned this newest operation wiped over 200,000 techniques throughout 79 international locations to punish a surgical tools maker for its U.S. protection ties and its acquisition of the Israeli orthopedic firm OrthoSpace Ltd. “The assault was retaliatory, not monetary,” mentioned Hogue-Spears.Hogue-Spears mentioned one technical evaluation describes the attacker getting access to the corporate’s Microsoft Intune console, the cellular gadget administration (MDM) platform that enrolls and controls its whole gadget fleet, and issuing a mass wipe to each enrolled gadget.“The weapon was not customized malware deployed endpoint-by-endpoint,” mentioned Hogue-Spears. “The weapon was the administration aircraft, doing precisely what it was designed to do beneath adversary management. Handala didn’t want a zero-day. They wanted one set of privileged credentials and the instruments Stryker already paid for.”
Duncan Greatwood, chief government officer at Xage Safety, added that the disruption at Stryker marks a big escalation within the focusing on of healthcare infrastructure. Simply as we have now seen with latest assaults on the power sector, Greatwood mentioned medical know-how leaders are actually high-leverage targets the place attackers goal to create operational paralysis.“When a world firm chargeable for life-saving surgical tools is disabled on this approach, the implications attain far past a typical company community,” mentioned Greatwood. “Regardless of the present aerial marketing campaign, the steadiness of chances means that the Iranian regime will survive in some type. With its standard army capabilities having been largely destroyed, the regime is prone to additional concentrate on unconventional technique of attacking the USA, together with finishing up and sponsoring disruptive cyberattacks.”Rob Gregory, chief data safety officer at Optiv, mentioned the Stryker assault reminder us that cyber incidents don’t all the time begin with malware: they will begin with stolen credentials and trusted instruments reminiscent of Microsoft Intune being turned in opposition to the enterprise.Listed here are some ideas from Gregory on how groups ought to proceed:
Harden privileged entry: Shield administrator accounts and administration platforms with the best degree of authentication, monitoring, and entry restrictions.
Monitor for harmful use of reliable instruments: Detect and alert on uncommon actions reminiscent of mass gadget wipes, resets, or configuration modifications.
Plan for harmful, not simply ransomware, assaults: Guarantee backups, restoration plans, and offline restoration capabilities can help full system and/or endpoint loss.
Account for geopolitically motivated threats: Acknowledge that world organizations could get focused as a part of nation‑state or state‑aligned cyber exercise, no matter business.
Azeem Rajpoot, the author behind This Blog, is a passionate tech enthusiast with a keen interest in exploring and sharing insights about the rapidly evolving world of technology.
With a background in Blogging, Azeem Rajpoot brings a unique perspective to the blog, offering in-depth analyses, reviews, and thought-provoking articles. Committed to making technology accessible to all, Azeem strives to deliver content that not only keeps readers informed about the latest trends but also sparks curiosity and discussions.
Follow Azeem on this exciting tech journey to stay updated and inspired.