6 min read

Stryker attack wipes 200,000 devices and disrupts global healthcare supply chain

Prepared by: Matt Veall, SOC Lead Victoria | Latest updates: 18 March 2026

Mass device wipe disrupts global operations 

In March 2026, Stryker Corporation, a global medical technology company headquartered in the United States, was hit by a large-scale destructive cyber-attack that resulted in the wiping of more than 200,000 devices across its global environment. 

The attack was claimed by Handala, an Iran-linked hacktivist group associated with Void Manticore and assessed to have links to Iran’s Ministry of Intelligence and Security (MOIS). 

Stryker operates across 61 countries, employs approximately 56,000 people, and reported annual revenue of around US$25 billion.

Threat actor: Handala 

Handala is known for conducting hack-and-leak and destructive cyber operations, primarily targeting Israeli organisations, but has demonstrated a willingness to target other entities aligned with broader geopolitical objectives. 

The group framed the attack as retaliation for a missile strike on an Iranian school in late February 2026, which reportedly resulted in significant casualties. Stryker was also described by the group as a “Zionist-rooted corporation”, likely referencing its acquisition of Israeli company OrthoSpace in 2019.

How Our SOC Is Responding

Heightened media attention surrounding geopolitical events increases the likelihood of opportunistic targeting, particularly phishing, credential theft attempts, website disruption, and ransomware-style intrusion activity. Our existing 24/7 MDR monitoring posture is designed to detect and alert on this type of activity as standard.

In response to the current escalation, our SOC has implemented several proactive measures aligned to the tactics, techniques, and procedures associated with Iranian-aligned threat groups.

Global disruption across key locations  

The attack was first publicly reported in March 2026 and impacted Stryker’s global operations.

Significant disruption was reported in Ireland, where more than 5,000 employees at Stryker’s Cork facilities were sent home. The company’s US headquarters also declared a building emergency during the incident.

Healthcare providers across the United States reported being unable to order surgical supplies from Stryker, indicating a direct impact on hospital operations and patient care supply chains.

How Microsoft Intune was weaponised 

The attackers are assessed to have gained access to highly privileged administrative accounts, likely through a supply chain or trusted relationship compromise, although the exact initial access vector has not been publicly confirmed.

Rather than deploying traditional malware, the attackers abused Microsoft Intune, a legitimate Mobile Device Management (MDM) platform used by Stryker to manage its global device fleet.

Using this access, they issued remote wipe commands across enrolled devices, resulting in:

  • Wiping of endpoints, servers and mobile devices at scale
  • Forced system resets across the environment
  • Defacement of login screens with Handala branding
  • Potential data exfiltration consistent with hack-and-leak activity

This approach is notable because it leverages native administrative functionality rather than malicious code, allowing the activity to bypass traditional endpoint detection and response controls.

Reports also indicate that personal devices connected to corporate services, such as Microsoft Outlook, were impacted.

Implications for enterprise security

This incident highlights a growing shift towards the abuse of identity and management platforms as a primary attack vector.

By compromising administrative access to MDM infrastructure, attackers can:

  • Execute destructive actions at global scale from a single console
  • Avoid deploying malware or conducting lateral movement
  • Bypass many traditional detection mechanisms

The real-world consequences were immediate. Hospitals across the United States experienced supply chain disruption, demonstrating how cyber-attacks on corporate IT environments can directly affect critical services.

The incident also reinforces the risk associated with over-privileged accounts and insufficient segmentation of administrative access.

Key controls to reduce risk

Organisations using MDM and cloud-based identity platforms should review controls across identity, access, and device management.

Key focus areas include:

  • Enforcing phishing-resistant multi-factor authentication for administrative accounts
  • Implementing just-in-time access and removing standing privileges
  • Segmenting administrative roles to limit global impact
  • Requiring dual authorisation for destructive actions such as remote wipe
  • Monitoring for anomalous administrative activity and bulk device actions
  • Hardening access for third-party providers and supply chain partners
  • Maintaining offline, immutable backups and tested recovery procedures

This attack demonstrates that security controls must extend beyond endpoint protection to include the platforms used to manage and control those endpoints.


Sources and Further Reading

  • KrebsOnSecurity.
    Coverage of the Stryker cyber incident involving the reported large-scale Microsoft Intune device wipe.
    https://krebsonsecurity.com 
  • Irish Examiner
    Coverage of the Stryker-Cork workforce impact.
    https://irishexaminer.com 
  • Palo Alto Networks Unit 42.
    Threat intelligence brief on Iranian cyber operations and the estimated 60 active threat groups involved in the campaign.
    https://unit42.paloaltonetworks.com 
  • MITRE ATT&CK Framework
    A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
    https://attack.mitre.org 
  • Microsoft Intune documentation
    https://learn.microsoft.com/intune

     

Disclaimer: This content is based on open-source reporting and assessed intelligence available as of March 2026. The situation is evolving and details may change. This document is for informational purposes only and does not constitute legal advice.