TL;DR
- Iranian-linked hacktivist group Handala attacked medical device maker Stryker on March 11, 2026, using legitimate admin tools to wipe 80,000 devices [1]
- The attack didn't use malware — instead, attackers compromised a Global Administrator account and used Microsoft Intune's remote wipe feature [1]
- Surgeries were delayed, including a 5-year-old's skull implant procedure, after custom implants were stuck in Germany [2]
- Medical devices were unaffected, but employee devices (including personal phones enrolled in corporate networks) were remotely wiped [1]
- This attack exposes the risk of over-privileged cloud accounts and the weaponization of legitimate IT management tools
The Attack That Wiped a Company in Three Hours
On March 11, 2026, between 5:00 and 8:00 a.m. UTC, Stryker Corp. — a $120 billion medical device company — watched helplessly as tens of thousands of devices were erased remotely [1].
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
The attackers didn't deploy ransomware. They didn't steal data for extortion. They use
Free Resource
Weekly Threat Briefing — Free
Curated threat intelligence for Australian SMBs. Active campaigns, new CVEs, and practical mitigations — every week, straight to your inbox.
Subscribe Free →According to investigators, the attack unfolded like this:
- Attackers compromised a privileged administrator account in Stryker's Microsoft 365 environment
- They created a new Global Administrator account
- Using Microsoft Intune, they issued remote wipe commands to nearly 80,000 managed devices
- Employee laptops, phones, and tablets were factory-reset, erasing all corporate data
- Some personal devices enrolled in the company network were also wiped, deleting personal photos, messages, and files [1]
The pro-Iranian hacktivist group Handala claimed responsibility, alleging they wiped "over 200,000 systems, servers, and mobile devices" and stole 50 terabytes of data [1]. Investigators found no evidence of data exfiltration, but the device wiping was all too real.
Related: Third-Party Breaches: Why Vendor Risk Management Matters
No Malware Required: When IT Tools Become Weapons
What makes the Stryker attack particularly concerning is that it didn't exploit a software vulnerability or deploy malicious code. The attackers used legitimate IT management features — exactly as they were designed to work.
Microsoft Intune's remote wipe capability is intended for legitimate purposes:
- Remotely erasing lost or stolen devices
- Wiping corporate data from employee devices during offboarding
- Resetting devices for redeployment
But in the wrong hands, these same features become weapons of mass disruption. According to Microsoft's DART (Detection and Response Team), which is investigating the breach, the attackers had Global Administrator privileges — the highest level of access in Microsoft 365 [1].
This is part of a growing trend. CrowdStrike's 2025 Global Threat Report identifies "adversary-in-the-middle" attacks and the weaponization of legitimate cloud admin tools as top threat vectors, noting that "identity is the new perimeter, and over-privileged accounts are the easiest entry point" [3].
The Human Cost: Surgeries Delayed, Patients Stuck in Limbo
When Stryker's systems went offline, the impact wasn't just on laptops and spreadsheets. It hit patients directly.
Stryker makes surgical robots, custom implants, and medical tools. When their ordering and manufacturing systems were disrupted, hospitals couldn't get the equipment they needed for scheduled surgeries. According to reports:
- A 5-year-old girl in Tennessee named Emmie Forrest had her skull implant surgery rescheduled from March to April because the custom implant was stuck in Germany [2]
- Adam Page, a 42-year-old veterinarian in Boston, was prepped for hip surgery when a nurse told him the procedure couldn't proceed — the required bone graft kit was unavailable [2]
- CommonSpirit Health, one of the largest U.S. hospital systems, rescheduled "a small number" of surgical cases due to the Stryker attack [2]
"You don't think like the war in Iran's going to affect you on a day-to-day basis," Page told reporters. "Maybe some extra gas prices or things like that, but never your health care" [2].
This is the reality of modern geopolitics: cyber conflicts between nations can disrupt healthcare, transportation, and essential services halfway across the world.
The Iranian Angle: Handala and the New Wave of Hacktivism
The Handala group, which claimed responsibility for the Stryker attack, is believed to be linked to Iran [1]. Handala has previously targeted Israeli and Western organizations, aligning with Iranian geopolitical interests.
This isn't state-sponsored cyber espionage in the traditional sense. It's hacktivism — politically motivated hacking intended to send a message or cause disruption rather than steal secrets. But the line between hacktivism and state action is increasingly blurry.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns that Iranian-aligned threat actors have targeted healthcare, transportation, and critical infrastructure sectors since 2024, often using "destructive malware and wiper attacks" [4].
What's different about the Stryker attack is the asymmetry: a small hacktivist group using cloud admin tools caused billions of dollars in operational disruption for a Fortune 500 company, all without developing custom malware.
ISO 27001 SMB Starter Pack — $97
Threat intelligence is one thing — having the policies and controls to respond is another. Get the complete ISO 27001 starter kit for SMBs.
Get the Starter Pack →The Over-Privileged Cloud Account Problem
The Stryker attack reveals a fundamental weakness in how many organizations secure their cloud environments: excessive administrative privileges.
According to a 2025 report by Varonis, 63% of companies have more than 1,000 sensitive files open to every employee, and the average Global Admin account in Microsoft 365 has access to 17 million files [5]. More alarmingly, 40% of organizations have at least 10 Global Admin accounts — far more than needed for operational continuity [5].
The principle of least privilege — a cornerstone of cybersecurity frameworks like NIST 800-53 and ISO 27001 — states that users should have only the minimum access necessary to do their jobs. But in cloud environments, overly permissive defaults and convenience often win out over security.
Microsoft recommends that organizations:
- Limit Global Admins to 2-4 people maximum
- Use Privileged Identity Management (PIM) for just-in-time access
- Implement separate admin accounts for administrative tasks
- Require multi-factor authentication (MFA) for all privileged roles [6]
Yet many organizations fail to implement these basic safeguards, leaving the door open for attacks like Stryker's.
Why Healthcare and MedTech Are Prime Targets
Stryker isn't the first healthcare-related company to be targeted, and it won't be the last. The healthcare sector faces unique pressures that make it attractive to attackers:
Time sensitivity: Unlike retail or entertainment, healthcare disruptions directly affect patient outcomes. When surgeries are delayed, people suffer. This creates pressure to pay ransoms or negotiate, even for ideologically motivated attackers.
Complex supply chains: Medical devices, implants, and surgical kits involve multiple vendors, manufacturing sites, and distribution channels. Disrupting one node in the chain has cascading effects.
Regulatory and reputational risk: Healthcare companies are heavily regulated, and cyber incidents can draw FDA, HHS, and DOJ scrutiny. The reputational damage from a breach can last for years.
Legacy systems and IoT: Medical devices often run on outdated software with limited patch capabilities, creating persistent vulnerabilities. The FDA's 2025 guidance on medical device cybersecurity emphasizes that "healthcare delivery organizations and device manufacturers share responsibility for securing the medical device ecosystem" [7].
According to IBM's 2025 Cost of a Data Breach Report, healthcare has had the highest average breach cost for 14 consecutive years — $9.77 million per incident in 2025, more than double the cross-industry average [8].
How to Protect Your Organization From Cloud Admin Weaponization
The Stryker attack was sophisticated, but the defensive measures are straightforward. Here's how to reduce your risk:
1. Audit and Reduce Privileged Accounts
- Identify all Global Admins and privileged role holders in your cloud environment
- Remove unnecessary admin assignments
- Aim for 2-4 Global Admins maximum
- Use separate accounts for admin tasks (don't use your daily account for admin work)
2. Implement Just-In-Time Access
- Use Azure Privileged Identity Management (PIM) or equivalent for your cloud platform
- Require approval and time-bound access for privileged roles
- Log all privileged access attempts
3. Enforce MFA Everywhere
- Multi-factor authentication should be required for all user accounts, especially admins
- Use phishing-resistant MFA methods (FIDO2, hardware keys) for privileged accounts
- Conditional access policies can block logins from unrecognized locations or devices
4. Monitor for Anomalous Admin Activity
- Set up alerts for unusual admin actions: bulk user creation, mass role changes, remote wipe commands
- Implement Session Border Controllers (SBC) or Cloud Access Security Broker (CASB) solutions
- Use Microsoft Sentinel or similar SIEM to detect attack patterns
5. Plan for the Worst
- Assume attackers will get in — focus on detection and containment
- Test your backup and restoration procedures regularly
- Create incident response playbooks specific to cloud admin attacks
- Consider cyber insurance that covers business interruption from cloud outages
6. Separate Personal and Corporate Data
- Stryker employees lost personal data because their personal phones were enrolled in corporate mobile device management (MDM) [1]
- Use containerization solutions (separate corporate/personal profiles on devices)
- Educate employees about the risks of enrolling personal devices in corporate management
The Bottom Line: Your Cloud Tools Are Double-Edged Swords
The Stryker attack is a wake-up call. The same cloud management tools that enable remote work, automated device management, and operational efficiency can be weaponized against you if attackers gain privileged access.
This isn't a reason to abandon the cloud. It's a reason to secure it properly. The businesses that thrive in the current threat landscape won't be the ones with the most sophisticated technology — they'll be the ones that implement security fundamentals: least privilege, MFA, monitoring, and incident response.
Your cloud admin accounts are the keys to your kingdom. Treat them that way.
FAQ
Microsoft Intune is a cloud-based endpoint management platform that allows organizations to manage and secure devices (laptops, phones, tablets) remotely. Features include remote wipe, app deployment, compliance policies, and conditional access. It's part of the Microsoft 365/Enterprise Mobility + Security (EMS) suite.
A wiper attack is a type of destructive malware or command that erases data from systems, making recovery difficult or impossible. Unlike ransomware, which encrypts data for extortion, wiper attacks are purely destructive. The Stryker attack was unique because it used Intune's legitimate remote wipe feature instead of deploying wiper malware.
Handala is a pro-Iranian hacktivist group that has claimed cyberattacks against Israeli and Western organizations since 2024. The group's name references a Palestinian nationalist symbol. Handala typically uses destructive tactics like wiper attacks rather than espionage or financial theft.
According to Stryker, investigators found no evidence that patient data or medical records were stolen [1]. The attack focused on wiping corporate devices and disrupting operations. However, the company's full investigation is ongoing, and the impact on sensitive healthcare data remains a concern.
Start by running the Microsoft Secure Score assessment in your Microsoft 365 admin center. Check how many Global Admins you have (should be 2-4 maximum), verify MFA is enabled for all privileged accounts, and review sign-in logs for suspicious activity. Consider engaging a Microsoft partner for a security assessment if you're unsure.
References
[1] "Stryker attack wiped tens of thousands of devices, no malware needed," PRSOL:CC, 22 Mar. 2026. [Online]. Available: https://www.prsol.cc/2026/03/22/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
[2] Bloomberg, "Stryker cyberattack delays some surgeries," The Boston Globe, 21 Mar. 2026. [Online]. Available: https://www.bostonglobe.com/2026/03/21/nation/stryker-cyberattack-delays-some-surgeries/
[3] CrowdStrike, "2025 Global Threat Report," CrowdStrike, 2025. [Online]. Available: https://www.crowdstrike.com/global-threat-report
[4] Cybersecurity and Infrastructure Security Agency, "Iranian Cyber Threat Actors Targeting U.S. Healthcare and Critical Infrastructure," CISA, 2025. [Online]. Available: https://www.cisa.gov/news-events/alerts
[5] Varonis, "2025 Data Risk Report," Varonis, 2025. [Online]. Available: https://www.varonis.com
[6] Microsoft, "Best practices for securing Microsoft 365," Microsoft Learn, 2025. [Online]. Available: https://learn.microsoft.com/en-us/microsoft-365/compliance/best-practices
[7] U.S. Food and Drug Administration, "Cybersecurity for Medical Devices and Health IT," FDA, 2025. [Online]. Available: https://www.fda.gov/medical-devices/digital-health-center-excellence
[8] IBM Security, "Cost of a Data Breach Report 2025," IBM, 2025. [Online]. Available: https://www.ibm.com/reports/data-breach
The Stryker attack shows how legitimate IT tools can become weapons in the hands of attackers. When cloud admin accounts are compromised, the damage isn't just data theft — it's operational disruption that affects real people. Don't wait for a crisis to audit your privileged access. Secure your cloud environment with expert help from consult.lil.business.
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- A company called Stryker makes medical tools and robots that help doctors during surgeries
- Hackers from another country attacked Stryker's computers and used a special feature to reset 80,000 devices — like pressing a "delete everything" button from far away [1]
- Because of this attack, some kids and adults who needed surgeries had to wait longer, including a 5-year-old girl named Emmie [2]
- The hackers didn't use a virus — they used a tool that was meant to help companies manage their devices
- This story teaches us why we need to be careful with who has control over important computer systems
What Is Stryker and What Do They Make?
Imagine you're playing with LEGO bricks. You build a cool castle, but then you realize you need one special piece to finish it — a piece you don't have.
Now imagine that instead of a LEGO castle, it's a doctor trying to help a patient. And instead of a missing LEGO piece, it's a special medical implant that needs to be made exactly right for that person's body.
This is what Stryker does. They make:
- Surgical robots that help doctors do operations more precisely
- Custom implants like hip joints and skull pieces that are made specially for each patient
- Medical tools that surgeons use during operations
These are important, life-saving things. When Stryker's computers work right, doctors get what they need to help people. When the computers don't work, patients have to wait.
Related: Why Your Personal Information Matters
What Happened on March 11, 2026?
On March 11, 2026, something bad happened to Stryker's computers. Hackers broke into their computer system.
These hackers were from a group called Handala, and they wanted to cause problems for Stryker because they were angry about political things happening in the world.
But here's the weird part: the hackers didn't use a virus or malware. Instead, they found a way to use a tool that was already built into Stryker's computers.
Think of it like this: imagine your school has a PA system (the speakers that make announcements). The principal uses it to tell everyone important news. But what if a student figured out how to use the PA system and started saying silly things? They wouldn't be breaking the speakers — they'd be using the speakers the wrong way.
That's what the hackers did. They used a tool called Microsoft Intune, which is supposed to help companies manage all their computers and phones. One thing Intune can do is remotely reset devices — like if someone loses their work phone, the company can erase all the company's information from it.
The hackers figured out how to get into Stryker's Intune system. Then they pressed the "reset" button on about 80,000 devices all at once [1]!
Poof! Just like that, laptops, tablets, and phones were wiped clean. All the work, all the files, all the information — gone.
Why This Hurt Real People
You might think, "Okay, so some computers got reset. That's annoying, but is it really that bad?"
Yes. It's really bad, because it affected real people who needed medical help.
When Stryker's computers were wiped, they couldn't make new medical implants. They couldn't ship out the tools that hospitals had ordered. Their whole system for making and delivering medical equipment stopped working.
Here's one sad story: a 5-year-old girl named Emmie needed surgery to fix part of her skull that had been hurt in an accident [2]. She was supposed to get a special implant made by Stryker. But because of the hacker attack, the implant was stuck in Germany and couldn't be delivered. Her surgery had to be postponed for a whole month [2].
Imagine how scary that would be — you're all ready for surgery, and then you find out you have to wait even longer because of some hackers.
Other people were affected too. A man named Adam was already at the hospital, prepped and ready for hip surgery, when the nurses told him they couldn't do it — the special tool they needed wasn't available because of the cyberattack [2].
This is the important lesson: cyberattacks don't just hurt computers. They can hurt people.
How Did the Hackers Get In?
The hackers didn't break down a door or pick a lock. They did something simpler: they guessed or stole the password for a very important account.
In computer systems, there are different levels of access:
- Regular users can do normal things like write documents and send emails
- Administrators (or "admins") can change settings, add new users, and control how the system works
Stryker had administrator accounts that could control their whole Microsoft system — including the Intune tool that can reset devices. The hackers figured out how to get into one of these super-powerful accounts.
Once they had access to an admin account, they could do anything they wanted — including resetting all those devices.
It's kind of like if someone found the master key to your school. With that one key, they could open any classroom, any office, any locker. That's what an admin account is like — a master key for the computer system.
Why This Matters: The Tools We Build Can Be Used Against Us
This story teaches us something important about technology.
We build tools to help us. Microsoft Intune was built to help companies manage their devices. Remote wipe was built to help companies protect their information if a device is lost.
But any tool can be used for bad things if the wrong person gets control of it.
Think about a hammer. A hammer is great for building things — you can use it to hammer nails, build a birdhouse, fix a fence. But someone could also use a hammer to break something.
The tool isn't good or bad. What matters is who controls it and how they use it.
This is why cybersecurity is so important. It's not just about having good tools. It's about making sure the right people control those tools, and that the wrong people can't get access.
What Companies Can Learn From This
After the Stryker attack, lots of companies looked at their own computer systems and asked, "Could this happen to us?"
Smart companies are now:
- Being careful with admin accounts — Only a few people should have the "master keys" to the system
- Using extra protection — Like requiring a special code sent to a phone (called two-factor authentication) for important accounts
- Watching for strange activity — If suddenly 80,000 devices start getting reset at 3 in the morning, that should set off alarms!
- Planning for problems — Having backup plans in case computers stop working
Related: How AI Is Changing Cybersecurity
What You Can Do to Stay Safe
You might not run a big company, but you can still learn from this story:
1. Protect Your Accounts
- Use strong passwords that are hard to guess (long phrases are good!)
- Don't share your passwords with friends
- If a website or game offers two-factor authentication (where they send a code to your phone), use it!
2. Be Careful What You Download
- Only download apps and games from official stores
- Don't click on weird links in emails or messages, even if they look like they're from friends
3. Tell an Adult If Something Seems Wrong
- If your computer starts acting strange — programs opening by themselves, files disappearing — tell a parent or teacher
- If you see something online that worries you, speak up
4. Remember: Technology Is a Tool
- Computers, phones, and the internet are amazing tools that help us learn, create, and connect
- But we need to use them carefully and protect them from people who want to cause trouble
The Big Lesson
The Stryker attack is a complicated story with lots of technical details. But the big lesson is simple:
The things we build to help us can be used against us if we're not careful.
We need smart people who understand computers and cybersecurity to protect important systems — especially the ones that help hospitals, doctors, and patients.
Maybe one day, that could be you! The world needs people who understand how to keep computers safe so that doctors can help people, kids can get the surgeries they need, and hackers can't cause trouble.
Fun Activity: Design Your Own Secure System
Think about something important you use every day — maybe your school locker, your email account, or a game you play. How would you design it to be really secure?
- Who would have the "master key"?
- What would you do if someone lost their key/password?
- How would you make sure only the right people can get in?
Draw a picture or write about your secure system. Learning to think about security now will help you stay safe in the future!
FAQ
Microsoft Intune is a tool that helps companies manage lots of computers and phones all at once. It's like a remote control for devices — companies can use it to install apps, update software, and yes, even reset devices if they're lost or stolen. Think of it like a teacher who can control all the tablets in a classroom from one computer.
A wiper attack is when hackers erase all the information on a computer. It's like taking a whiteboard and wiping it clean — everything that was written there is gone. The Stryker attack was a wiper attack because the hackers used Intune's reset feature to erase all the data on Stryker's devices.
Sometimes hackers do it for money (like ransomware). Sometimes they do it to steal information. And sometimes they do it to make a political point — they're angry about something happening in the world, so they attack companies from countries they disagree with. The group that attacked Stryker was mad about political things, so they wanted to cause problems.
Thankfully, no one died or was physically injured. But some people had to wait longer for their surgeries, which was scary and frustrating. A 5-year-old girl named Emmie had to wait a whole extra month for her surgery [2]. That's why cybersecurity in healthcare is so important — real people are affected when things go wrong.
Ask your librarian or computer teacher about resources! Websites like Cyber.org for Kids have fun activities and games. You can also learn about coding and how computers work — understanding technology is the first step to protecting it!
References
[1] "Stryker attack wiped tens of thousands of devices, no malware needed," PRSOL:CC, 22 Mar. 2026. [Online]. Available: https://www.prsol.cc/2026/03/22/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
[2] Bloomberg, "Stryker cyberattack delays some surgeries," The Boston Globe, 21 Mar. 2026. [Online]. Available: https://www.bostonglobe.com/2026/03/21/nation/stryker-cyberattack-delays-some-surgeries/
Cyberattacks don't just hurt computers — they can hurt real people, including kids who need medical care. That's why cybersecurity is so important, especially for hospitals and healthcare companies. Want to help protect the systems that keep people safe? Learn more about cybersecurity at consult.lil.business.