TL;DR

  • Medical technology giant Stryker Corporation had 200,000+ systems wiped by wiper malware on March 11, 2026
  • Unlike ransomware, wiper malware permanently destroys data—no decryption possible
  • The suspected Iran-linked hacktivist group Handala also stole 50TB of data
  • Recovery from wiper attacks takes weeks to months, even with backups

What Happened to Stryker Corporation?

On March 11, 2026, Stryker Corporation—a major medical device manufacturer employing 56,000 people globally—suffered a catastrophic cyberattack [1]. The attack deployed destructive "wiper" malware that permanently erased data from thousands of employee devices, including laptops, phones, and Windows-based systems managed through Microsoft Intune [2]. Login screens on compromised systems displayed the Handala logo, a symbol associated with the pro-Palestinian hacktivist group believed to have ties to Iran [3].​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌‌‌​​‌‍​‌‌​‌​‌‌‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​​‌​‌‌​‌‍​‌‌‌​‌‌‌‍​‌‌​‌​​‌‍​‌‌‌​​​​‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​​‌​‌‌​‌‍​‌‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌‌​‌‌‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌‌​‌​​‍​

‌‌​‌​​​‍​‌‌​​​‌‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌​‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌​​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​‌‌​​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​

The group claimed responsibility for wiping over 200,000 systems, servers, and mobile devices while extracting 50 terabytes of critical data [4]. Unlike traditional ransomware attacks that encrypt files and demand payment for decryption keys, wiper malware renders data permanently irrecoverable—effectively destroying it beyond retrieval [5].

Stryker's global operations across the United States, Europe, and Asia were crippled. In Ireland alone, where Stryker employs up to 5,000 workers, thousands were unable to perform their duties as the company's Windows environment went offline [6]. The company's stock fell 3–4% following the news as investors assessed the potential long-term operational and reputational impacts [7].​‌‌‌​​‌‌‍​‌‌‌​‌​​‍​‌‌‌​​‌​‍​‌‌‌‌​​‌‍​‌‌​‌​‌‌‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​​‌​‌‌​‌‍​‌‌‌​‌‌‌‍​‌‌​‌​​‌‍​‌‌‌​​​​‍​‌‌​​‌​‌‍​‌‌‌​​‌​‍​​‌​‌‌​‌‍​‌‌​‌‌​‌‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌‌​‌‌‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​‌​​​‍​‌‌​​‌​‌‍​‌‌​​​​‌‍​‌‌​‌‌​​‍​‌‌‌​‌​​‍​‌‌​‌​​​‍​‌‌​​​‌‌‍​‌‌​​​​‌‍​‌‌‌​​‌​‍​‌‌​​‌​‌‍​​‌​‌‌​‌‍​‌‌​​​‌​‍​‌‌‌​‌​‌‍​‌‌‌​​‌‌‍​‌‌​‌​​‌‍​‌‌​‌‌‌​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​‌‌​‌‌​​‍​‌‌​​‌​‌‍​‌‌‌​​‌‌‍​‌‌‌​​‌‌‍​‌‌​‌‌‌‌‍​‌‌​‌‌‌​‍​‌‌‌​​‌‌‍​​‌​‌‌​‌‍​​‌‌​​‌​‍​​‌‌​​​​‍​​‌‌​​‌​‍​​‌‌​‌‌​

Why Wiper Malware Is Different from Ransomware

Ransomware and wiper malware both destroy data availability, but with fundamentally different outcomes. Ransomware encrypts data and holds it hostage, theoretically allowing recovery if victims pay the ransom or possess secure backups. Wiper malware overwrites or deletes data entirely, eliminating any possibility of decryption [8].

This distinction matters for business continuity planning. Ransomware creates an extortion scenario—pay to recover. Wiper malware creates a destruction scenario—rebuild from scratch. The attack on Stryker targeted corporate IT networks rather than medical devices themselves, but the operational impact was equivalent to a physical disaster at every global location simultaneously [9].

Related: Ransomware Gangs Are Now Attacking Backups, Not Just Files

The Geopolitical Angle: Why Your Business Might Be Collateral Damage

The Handala group framed the Stryker attack as retaliation for a U.S. military strike on a school in Minab, Iran, that reportedly killed around 160 people amid escalating U.S.-Iran tensions [10]. While Stryker was specifically targeted—likely due to its global footprint, role in healthcare, and perceived ties to Israel through business dealings—geopolitical cyberattacks increasingly put neutral businesses at risk [11].

This isn't state-sponsored espionage seeking intellectual property. It's geopolitical retaliation using destructive cyberweapons. Your business doesn't need to be involved in defense contracting or critical infrastructure to become collateral damage in a broader conflict [12].

The Recovery Reality: Weeks to Months, Not Days

Stryker reported the breach to Ireland's National Cyber Security Centre and is working with external cybersecurity experts, including Microsoft engineers [13]. But recovery from a wiper attack of this scale is measured in weeks to months, not days. Wiped systems require complete rebuilding from backups or clean installations [14].

For a business with 200,000+ affected systems, this means:

  • Reimaging every compromised device
  • Restoring data from offline backups (assuming they exist and weren't connected during the attack)
  • Rebuilding directories, user permissions, and application configurations
  • Verifying system integrity before returning devices to production

The operational disruption cascades through every function: manufacturing halts, research stops, communications fail, and administrative work grinds to a halt [15].

What Every Business Owner Must Do Right Now

1. Treat Wiper Malware as a Distinct Threat Class

Update your incident response plan to distinguish between ransomware and wiper malware scenarios. Ransomware response involves negotiating with attackers or restoring from backups. Wiper malware response involves immediate isolation to prevent spread and comprehensive system rebuilding [16].

2. Verify Your Backup Strategy Actually Covers Total Data Loss

Ask your IT team: "If every Windows system on our network was wiped tonight, how long would it take to restore operations?" If the answer involves systems that were online and connected to the network during the attack, your backups aren't truly isolated [17].

Immutable backups—backups that cannot be modified or deleted for a fixed period—are now non-negotiable. This includes offline backups that are physically disconnected from the network except during brief update windows [18].

3. Segment Your Network to Limit Blast Radius

Stryker's attack wiped devices across global operations simultaneously because they were connected through centralized management (Microsoft Intune). Network segmentation limits how far an attacker can move laterally and prevents a single point of failure from crippling your entire infrastructure [19].

4. Plan for Extended Operational Disruption

Business continuity planning now assumes multi-week outages for destructive attacks. Identify your critical functions and document manual workarounds. Can you process orders manually? Can you access customer records offline? Can your manufacturing floor operate without IT systems for a week [20]?

FAQ

Wiper malware is more destructive because data cannot be recovered even with payment. Ransomware at least offers the theoretical option of decryption. However, ransomware remains more common because it generates direct profit for attackers. Wiper malware is typically deployed by state-aligned actors seeking destruction rather than financial gain [21].

No. Wiper malware attacks don't offer a payment option to restore data. The attackers' goal is destruction, not extortion. Stryker's only path to recovery is rebuilding from backups or clean installations—a process that will take weeks or months [22].

No cybersecurity measure can prevent all attacks, but defense-in-depth significantly reduces risk. This includes network segmentation, immutable backups, application allowlisting, rapid patching, and endpoint detection capable of identifying malicious data destruction patterns. The goal is to increase attacker cost and reduce blast radius [23].

Yes. While Stryker was targeted for geopolitical reasons, wiper malware increasingly appears in financially motivated attacks and criminal extortion schemes. Any business connected to the internet is vulnerable to destructive malware, regardless of size or industry [24].

References

[1] International Business Times AU, "What is Stryker Cyberattack? Stryker Corporation Hit by Suspected Iran-Linked Cyberattack," International Business Times Australia, March 11, 2026. [Online]. Available: https://www.ibtimes.com.au/what-stryker-cyberattack-stryker-corporation-hit-suspected-iran-linked-cyberattack-1863111

[2] Ibid.

[3] Ibid.

[4] Ibid.

[5] IBM Security, "Cost of a Data Breach Report 2025," IBM, 2025. [Online]. Available: https://www.ibm.com/reports/data-breach

[6] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[7] Ibid.

[8] CISA, "Understanding Ransomware," Cybersecurity and Infrastructure Security Agency, 2025. [Online]. Available: https://www.cisa.gov/stopransomware/understanding-ransomware

[9] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[10] Ibid.

[11] Industrial Cyber, "Cyber retaliation surges after US–Israel strikes on Iran as hacktivists hit governments, defense, critical sectors," Industrial Cyber, March 10, 2026. [Online]. Available: https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/

[12] Ibid.

[13] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[14] Ibid.

[15] Ibid.

[16] NIST, "Computer Security Incident Handling Guide (SP 800-61 Rev. 2)," National Institute of Standards and Technology, 2025. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

[17] Veeam, "2025 Data Protection Report," Veeam, 2025. [Online]. Available: https://www.veeam.com/data-protection-report

[18] Ibid.

[19] CISA, "Network Segmentation," Cybersecurity and Infrastructure Security Agency, 2025. [Online]. Available: https://www.cisa.gov/news-events/news/understanding-and-addressing-network-segmentation

[20] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[21] Flashpoint, "Navigating 2026's Converged Threats: Insights from Flashpoint's Global Threat Intelligence Report," Flashpoint, March 11, 2026. [Online]. Available: https://flashpoint.io/blog/global-threat-intelligence-report-2026/

[22] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[23] NIST, "Computer Security Incident Handling Guide," 2025.

[24] Flashpoint, "Navigating 2026's Converged Threats," 2026.


Your business doesn't have to be the next headline. Book a free cybersecurity consultation at consult.lil.business and we'll show you exactly what to protect first.

TL;DR

  • A company that makes hospital equipment had 200,000 computers wiped clean in one attack
  • The bad guys used "wiper malware"—like pouring bleach on your homework instead of locking it in a box
  • Unlike regular ransomware, this data can't be recovered even if you pay
  • The company will take weeks or months to recover

What Is Wiper Malware? (Think About Your Homework)

Imagine two ways someone could mess with your homework:

Ransomware is like a bully locking your homework in a box and saying, "Give me your lunch money and I'll give you the key." You can't read your homework, but it's still there—you just need to get it back.

Wiper malware is like someone pouring bleach on your homework. It's gone forever. No key, no money, no nothing. You have to redo the whole thing from scratch.

The attack on Stryker Corporation was the bleach kind [1]. A company that makes hospital equipment—like surgical tools and hospital beds—had every single computer, phone, and tablet wiped clean [2]. We're talking 200,000 devices [3]. Imagine if your family's phones, tablets, and computers all went blank at the same time. Now imagine that happening to a whole company with 56,000 employees [4].

Why Didn't They Just Pay to Get Their Data Back?

Here's the scary part: wiper malware attacks don't ask for money. The bad guys aren't trying to get rich—they're trying to break things [5].

In this case, a group called Handala claimed they did it because they were mad about a political conflict happening on the other side of the world [6]. Stryker—a company that helps hospitals—just happened to be a big, important target that would get attention [7].

This is different from most cyberattacks you hear about, where criminals want money. These attackers wanted to cause damage and make headlines [8].

How Long Does It Take to Recover from This?

Think about the last time your computer crashed and you had to restart it. Now imagine every computer at your school had to be completely rebuilt from scratch—that means reinstalling every program, copying every file from backups, and setting everything up again [9].

For Stryker, this will take weeks or months [10]. Thousands of employees can't do their jobs. Factories are stopped. Research is paused. It's like every office in every country closed at once [11].

What Your Parents' Business Can Do to Stay Safe

You can't stop every bad guy, but you can make it much harder for them to cause this much damage. Here's what every business needs:

1. Have Good Backups (Like a Spare Copy of Your Homework)

If your homework gets bleach poured on it, you better have a spare copy. Businesses need backups that are kept separate from their main computers—like keeping a spare house key at a friend's house, not under your doormat [12].

2. Don't Connect Everything to One Network

The reason Stryker lost 200,000 devices at once is that they were all connected through the same system. It's like having all your Christmas lights plugged into one outlet—if one goes bad, they all go out [13]. Smart businesses keep important systems separate so problems can't spread everywhere.

3. Have a Plan for When Things Go Wrong

Your family probably has a plan for what to do if the power goes out. Businesses need the same thing for cyberattacks. What will you do if your computers stop working for a week? Can you still answer phones? Can you take orders on paper? [14]

FAQ

Yes. Any business or person with a computer could be targeted. That's why it's so important to have good backups and security habits, like not clicking on strange links or downloading files from people you don't know [15].

Sometimes attackers target big companies to get attention or make a political point. It's not fair to the people who work there or the hospitals that need the equipment, but that's the world we live in now [16].

In some ways, yes. With ransomware, you might be able to pay to get your files back. With wiper malware, your files are just gone forever. You have to start over completely [17].

If you use a computer for school or at home, follow good security habits: use strong passwords, don't click on weird links, and tell your parents or teacher if something looks wrong. Businesses are just like families—they need everyone to help stay safe [18].

References

[1] International Business Times AU, "What is Stryker Cyberattack? Stryker Corporation Hit by Suspected Iran-Linked Cyberattack," International Business Times Australia, March 11, 2026. [Online]. Available: https://www.ibtimes.com.au/what-stryker-cyberattack-stryker-corporation-hit-suspected-iran-linked-cyberattack-1863111

[2] Ibid.

[3] Ibid.

[4] Ibid.

[5] CISA, "Understanding Ransomware," Cybersecurity and Infrastructure Security Agency, 2025. [Online]. Available: https://www.cisa.gov/stopransomware/understanding-ransomware

[6] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[7] Industrial Cyber, "Cyber retaliation surges after US–Israel strikes on Iran as hacktivists hit governments, defense, critical sectors," Industrial Cyber, March 10, 2026. [Online]. Available: https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/

[8] Flashpoint, "Navigating 2026's Converged Threats: Insights from Flashpoint's Global Threat Intelligence Report," Flashpoint, March 11, 2026. [Online]. Available: https://flashpoint.io/blog/global-threat-intelligence-report-2026/

[9] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[10] Ibid.

[11] Ibid.

[12] Veeam, "2025 Data Protection Report," Veeam, 2025. [Online]. Available: https://www.veeam.com/data-protection-report

[13] CISA, "Network Segmentation," Cybersecurity and Infrastructure Security Agency, 2025. [Online]. Available: https://www.cisa.gov/news-events/news/understanding-and-addressing-network-segmentation

[14] NIST, "Computer Security Incident Handling Guide (SP 800-61 Rev. 2)," National Institute of Standards and Technology, 2025. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

[15] Flashpoint, "Navigating 2026's Converged Threats," 2026.

[16] International Business Times AU, "What is Stryker Cyberattack?" 2026.

[17] CISA, "Understanding Ransomware," 2025.

[18] Flashpoint, "Navigating 2026's Converged Threats," 2026.


Want to make sure your business is ready for anything? Book a free cybersecurity consultation at consult.lil.business—we'll help you protect what you've built.

Ready to strengthen your security?

Talk to lilMONSTER. We assess your risks, build the tools, and stay with you after the engagement ends. No clipboard-and-leave consulting.

Get a Free Consultation