245% and Rising: The Iran Cyber Threat the Government and Researchers Can't Agree On

On February 28, 2026, the United States and Israel launched Operation Epic Fury — a coordinated strike campaign that eliminated Iran's Supreme Leader Ali Khamenei and senior IRGC and security officials. Within hours, more than 60 Iranian-aligned hacktivist groups had activated on Telegram. Within days, a Fortune 500 medical device company operating in 61 countries had been gutted from the inside — without a single piece of malware.

Since then, researchers and the U.S. government have been looking at the same threat landscape and arriving at measurably different conclusions. That gap matters for every organization trying to decide how much to worry right now.

The 245% Figure: What It Actually Measures

The number that has dominated headlines since mid-March comes from Akamai, whose threat intelligence team tracked cybercriminal and hacktivist activity in the first two weeks after Operation Epic Fury began. According to their published report, cyberattacks targeting critical businesses and institutions across North America, Europe, and parts of Asia-Pacific spiked by 245% compared to pre-conflict baselines. Akamai's telemetry broke down the component attack categories in specific terms: botnet-driven discovery traffic jumped 70%, automated reconnaissance traffic rose 65%, widespread scanning of exposed services and infrastructure climbed 52%, credential harvesting attempts increased 45%, and DDoS-preparatory reconnaissance spiked 38%. Akamai also documented an unnamed U.S. financial services company that blocked 13 million attack packets originating from Iran over the preceding 90-day period, with a single-day peak of over 2 million packets on February 9 — before the strikes even began — followed by additional spikes when the conflict started.

Akamai's March 2026 report found that geopolitically motivated hacktivists were routing billions of attack attempts through proxy infrastructure in Russia and China to obscure their true origin. — Akamai Threat Intelligence, March 2026

Banking and financial services organizations absorbed the largest share of targeting, with financial services and e-commerce combined accounting for over half of all attack destinations. What is particularly notable in Akamai's findings is the geographic attribution of source IP addresses: Iran itself accounted for only 14% of the IPs used in attacks — well behind both Russia at 35% and China at 28%. Researchers attributed this pattern to attackers routing traffic through proxy infrastructure in countries with more permissive enforcement, rather than operating directly from Iranian networks.

That last point is not a minor technical footnote. It is central to why the government's assessment and the private sector's assessment have diverged so sharply. Attribution by IP address alone would suggest Russia and China as the primary aggressors — while the operational intent and direction is Iranian.

Context

A separate Radware report documented a 700% spike in cyberattacks targeting Israel specifically during the earlier 12-day Israeli-Iranian war in June 2025. Researchers say elements of that same ecosystem are now reactivating at a broader, more global scale following the February 2026 escalation.

Where the Government Stands — and Where It Has Contradicted Itself

U.S. intelligence and law enforcement have maintained publicly that, while elevated alert postures are in place, they have not identified a "coordinated campaign of high-consequence malicious cyber activity" directly attributable to the Iranian government that has successfully compromised the U.S. homeland at a systemic level. The Department of Homeland Security Secretary Kristi Noem said in a statement that DHS is working with federal intelligence and law enforcement partners to "closely monitor and thwart" any potential threats. House Homeland Security Committee Chairman Rep. Andrew Garbarino echoed the concern but framed it in terms of readiness rather than confirmed breaches, stating that Iran-backed actors "continue to pose a serious threat to the United States and our allies, from probing our water utilities to running influence operations."

The White House position has been less consistent. Press Secretary Karoline Leavitt said publicly in early March that "no such threat from Iran to our homeland exists, and it never did," posted on X in response to an ABC News report about the FBI warning California police departments of potential Iranian drone threats. Days later, when National Counterterrorism Center Director Joe Kent resigned on March 16 — publicly stating that Iran "posed no imminent threat" to the U.S. and that the war was initiated "due to pressure from Israel and its powerful American lobby" — Leavitt reversed course and defended the administration's claim that Iran posed "strong and compelling evidence" of a threat. Kent's public break with the administration is highly unusual given his position at the center of the government's threat assessment apparatus.

"The commander-in-chief determines what does and does not constitute a threat." — White House Press Secretary Karoline Leavitt, March 17, 2026

This internal contradiction is not merely a political story. It creates a genuine information vacuum for organizations trying to calibrate defensive investments. When official government channels send conflicting signals about threat severity, private sector security teams are left to rely more heavily on commercial threat intelligence — which, as the 245% figure illustrates, is telling a considerably more alarming story.

The Stryker Incident: What Actually Happened

On March 11, 2026, the Handala hacking group — a hacktivist persona with documented ties to Iran's Ministry of Intelligence and Security (MOIS) — claimed responsibility for what it described as "an unprecedented blow" to Michigan-based medical device giant Stryker. The attack is widely assessed as the first major pro-Iranian cyberattack against a U.S. company since the war began.

Stryker, which reported over $25 billion in revenue for 2025 and employs approximately 56,000 people across 61 countries, confirmed a "global network disruption to our Microsoft environment." The company stated it found no evidence of ransomware or malware — a detail that initially seemed reassuring but turned out to explain something more unsettling about how the attack was executed.

According to reporting from TechCrunch, Bleeping Computer, and the Wall Street Journal, Handala appears to have compromised an internal Stryker administrator account, gaining near-unlimited access to the company's Windows network. The hackers then allegedly accessed Stryker's Microsoft Intune dashboard — a mobile device management platform that allows administrators to remotely wipe employee laptops and phones if they are lost or stolen. By triggering that built-in feature at scale, the attackers reportedly wiped approximately 80,000 devices across Stryker's global offices between 0500 and 0800 UTC on March 11, forcing offices in 79 countries to shut down. No malware was needed because they used the company's own administrative infrastructure against it.

Mapped against the MITRE ATT&CK framework, the Stryker operation traces a clean line across five techniques. Check Point documented hundreds of brute-force and credential-stuffing attempts against VPN infrastructure in the months before the attack — that is T1110 (Brute Force) and T1110.004 (Credential Stuffing). Once inside, the attackers created a new Global Administrator account: T1136.003 (Create Account: Cloud Account). They then leveraged legitimate administrative tooling — the Intune console itself — to execute the destructive phase, which maps to T1072 (Software Deployment Tools). The mass wipe is T1485 (Data Destruction). Throughout, the attackers maintained access using stolen valid credentials and commercially available VPN nodes to blend into normal traffic patterns: T1078 (Valid Accounts) and T1090 (Proxy). No custom implant touched any device. Every step exploited either a legitimate platform feature or a credential the organization itself had provisioned.

Attack chain — Handala / Stryker, March 11, 2026
STAGE 1 Initial Access Admin credential theft STAGE 2 Privilege Escalation New Global Admin created STAGE 3 Intune Compromise MDM dashboard accessed STAGE 4 Mass Device Wipe ~80,000 devices wiped STAGE 5 Global Shutdown 79 countries, no malware
Handala's attack on Stryker bypassed traditional endpoint detection by weaponizing Microsoft Intune's native device wipe functionality. No malware was deployed at any stage.

Handala claimed to have wiped over 200,000 systems, servers, and mobile devices and to have exfiltrated 50 terabytes of data. The device count is almost certainly inflated — BleepingComputer's reporting, sourced from a person with direct knowledge of the investigation, confirmed approximately 80,000 devices wiped between 0500 and 0800 UTC. Critically, investigators found no indication that any data was actually exfiltrated, contradicting Handala's 50TB claim. The group has a documented pattern of exaggerating breach claims for psychological and operational impact; Palo Alto Networks has assessed the group as "opportunistic and velocity-focused," timing public disclosures to maximize psychological pressure on targets. Stryker's shares fell by roughly 3% when the Wall Street Journal first reported the breach, with further losses in subsequent trading sessions as the scope of the disruption became clearer. The operational impact was global regardless of the precise device count. Approximately 5,500 employees at Stryker's largest hub outside the United States — in Ireland, where the company has eight sites across Cork, Limerick, and Belfast — were sent home as internal networks went offline. A voicemail at the company's headquarters in Portage, Michigan stated the company was dealing with a "building emergency."

Maryland's Institute for Emergency Medical Services Systems notified hospitals statewide on March 11 that Stryker's Lifenet electrocardiogram transmission system — used by EMS providers to relay cardiac patient data to receiving hospitals before arrival — had been reported non-functional across much of the state. The state's EMS medical director, Dr. Timothy Chizmar, wrote in the notice that, as a precaution, some hospitals had temporarily suspended connections to Stryker systems including LIFENET, while others maintained them. Stryker subsequently clarified in a March 15 update that Lifenet "remained fully functional and was not disrupted by the cyber incident" — a statement that conflicts with the Maryland notice, and suggests the disruption, whatever its root cause, had real-world consequences for at least a portion of EMS workflows that day. The discrepancy between Maryland's initial report and Stryker's later denial has not been publicly resolved.

Rafe Pilling, Director of Threat Intelligence at Sophos, described Intune as a platform designed for remote device management — including the ability to wipe lost or stolen devices — and assessed that the attackers had triggered that feature across enrolled devices at scale. — Rafe Pilling, Sophos
Cybersecurity expert Joshua Corman, speaking to CNN on March 11, 2026, argued that the industry has been over-indexed on financially motivated threats while systematically underweighting the destructive potential of nation-state adversaries — China, Iran, and Russia among them — that have the means, motive, and opportunity to cause severe disruption. — Joshua Corman, CNN

Handala's statement, posted to Telegram and X, declared: "We announce to the world that, in retaliation for the brutal attack on the Minab school and in response to ongoing cyber assaults against the infrastructure of the Axis of Resistance, our major cyber operation has been executed with complete success." The Minab reference is to the February 28 missile strike on the Shajareh Tayyebeh girls' elementary school in Minab, Hormozgan province in southern Iran. Death toll figures vary across reporting organizations: Iranian authorities stated approximately 165–168 people were killed, the town's mayor reported 168, and some sources citing local and provincial officials put the figure as high as 175–180. The victims were primarily schoolgirls between ages 7 and 12. Investigations by The New York Times, NPR, the BBC, and CBC concluded that a U.S. Tomahawk missile was responsible. A Pentagon preliminary inquiry found the strike was likely perpetrated by the U.S., and a formal investigation is ongoing. The White House has not acknowledged responsibility.

Palo Alto Networks links Handala to Iran's MOIS, identifying it as one of several hacktivist personas maintained by a MOIS-affiliated actor known as Void Manticore. Check Point Research independently confirmed the attribution. That matters: Stryker was not hit by an independent group acting on principle, but by what researchers assess as a state intelligence apparatus operating through a layer of plausible deniability. Handala also cited Stryker's 2019 acquisition of Israeli medical device company OrthoSpace as a basis for targeting the firm — a signal that any company with Israeli business ties, acquisitions, or partnerships may be in scope.

Why "No Malware" Is the Most Dangerous Part

Stryker confirmed no ransomware or malware was found. Many security teams initially heard that as reassurance. It should have read as a warning.

Traditional endpoint detection and response (EDR) tools are built around signatures, behavioral heuristics, and process anomalies that indicate malicious code executing on a machine. When an attacker uses T1072 (Software Deployment Tools) — weaponizing a legitimate platform like Microsoft Intune — they are operating entirely within the trust envelope the organization itself established. There are no suspicious executables. No lateral movement artifacts from an unfamiliar process. No command-and-control callbacks that a network monitoring tool would flag. From the perspective of every security product Stryker had deployed, a Global Administrator used Intune to wipe devices. That is precisely what Global Administrators are supposed to be able to do.

This is the detection problem that lives-off-the-land (LotL) attacks create. The MITRE ATT&CK framework specifically tracks this pattern under T1218 (System Binary Proxy Execution) and related sub-techniques — not because binaries were involved here, but because the underlying logic is identical: use a trusted, pre-authorized system component to execute a destructive function, and generate no alert because the tool is behaving exactly as designed. The security question the Stryker attack forces every security operations center to ask is not "would our EDR have caught this?" — the answer is almost certainly no. The question is: do we log and alert on administrative actions in our MDM platform the same way we would on a suspicious endpoint process? For the majority of organizations, the answer is also no.

This is compounded by alert fatigue at scale. A security team monitoring a 56,000-employee global enterprise on Intune would see thousands of device management events daily. The signal that 80,000 wipe commands were issued at 5:00 AM UTC was not technically hidden — it was loud. The question is whether the alerting infrastructure was configured to treat mass wipe commands as an anomaly requiring real-time intervention, or whether that kind of activity had no threshold set at all.

The BYOD Wipe: Who Actually Lost What, and Who Pays

The article has not yet addressed what is arguably the sharpest edge of the Stryker attack for individual employees: Stryker operated a bring-your-own-device (BYOD) program. When Handala triggered the mass wipe through Intune, every personally-owned device enrolled in that program was wiped alongside corporate-issued hardware. That means personal photographs. Banking applications. Authenticator apps storing MFA tokens for personal accounts. Medical records. Family communications spanning years.

This raises questions the industry has not answered cleanly, and that are now live in the Stryker incident specifically. When a company's MDM policy extends to employee personal devices and an attacker destroys those devices' contents, who bears legal liability? Stryker's BYOD enrollment almost certainly included terms granting the company the technical right to wipe enrolled devices — that is standard MDM policy language. But "the right to wipe a lost device" and "the right to accept unlimited liability exposure in the event of an attacker triggering a mass wipe" are not the same clause. Labor attorneys and cybersecurity insurance carriers are going to be working through this for months. Organizations that have not re-read their BYOD enrollment agreements through the lens of a hostile MDM compromise should do so before another attacker discovers the same vector.

The secondary consequence is MFA token destruction. Any employee who stored their authenticator application on a BYOD device that was wiped lost their second factor for every personal and professional account it was protecting — at the same time their corporate access was destroyed. That is an extraordinarily disruptive event at the individual level. It also means that, in the hours immediately following the wipe, a large population of Stryker employees had degraded authentication posture across their personal accounts. Whether any downstream account takeover activity occurred has not been publicly reported. It should be investigated.

Pre-Positioning: The Attack That Started Months Earlier

One element of the Stryker incident that has received less coverage than the wipe itself is what the timeline reveals about dwell time. Check Point Research published analysis showing that initial access at Stryker is believed to have been established well before March 11 — the destructive phase was not the beginning of the intrusion, it was the conclusion. Researchers identified hundreds of logon and brute-force attempts against Stryker VPN infrastructure originating from commercial VPN nodes and, after Iran's January 2026 internet shutdown began, from Starlink IP ranges — a deliberate effort to blend into legitimate satellite traffic and evade geolocation-based detection.

This matters for threat modeling. Organizations evaluating their current exposure should not be asking only whether they have been compromised since February 28. They should be asking whether they were pre-positioned before February 28 — and whether any of that access is still active. Nation-state actors routinely establish footholds inside target organizations during lower-tension periods and then activate them when a geopolitical trigger is reached. The Stryker attack is a documented example of exactly that operational pattern.

The Two-Tier Threat Ecosystem: State Actors and the Hacktivist Layer

Understanding what is actually happening in the current cyber environment requires distinguishing between two distinct but overlapping tiers of activity.

The first tier consists of Iran's formal state cyber units: the IRGC Cyber-Electronic Command (IRGC-CEC), which has historically focused on ICS and operational technology targeting, and the Ministry of Intelligence and Security (MOIS), responsible for espionage, hack-and-leak operations, and the destructive wiper attacks that have characterized Iranian offensive cyber operations since at least 2012. Key APT groups in this tier include MuddyWater, OilRig, APT33 (also known as Elfin or Refined Kitten), APT34, and UNC1549. APT33 specifically targets aerospace, energy, and government sectors through supply chain attacks and password spraying. Nozomi Networks telemetry documented systematic increases in alerts from these groups in the manufacturing and transportation sectors during the earliest days of the conflict.

There is, however, a significant complication with this tier. Iran has been operating under a near-total self-imposed internet blackout since February 28 — connectivity dropped to approximately 1 to 4 percent of normal levels, confirmed by NetBlocks, and as of March 17, Iranians had spent more than one-third of 2026 in near-total digital darkness. BeyondTrust analysts assessed that this blackout, while imposed by the regime to prevent inbound cyberattacks and internal dissent, has also degraded the ability of state cyber units to coordinate and execute sophisticated operations. In a March 2026 advisory, BeyondTrust wrote that state-aligned cyber units may be operating in isolation, potentially causing their tactics to deviate from previously established patterns.

The second tier — and the one generating the bulk of the observed activity — is the globally distributed hacktivist proxy network. As of late March, researchers have documented over 60 hacktivist groups active in response to the conflict, with Palo Alto Networks Unit 42 senior manager Justin Moore confirming a significant uptick in pro-Russian hacktivists formally joining the Iranian coalition. This is expanding the attack surface and introducing high-disruption tactics from groups with historical experience targeting NATO and European interests. Handala is the highest-profile actor in this tier. Check Point Research published analysis confirming that Handala deploys the Rhadamanthys infostealer alongside traditional wipers against targets, and that the group's operational pattern prioritizes speed over stealth — compromising lower-security systems, often through supply-chain footholds in IT service providers, exfiltrating data, and timing public disclosures for maximum psychological impact.

What Rhadamanthys Does — and Why It Matters Here

Rhadamanthys is a commodity infostealer sold on criminal underground markets. It is not a sophisticated custom implant — it is an off-the-shelf credential harvesting tool that any operator with a few hundred dollars and a Telegram account can obtain. It targets browser-stored credentials, session cookies, cryptocurrency wallets, VPN configuration files, and authentication tokens. What makes its presence in Handala's toolkit significant is the operational combination: Rhadamanthys collects credentials and access material from compromised systems, and that harvested material feeds the next operation — including brute-force campaigns against VPN infrastructure like the ones Check Point documented at Stryker (T1555.003 — Credentials from Web Browsers, T1539 — Steal Web Session Cookie). The infostealer is not the endgame. It is the reconnaissance and access-supply layer for subsequent destructive operations. Its classification within MITRE ATT&CK as a credential access tool spanning T1555 (Credentials from Password Stores) and T1606 (Forge Web Credentials) understates the operational risk, which is not "someone's password got stolen" but "an attacker now holds session tokens that bypass MFA for cloud administrative consoles."

The Supply Chain Question Nobody Is Asking Loudly Enough

Unit 42 assessed Handala's operational pattern as specifically targeting IT service providers and managed service providers as footholds to reach downstream victims (T1199 — Trusted Relationship). That is not a new observation — supply chain and MSP attacks have been the dominant lateral movement strategy in nation-state operations since at least the SolarWinds incident in 2020. What is new is the combination of context: an active kinetic conflict, over 60 hacktivist groups actively seeking targets of opportunity, AI-assisted reconnaissance lowering the barrier to ICS and enterprise targeting, and a CISA operating at reduced capacity. In that environment, the supply chain risk calculus changes substantially.

The specific question that is not being asked loudly enough is this: which managed service providers currently hold administrative access — including MDM administrative access — to organizations in sectors that Handala and allied groups have assessed as targets? Healthcare, financial services, defense industrial base, logistics, and utilities have all been named in advisory documents and threat intelligence reporting. If an MSP holds a privileged Intune or Jamf administrative credential for a hospital system, and that MSP was pre-positioned by a Rhadamanthys campaign in the months before February 28, the downstream hospital has no direct visibility into that exposure. It does not appear in its own threat surface audit. This is the attack vector that the Stryker incident should prompt every organization to think about — not just "are our own admin accounts protected?" but "which third parties hold keys to our administrative infrastructure, and what is the security posture of those third parties?"

The MITRE ATT&CK matrix captures this under T1199 (Trusted Relationship) and T1078.004 (Valid Accounts: Cloud Accounts) — but the defensive conversation in the industry is still framing this primarily as an internal credential hygiene problem. The Stryker incident suggests the initial access vector may have been internal. It equally may have been through a supplier or service provider. That distinction matters enormously for where organizations should focus their immediate detection investment.

A potentially significant development involves Handala's command structure. On March 2, 2026, Iran International reported that Israeli strikes on the MOIS headquarters eliminated Seyed Yahya Hosseini Panjaki, the MOIS deputy intelligence minister assessed by BeyondTrust to have led the Handala, Karma Below, and Homeland Justice personas. Panjaki was sanctioned by the U.S. Treasury in September 2024. If confirmed, the loss of his oversight could mean Handala's operations become less disciplined — but researchers also noted that Check Point found the group using Starlink IP ranges during Iran's January 2026 internet blackout, suggesting it has the infrastructure to operate independently of direct state coordination. Stryker had also disclosed in December 2024 a prior breach from May to June 2024 in which unauthorized access led to exfiltration of PII and medical records — not disclosed publicly until six months after the fact. Whether persistent access from that earlier intrusion contributed to the March 2026 Intune compromise is under active investigation.

Why the Measurement Gap Exists — and Why It Matters

The 245% spike and the government's more measured posture are not necessarily contradictory. They are measuring different things, and both are accurate within their respective frames of reference.

Private sector threat researchers track raw telemetry: connection attempts, scanning activity, failed authentication, DDoS traffic, botnet commands. To a firm like Akamai or Palo Alto Networks, a 245% increase in that telemetry is a real and significant escalation in the threat environment, regardless of how many of those attempts succeed. John Hultquist, chief analyst at Google Threat Intelligence Group, captured this tension directly, noting that Iranian cyber activity outside the Middle East had not yet matched its prior tempo but warning that this could shift given the military escalation. His firm was tracking trajectory and pre-positioning, not just confirmed breaches. Hultquist assessed that Iran would focus disruptive operations on the U.S., Israel, and Gulf Cooperation Council countries, prioritizing targets of opportunity and critical infrastructure. He also noted Iran "has historically had mixed results" with destructive attacks and a documented tendency to exaggerate the effects of operations it does carry out.

Email security firm Proofpoint added a calibrating data point: as of March 11, Proofpoint's tracking of known Iranian hacking groups had identified only one confirmed hacking campaign against a U.S. target since the war began — an attempt to compromise a U.S. think tank employee. That finding is consistent with the internet blackout's suppressive effect on centralized state operations. The Stryker attack, which researchers attribute to a MOIS proxy operating outside Iran, represents a different pattern: a geographically distributed operation that does not require Iranian domestic connectivity to execute.

The government, by contrast, measures impact — attributed, confirmed, high-consequence breaches that cross into national security significance. If power grids are functioning and water systems are running, official posture tends toward "no confirmed coordinated campaign." That framing is accurate but incomplete: Stryker was not a power grid, yet its disruption reached Maryland emergency rooms and disrupted cardiac monitoring workflows. The gap between "no coordinated campaign of high consequence" and "medical device company offline in 79 countries" is operationally significant for security teams at hospitals, manufacturers, and logistics providers trying to decide on immediate defensive priorities.

A compounding factor is that CISA — the primary U.S. agency responsible for coordinating national cyber readiness — has been operating in a severely degraded state throughout this period. Staffing dropped from roughly 3,400 employees at the start of fiscal year 2025 to approximately 2,400 by December 2025, a reduction of nearly 30% — with acting Director Madhu Gottumukkala acknowledging in a November 2025 internal memo that the agency had reached a critical inflection point, hampered by an approximately 40% vacancy rate across key mission areas. The agency has no Senate-confirmed permanent director. Leadership vacancies span operating divisions and at least half of CISA's regional offices. Lawmakers from both parties flagged this as a readiness risk well before February 28.

Readiness Risk

CISA lost nearly 30% of its total workforce between the start of fiscal year 2025 and December 2025, and its acting director acknowledged an approximately 40% vacancy rate across key mission areas in a November 2025 internal memo. The agency has no Senate-confirmed director. At a January 2026 House Homeland Security Committee hearing, Chairman Rep. Andrew Garbarino stated that "workforce continuity, clear leadership, and mission readiness are essential to effective cyber defenses." Rep. James Walkinshaw argued that the cuts had left critical systems and infrastructure more exposed and the American people more vulnerable.

The AI Dimension

Multiple researchers have flagged an emerging variable that has no direct historical precedent in previous Iran-linked cyber escalation cycles: the use of AI tooling to accelerate and scale attack operations. CloudSEK documented that over 60 Iranian-aligned groups mobilized within hours of the February 28 escalation, with AI tools substantially lowering the barrier to targeting internet-exposed industrial control systems. The firm noted that 40,000 or more ICS systems are discoverable on the public internet, and that an attacker with an AI assistant and no prior ICS expertise can now perform meaningful reconnaissance against that infrastructure.

Bob Kolasky, senior vice president for critical infrastructure at Exiger, emphasized the urgency directly, noting that Iran's decade-plus history of attacking U.S. critical infrastructure demonstrated clear intent and capability — and that adversaries of this kind would be expected to deploy their newest tools in an active conflict. Allie Mellen, principal analyst at Forrester Research, characterized the historical record in similar terms, pointing to years of Iranian operations spanning critical infrastructure targeting, espionage, DDoS campaigns, influence operations, and system-wiping attacks. The concern among researchers is not that Iran has invented new categories of attack, but that AI makes familiar ones faster, cheaper, and accessible to actors who previously lacked the technical depth to execute them reliably.

The Stryker attack did not involve AI tooling in any confirmed way — it relied on compromised administrative credentials and a built-in platform feature. But it demonstrated that destructive, globe-spanning disruption is achievable without sophisticated malware, which is precisely the category of attack that AI-assisted reconnaissance is designed to identify opportunities for.

What Escalation Looks Like From Here

The current threat environment sits at a specific point on an escalation ladder that has well-documented rungs. Understanding what the next steps look like is not speculation — it is pattern recognition from documented Iranian cyber operations history.

The pattern that researchers across Unit 42, Google GTIG, and Check Point have been watching is a transition from claim-driven, hacktivist-tier disruption toward confirmed, high-consequence operations against critical infrastructure. The first rung — the one currently active — is primarily psychological: volumetric scanning, credential harvesting, MDM exploitation, data exfiltration paired with inflated claims, information operations. These are designed to create uncertainty, consume defender resources, generate media coverage, and signal capability. The Stryker attack sits here. It was devastating to Stryker. It did not affect power or water.

The second rung is targeted operational disruption of critical infrastructure — power grids, water treatment, oil and gas pipeline control systems. Iran's IRGC Cyber-Electronic Command (IRGC-CEC) has documented capability in this area. CyberAv3ngers, the IRGC-CEC persona, compromised water utility programmable logic controllers in the United States as recently as 2023. The relevant MITRE ATT&CK techniques for this tier are concentrated in the ICS matrix: T0816 (Device Restart/Shutdown), T0831 (Manipulation of Control), and T0826 (Loss of Availability). The internet blackout has degraded Iran's ability to coordinate these operations from within its borders. Handala's demonstrated use of Starlink IP ranges suggests that some operational capability is operating outside that blackout. The question is not whether this capability exists — it does — but whether the geopolitical calculation to deploy it at scale against the U.S. homeland has been made.

The third rung is what the intelligence community calls a "significant cyber event" — an attack that causes physical consequences, casualties, or sustained outages to systems that underpin daily life. The United States has not experienced this from Iran. It has come close. The 2021 Oldsmar, Florida water treatment facility incident — where an attacker increased sodium hydroxide levels to potentially lethal concentrations — was attributed to a financially motivated actor, but it demonstrated the physical consequence pathway for ICS attacks. John Hultquist's assessment at GTIG is that Iran "would focus disruptive operations" on the U.S., Israel, and Gulf Cooperation Council countries — not that it would limit them. Security teams should model defensively against all three rungs, not just the one currently active.

The Regulatory and Legal Aftermath Nobody Has Written Yet

Three threads of legal and regulatory consequence are moving in the background of this incident, and none of them has received meaningful coverage.

The first is SEC disclosure. Stryker is a publicly traded Fortune 500 company. The Securities and Exchange Commission's 2023 cybersecurity disclosure rules require material cyber incidents to be disclosed within four business days of determining materiality. Stryker confirmed a "global network disruption" on March 11. Its shares fell approximately 3% on initial reports. The company had previously disclosed a separate breach — from May to June 2024 — in December 2024, six months after the initial intrusion. Whether the SEC considers either the timeline of the 2024 disclosure or the ongoing investigation into the relationship between the 2024 and 2026 incidents as a disclosure adequacy question is an active question that Stryker's legal team is assuredly managing right now.

The second is HIPAA. Stryker manufactures medical devices and operates systems that transmit patient data — including Lifenet, the ECG transmission platform at the center of the Maryland EMS disruption. If patient health information was present on any of the 80,000 wiped devices, HIPAA breach notification obligations may have been triggered. Handala claimed 50TB of exfiltrated data; investigators found no confirmed evidence of exfiltration. But the absence of confirmed exfiltration is not the same as a confirmed negative, and HIPAA's breach notification standard is triggered by unauthorized access, not only by confirmed theft.

The third is the BYOD liability question raised earlier. No U.S. case law cleanly addresses the destruction of personal data on employee-owned devices during a cyberattack executed through a company's MDM platform. It will be established now, in part, through what happens next at Stryker. The outcome will reshape how BYOD enrollment agreements are drafted at every company that reads the decision.

Key Takeaways

  1. The 245% spike is real but requires context: Akamai's figure reflects volumetric activity including failed probes, automated scanning, and DDoS traffic — not confirmed breaches. That does not make it irrelevant. It is an accurate measure of how dramatically attack surface pressure has increased since February 28. The sub-metrics are specific: botnet scanning +70%, automated recon +65%, infrastructure scanning +52%, credential harvesting +45%, DDoS recon +38%. Historical patterns suggest this kind of sustained scanning phase precedes more targeted, destructive operations. Defense action: Treat this as the reconnaissance phase of a campaign, not random noise. Validate that your VPN authentication logs are generating alerts on anomalous login patterns consistent with T1110 (Brute Force) and T1078 (Valid Accounts) abuse.
  2. Stryker established a new benchmark: The March 11 attack was the first confirmed, high-impact pro-Iranian cyberattack against a U.S. company since the conflict began. Its use of Microsoft Intune's native wipe functionality — with no malware deployed — represents a documented escalation in MDM exploitation as an attack vector (T1072 — Software Deployment Tools, T1485 — Data Destruction). Investigators found no confirmed evidence of the 50TB exfiltration Handala claimed, but the wipe of approximately 80,000 devices in three hours is not in dispute. Defense action: Audit your Intune, Jamf, or equivalent MDM platform for admin account hygiene immediately. Multi-account approval for bulk destructive operations is available and not widely enabled.
  3. Pre-positioning predates the conflict: Check Point Research established that Handala's initial access at Stryker occurred well before March 11. Organizations should be auditing for pre-conflict footholds, not just post-February-28 intrusions. Stryker's undisclosed 2024 breach adds an additional dimension to this timeline. Defense action: Review Entra ID (Azure AD) audit logs for cloud account creation events (T1136.003) and check for service principals or admin accounts created in the past 6–18 months that do not correspond to provisioned identities.
  4. The government-researcher gap is a real operational risk: Organizations that rely solely on official government signals for threat calibration will consistently be behind the curve in this conflict. The combination of CISA's degraded capacity — a 40% vacancy rate in key mission areas by late 2025 — contradictory White House messaging, and the resignation of the National Counterterrorism Center director makes independent threat intelligence more operationally essential than at any previous point in recent U.S. cyber history.
  5. Iran's internet blackout is a double-edged constraint: The self-imposed blackout has degraded centralized state cyber command, but it has not stopped Handala or other geographically dispersed proxy groups from operating. Handala used Starlink IP ranges during Iran's January 2026 blackout, demonstrating independent communications infrastructure. As domestic connectivity stabilizes, a transition from claim-driven activity to confirmed disruptive operations against harder targets is the pattern researchers are watching for. The escalation ladder is established — reconnaissance and psychological disruption phase (current), followed by critical infrastructure targeting, followed by physical-consequence operations.
  6. MDM platforms are now a confirmed high-value attack vector: The Stryker incident exposed a critical blind spot in enterprise security posture: organizations that have not implemented privileged access controls around mobile device management platforms are exposed to mass device wipes that bypass traditional endpoint detection entirely. Defense action: Enable Privileged Identity Management (PIM) for Intune Global Administrator roles, require multi-party approval for bulk device actions, and configure alerts on mass wipe commands as a Tier-1 security event. Extend this audit to every third-party MSP that holds administrative access to your MDM environment (T1199 — Trusted Relationship).
  7. BYOD policies require immediate legal review: The Stryker wipe destroyed personal data on employee-owned devices enrolled in the company's MDM program. The liability framework for this scenario has not been established in case law. Before the next incident, organizations should review BYOD enrollment agreements for language addressing attacker-triggered wipes, assess whether personal device enrollment can be segmented from the administrative access plane that controls corporate hardware, and consult with employment counsel on notification and remediation obligations to affected employees.

The question security teams are navigating right now is not whether Iran-linked actors are targeting U.S. infrastructure — the telemetry, the Stryker incident, and the activation of more than 60 hacktivist groups answer that. The question is what crosses the threshold from elevated noise into high-consequence impact, and whether the organizations responsible for answering that question at a national level are currently in a position to do so reliably. Stryker's ordering systems were still offline a full week after the attack. Cardiac monitoring fallbacks were activated in Maryland. An investigation is examining whether a 2024 breach at the same company seeded the conditions for a 2026 wipeout. Employees are filing into their days without authenticator apps, without personal photos, without any recourse framework that existed before March 11. The legal, regulatory, and operational aftermath of a single MDM exploit is still unfolding across 79 countries. The evidence from the past three weeks suggests the private sector cannot afford to wait for a government answer — and that the next attack in this category will find an MDM platform, a cloud admin console, or a trusted third-party relationship, not a piece of malware.

← all articles