How Handala Turned Microsoft Intune Into a Weapon Against Stryker

On the morning of March 11, 2026, thousands of Stryker employees across dozens of countries sat down at their desks and found every screen dark. No ransom note. No countdown timer. Just a logo — the cactus-figure emblem of Handala — staring back at them from wiped, factory-reset machines. What followed was one of the largest and operationally disruptive cyberattacks ever directed at a U.S. corporation, and it did not require a single line of custom malware.

Stryker Corporation is a Fortune 500 medical technology company headquartered in Kalamazoo, Michigan. It reported $25.1 billion in global sales in 2025, employs roughly 56,000 people across 61 countries, and manufactures products that touch more than 150 million patients annually — from orthopedic implants and surgical robots to defibrillators and neurotechnology devices. It is, by any measure, critical infrastructure for modern healthcare. On March 11, 2026, it became the most prominent U.S. target in Iran's escalating cyber campaign against the West.

What Happened: The Attack on March 11

Beginning at 5:00 AM UTC on March 11, 2026 — midnight to 3:00 AM on the U.S. East Coast — Handala executed a coordinated destructive operation against Stryker's global IT environment. The wipe operation ran for approximately three hours, completing by 8:00 AM UTC, according to a source familiar with the attack who spoke to BleepingComputer. By the time most U.S. employees arrived for the workday, the damage was already global and irreversible. Employees received urgent text messages instructing them not to connect to any Stryker system, open any Microsoft application, or connect their phones to company Wi-Fi. The message specifically called out Microsoft Outlook, Microsoft Teams, and VPN clients.

An internal employee communication sent that morning — confirmed by multiple workers and reported by WWMT News Channel 3 — described the situation as a severe, global disruption affecting all Stryker laptops and any systems connected to the company's network.

Stryker's global headquarters in Portage closed for the day. The parking lot, normally full on a Wednesday, sat empty. An automated message on the company's main phone line stated there was a "building emergency." In Ireland — home to Stryker's largest facility outside the United States — more than 5,000 workers were sent home from the Cork campus. Employees there reported communicating via personal WhatsApp messages because every corporate system was down. Login screens across the company's global device fleet had been replaced with the Handala logo.

Handala posted a manifesto to Telegram claiming it had erased data from more than 200,000 systems, servers, and mobile devices across 79 countries, and had exfiltrated 50 terabytes of data. Both figures are Handala's own assertions and remain unverified. Investigators — including Microsoft's Detection and Response Team (DART) and Palo Alto Networks Unit 42, who are jointly leading the forensic response — confirmed to BleepingComputer that the verified device count is approximately 80,000, and found no indication that any data was exfiltrated at all. Independent verification of Handala's broader claims is difficult by design; the group's public statements serve a psychological and reputational function as much as a factual one. The operational disruption, however, is not in dispute. Stryker filed an 8-K with the Securities and Exchange Commission, formally acknowledging the attack. Its stock fell 4.86% on Thursday, March 12 — a total decline of 9.16% over two trading days.

0 Devices Wiped (Verified)
0 Wipe Window
0 Countries Affected
Attack Chain — Interactive
Stage 1
Credential Harvest
Stage 2
Entra ID Access
Stage 3
New Admin Account
Stage 4
Intune Console
Stage 5
Mass Wipe Issued
Stage 1 — Credential Harvest
Handala's entry point involved compromising the credentials of an existing Microsoft Entra ID administrator account. The initial access vector has not been publicly confirmed, but the group's documented toolkit includes phishing lures impersonating security vendors and government entities, social engineering, and exploitation of credential reuse. No custom malware appears to have been deployed at this stage.
March 11, 2026 — Attack Timeline (UTC)
5:00 AM
Wipe commands begin propagating
~5:30 AM
Global device fleet begins going dark
~6:00 AM
Stryker HQ closes; Cork campus sends 5,000 home
~7:00 AM
Employee alerts sent; "do not connect"
8:00 AM
~80,000 devices wiped. Wipe window closes.

The Weapon: Microsoft Intune as an Attack Surface

This was not a conventional wiper attack. Traditional wiper attacks rely on malicious software deployed to individual endpoints — code that overwrites disk sectors, corrupts the master boot record, or encrypts files beyond recovery. Detection strategies for those attacks focus on anomalous disk write activity or known malware signatures. The Stryker attack bypassed all of that entirely.

According to a source with direct knowledge of the incident who spoke to KrebsOnSecurity on condition of anonymity, Handala did not appear to deploy custom malware in the traditional sense. Instead, the group is assessed to have compromised Microsoft Entra ID — formerly Azure Active Directory — administrator credentials, then used that access to log into Stryker's Microsoft Intune management console. But that is only part of the picture. BleepingComputer, citing a separate source familiar with the attack, reports a step the KrebsOnSecurity account omits: after compromising the existing administrator account, the attackers created a brand-new Global Administrator account within the tenant. Issuing the mass wipe commands from a freshly created account — rather than a known, monitored admin — would reduce the likelihood of triggering access alerts tied to the original compromised identity.

Rafe Pilling, Director of Threat Intelligence at Sophos, told NBC News that the attackers appeared to have gained access to Stryker's Microsoft Intune management console — the platform enterprises use to centrally manage and control corporate devices.

Microsoft Intune is a cloud-based endpoint management platform that enterprise IT teams use to enforce security policies, push software updates, and maintain compliance across corporate devices regardless of their physical location. One of its core administrative functions is the ability to issue a remote wipe command — a feature designed to protect sensitive data if a device is lost or an employee is terminated. Handala used that exact feature as a weapon, pushing factory-reset commands at scale to every device enrolled in Stryker's Intune environment. The wipe ran for approximately three hours — from 5:00 to 8:00 AM UTC — and affected an investigator-confirmed figure of approximately 80,000 devices. Handala's manifesto claimed 200,000+, a figure that has not been substantiated by forensic investigators.

The attack's scope extended beyond corporate-issued hardware. Employees who had enrolled personal phones for work access — to receive email through Outlook or use Microsoft Authenticator for multi-factor authentication — also had their personal devices wiped. According to reporting from the Irish Examiner, one Cork employee stated that "anyone with Microsoft Outlook on their personal phones had their devices wiped."

Note

Palo Alto Networks Unit 42 cited a March 6, 2026 report from Israel's National Cyber Directorate warning of exactly this type of destructive operation: attackers gaining access to legitimate user credentials, then weaponizing those credentials to gain administrative access to device management platforms. The warning preceded the Stryker attack by five days.

The Intune vector is supported by multiple independent lines of evidence. Stryker's own public statement described the attack specifically as a disruption to its "Microsoft environment" — phrasing that cybersecurity practitioners noted aligns precisely with a cloud management platform compromise rather than a traditional network intrusion. Multiple employees confirmed to news outlets they were explicitly told to uninstall Intune and remove Stryker's corporate management profile from their devices. A thread on Reddit's cybersecurity forums, cited by KrebsOnSecurity, included several users claiming to be Stryker employees who said they were urgently told to remove Intune. Notably, Stryker's SEC 8-K filing stated the company has "no indication of ransomware or malware" — language that aligns precisely with an attack conducted entirely through legitimate administrative tooling. Investigators also found no evidence that any data was exfiltrated, contradicting Handala's claim of 50 terabytes stolen.

The implication for security teams is significant. If an attacker can compromise a single privileged Intune administrator account — without triggering traditional endpoint detection tools — they gain the ability to issue destroy commands to every enrolled device in an organization. The attack appears as a legitimate administrative action until it is too late to stop.

A security researcher cited by Cybersecurity Dive noted that MFA enforcement for MDM and UEM consoles reduces the risk of straightforward credential takeover attacks, and that Intune and comparable platforms already include a multi-account approval feature — specifically designed so that no single administrator can unilaterally execute destructive actions like mass wipes.

Who Is Handala? Inside Void Manticore

Handala — also known as Handala Hack Team, HAtef, and Hamsa — presents itself publicly as a hacktivist group: politically motivated, pro-Palestinian, and operationally independent. The reality assessed by the threat intelligence community is considerably more structured. Palo Alto Networks Unit 42, Microsoft, Brandefense, and Sophos all assess with high confidence that Handala is one of several online personas maintained by Void Manticore, a threat actor formally linked to Iran's Ministry of Intelligence and Security (MOIS).

The group is tracked under multiple names across the industry: Void Manticore (Palo Alto), COBALT MYSTIQUE (CrowdStrike), and Storm-1084 or Storm-0842 (Microsoft). Researchers note significant technical and operational overlap between Void Manticore and Scarred Manticore — also known as OilRig or APT34 — an IRGC-linked advanced persistent threat group. Whether Void Manticore operates as a direct extension of MOIS or as a semi-autonomous proxy that receives covert support is a distinction intelligence analysts continue to debate, but the alignment with Iranian state interests is not.

Handala first surfaced in late 2023. Despite early messaging that mimicked independent hacktivism, the group's technical capabilities and target selection have consistently reflected Iranian strategic priorities. Its campaign history spans government ministries in the Balkans (Operation Homeland Justice, 2022), critical infrastructure in Israel (2023), and Western NGOs and think tanks through 2024 and 2025. The group focuses on what researchers describe as "hack-and-leak" activity combined with destructive wiper operations — publishing stolen data while simultaneously destroying the systems it was taken from.

According to Check Point Research, Handala's standard toolkit includes phishing using highly convincing current-event lures, often impersonating legitimate security vendors or government entities. The group's initial access methodology typically involves social engineering to harvest credentials, followed by exploitation of administrative platforms for maximum destructive impact. The Stryker attack follows this pattern precisely, substituting custom malware delivery for native Intune functionality — a technique researchers are calling "living off the land" device management abuse.

Why Stryker? The Targeting Logic

Stryker did not become a target because of a specific vulnerability in its security posture. It became a target because of its business history. Handala's manifesto explicitly cited Stryker's 2019 acquisition of OrthoSpace, an Israeli medical technology company based in Caesarea, Israel, as justification for the attack. The manifesto referred to Stryker as a "Zionist-rooted corporation" and framed the attack as part of a broader campaign against companies with ties to Israel — acquisitions, partnerships, shared investors, or joint customers.

Michael Vatis, a former director of the FBI's National Infrastructure Protection Center, told NewsNation that Stryker's Israeli acquisition may have been the reason for targeting, or alternatively that Handala may be systematically scanning the internet for vulnerable high-value companies and Stryker happened to present a viable path of entry. Vatis suggested both explanations may be simultaneously true — geopolitical motivation directing attention toward target pools that opportunistic scanning then selects from.

A separate intelligence data point adds further complexity. According to analysis by BlackVeil Security, a distinct threat actor called "0APT" claimed a breach of stryker.com on February 5, 2026 — more than five weeks before the Handala wiper attack on March 11. That claim has not been independently verified and may be unrelated to Handala's operation entirely. However, two separate threat actors claiming breaches of the same target within five weeks is consistent with a pattern intelligence analysts recognize: once a major organization enters the crosshairs of geopolitically motivated actors, it tends to attract multiple opportunistic campaigns simultaneously.

The Healthcare Cascade: Hospitals, LifeNet, and Supply Chains

What set the Stryker attack apart from most corporate cyberattacks is where the blast radius extended. Stryker is not merely a software company with disrupted operations — it is a critical node in the physical infrastructure of U.S. healthcare. Its products are in operating rooms, emergency departments, and ambulances across every major health system in the country.

On the morning of March 11, Maryland's Institute for Emergency Medical Services Systems received multiple reports that Stryker's LifeNet electrocardiogram transmission system was "non-functional in most parts of the state." LifeNet allows paramedics to transmit 12-lead ECG readings from the field to receiving hospitals before patient arrival — enabling catheterization lab teams to prepare for STEMI patients before the ambulance arrives. When that transmission fails, the backup is a radio call describing what a clinician sees on a screen. Dr. Timothy Chizmar, Maryland's EMS medical director, issued guidance to hospitals and EMS providers: if LifeNet transmission is unavailable, "initiate radio consultation and describe the findings on the ECG." That is 2026 emergency cardiac medicine running on 1980s backup procedures.

One healthcare professional at a major U.S. university medical system, speaking anonymously to KrebsOnSecurity, characterized the incident as a real-world supply chain attack — pointing out that virtually every hospital in the country that performs surgery relies on Stryker products in some capacity.

Stryker subsequently clarified that LifeNet itself remained fully functional throughout the incident — the system runs on infrastructure architecturally separate from the corporate Microsoft environment. The disruption in Maryland appears to have been caused by hospitals and EMS providers disconnecting from Stryker systems as a precaution, rather than by any compromise of the LifeNet platform itself. In a customer update, Stryker confirmed that LifeNet had not been affected and that customer data was transmitting normally throughout the event. But the precautionary disconnections created real gaps in emergency care workflows while the incident was unfolding.

John Riggi, national advisor for the American Hospital Association, issued a formal statement acknowledging the attack and noting the AHA was actively exchanging information with hospitals and the federal government. As of his initial statement, he was not aware of direct patient care impacts, but cautioned that the picture could change as hospitals assessed their specific dependencies on Stryker services, technology, and supply chain — and as the duration of the outage extended. The electronic ordering system — through which hospitals procure surgical supplies, implants, and devices — remained offline for more than a week following the attack, forcing customers to place all orders manually through sales representatives. One healthcare professional told KrebsOnSecurity they were actively unable to order surgical supplies normally sourced through Stryker on the day of the attack.

The 2024 Breach: An Unresolved Question

The March 11 attack was not Stryker's first confirmed security incident. In December 2024, the company filed breach notification letters with the attorneys general of Texas and Vermont disclosing that an unauthorized party had accessed its computer network between May 14 and June 10, 2024 — a window of nearly four weeks. That intruder extracted personally identifiable information including patient names, medical records, and dates of birth. Stryker detected the suspicious activity on June 10, 2024, notified law enforcement, and launched an investigation with external cybersecurity experts. Notification to affected individuals did not go out until December 5, 2024 — nearly six months after discovery.

The 2024 incident and the March 2026 wiper attack involve different reported attack types and there is no confirmed forensic link between them. But the combination raises a question that no public statement from Stryker or its investigators has yet answered: was a persistent foothold from the earlier compromise still active inside Stryker's environment when Handala conducted its operation in 2026? Researchers at Guardz noted that the Handala logo appearing on login pages before the wipe confirms the operation was staged in advance — you cannot authenticate to a Microsoft Intune admin console, configure a global wipe policy, and execute it across 79 countries in a single session without prior dwell time in the environment.

The 2024 breach also surfaces a separate regulatory dimension. Under HIPAA, covered entities and their business associates are required to notify affected individuals within 60 days of discovery. Whether that threshold was met — and what HHS's Office for Civil Rights will conclude about both the 2024 notification timeline and the March 2026 incident — is a regulatory question that remains open. For any organization handling protected health information, the Stryker timeline is a reminder that delayed disclosure carries compliance risk that can compound long after the initial incident is contained.

Note

Whether the 2024 Stryker breach and the March 2026 wiper attack are connected remains unconfirmed. The 2024 incident involved a distinct unauthorized access event — data exfiltration, not destruction — and Handala has not referenced it in any public statements. The open question is not whether the same actor was responsible, but whether any residual access from 2024 remained available for exploitation in 2026.

What Recovery From a Wiper Attack Actually Looks Like

Ransomware has a recovery path. Pay the ransom or restore from backup, and data can, in principle, come back. Wiper attacks have no such path. Every device that received Handala's factory-reset command was permanently and irreversibly erased. There is no decryption key to negotiate for, no partial file recovery from encrypted sectors. Recovery from a wiper attack at Stryker's scale — roughly 80,000 devices across 61 countries — means rebuilding from zero, one device at a time.

That process involves more than reinstalling an operating system. Each device must be re-enrolled in Intune, have its corporate configuration profile reapplied, have software and security tools reinstalled, and have user identity re-provisioned. For employees who had enrolled personal devices, corporate re-provisioning does nothing — those devices require full personal restoration from backups the employee may or may not have maintained. Stryker's electronic ordering system, manufacturing operations, and global shipping infrastructure depend on the same endpoints and identity systems that were wiped. The company shifted to entirely manual ordering processes immediately after the attack, with hospital customers directed to contact sales representatives for every procurement transaction. At the scale Stryker operates — $25 billion in annual revenue, products flowing to hospitals across 150 million patient interactions annually — manual ordering is not a sustainable continuity state. It is a stopgap measured in days, not weeks.

Stryker's most recent public statement confirmed that core transactional systems are on a path to recovery, but gave no timeline for full restoration. The company has not disclosed what backup infrastructure was available, what percentage of the 80,000 devices had been reprovisioned as of the last update, or what portion of its manufacturing and logistics capacity had returned to normal. For organizations benchmarking their own incident response plans against this event, the silence on recovery specifics is itself informative: wiper attacks are not routinely included in business continuity exercises, and the operational gap between "attack contained" and "fully operational" can span weeks even for a well-resourced company.

The BYOD Blast Radius: When the Attack Became Personal

The clearest gap between what Stryker's public statements addressed and what employees actually experienced is the BYOD dimension. Stryker, like the overwhelming majority of large enterprises, allowed employees to enroll personal phones in its Intune environment to access corporate email through Outlook, use Microsoft Authenticator for multi-factor authentication, and access other work applications. That enrollment is operationally convenient and nearly universal. It is also what put personal devices in scope for the wipe command.

Employees across multiple countries confirmed publicly — on social media and in reporting to outlets including KrebsOnSecurity and the Irish Examiner — that personal phones enrolled for work access had been factory-reset along with corporate hardware. What that means in practice goes beyond the loss of personal photos. Employees who stored password managers on their personal devices lost credentials. Employees who used their enrolled phones as MFA devices lost the authenticator apps — and with them, the ability to log back into personal accounts that had nothing to do with Stryker. Financial records, bank access, cloud storage — anything accessible through or stored on those personal devices was gone. In some cases, the very tools those employees would need to begin recovering personal accounts were among the first things wiped.

This creates a secondary attack surface that does not close when Stryker's corporate recovery completes. Employees whose MFA apps were wiped are now at elevated risk of account takeover on services they access personally. Researchers at Forrester noted that access tokens and digital certificates stored on BYOD devices may have been extractable before the wipe — not just deleted, but potentially harvested. Whether Handala conducted any data collection from enrolled personal devices before executing the wipe is unknown. The investigators' confirmed finding of no corporate data exfiltration does not answer questions about what was on those personal phones. Any Stryker employee who had a personal device enrolled in Intune should treat that device — and all accounts accessible from it — as potentially compromised, independent of the corporate investigation's conclusions.

The Geopolitical Backdrop

Iran Cyber Escalation — Historical Rail
2010
Stuxnet
U.S.–Israeli operation damages Iranian nuclear centrifuges. Iran responds by building out offensive cyber capabilities.
2012
Shamoon — Saudi Aramco
Wiper attack destroys data on roughly 35,000 Saudi Aramco workstations. Iran demonstrates willingness to target civilian critical infrastructure.
2014
Sands Casino Wiper
Iran wipes the Las Vegas Sands network after its owner makes public statements advocating a nuclear strike on Iran. Geopolitical speech triggers operational retaliation against a private company.
2022–25
Void Manticore / Handala Emerges
Handala surfaces as public persona. Targets include Balkan government ministries, Israeli critical infrastructure, Western NGOs. Hack-and-leak combined with destructive wiper operations.
2026
Stryker — MDM as Weapon
~80,000 devices wiped via Microsoft Intune. First confirmed use of a cloud endpoint management platform as a mass-destruction weapon. Assessed as the most significant Iranian cyber strike against a U.S. company in the current conflict.

On February 28, 2026, the United States and Israel launched military strikes against Iran, beginning a conflict that has killed at least 1,270 people in Iran according to state media, with casualties continuing to mount across the wider Middle East. On the same day, a missile struck a primary school in Minab, Iran, killing approximately 175 people — more than 100 of them children. The Pentagon launched an investigation, and preliminary findings reported by the New York Times concluded the U.S. was responsible due to a targeting error. Handala's manifesto cited this strike explicitly as the reason for the Stryker attack.

U.S. intelligence experts had been warning publicly for weeks that Iranian-linked hackers were likely to escalate cyberattacks against American companies and government systems in retaliation for U.S. military involvement. FBI Director Kash Patel posted on the day of the Stryker attack that the FBI was "working 24/7 to stay ahead of the threat." Palo Alto Networks Unit 42 issued a formal threat brief on March 13 titled "March 2026 Escalation of Cyber Risk Related to Iran," documenting the increased risk of wiper attacks against organizations in the United States and Israel.

Iran's cyber capabilities have evolved substantially since the 2010 Stuxnet attack — attributed to the United States and Israel — damaged Iran's nuclear centrifuge program. Vatis noted that the Stuxnet incident prompted a concerted, long-term investment in offensive cyber capabilities. Iran has since conducted some of the most destructive wiper attacks in recorded history: the Shamoon attack on Saudi Aramco in 2012, which destroyed the data of roughly 35,000 workstations, and the 2014 attack on the Sands Casino in Las Vegas, which wiped the casino's network after its owner made public statements advocating a nuclear strike on Iran.

The Stryker attack is now assessed by multiple researchers as the most significant targeting of a U.S. company in the current Iran conflict — a clear escalation beyond the website defacements and minor disruptions that had characterized Iranian-linked hacktivist activity in the weeks following the start of hostilities.

If your organization uses Microsoft Intune, Jamf, or any cloud-based endpoint management platform, the following eight takeaways are not abstract lessons from someone else's incident. Every privileged account with access to a bulk wipe function in your environment is a potential attack vector of exactly this type.

Key Takeaways

  1. Eliminate standing Global Administrator privileges using Privileged Identity Management. The single most structural gap this attack exposed is the existence of persistent, always-on Global Administrator accounts. Under Microsoft Entra ID Privileged Identity Management (PIM), no administrator holds standing Global Admin rights — they must request role elevation for a defined time window, and every activation is logged, timestamped, and can be gated behind a secondary approval. Had PIM been active, the attacker's newly created Global Administrator account would have had no standing permissions to issue wipe commands at all. Configuration path: Microsoft Entra admin center → Identity Governance → Privileged Identity Management → Roles → assign Global Administrator and Intune Administrator as "eligible" rather than "active." This is the single control most directly addressed to the Stryker attack chain.
  2. New Global Administrator accounts are a high-fidelity detection signal — alert on them specifically. The threat actor compromised an existing admin account and then created a brand-new Global Administrator account before issuing wipe commands. That new-account creation is a near-unambiguous signal of compromise in progress. A detection rule targeting this action — particularly outside business hours, or by an account with no prior provisioning history — should be a baseline in every Microsoft 365 environment. Feed Entra ID audit logs to a SIEM in real time: Entra's default log retention is 30 days, which is insufficient for forensic investigation. Streaming to Microsoft Sentinel, Splunk, or an equivalent platform with a long-retention policy is required to catch this pattern before damage is done — and to reconstruct attacker dwell time afterward.
  3. Switch BYOD enrollment from full MDM to MAM-only — this eliminates the personal device blast radius entirely. Employees whose personal phones were enrolled in Stryker's Intune environment lost not just corporate access but MFA apps, password managers, and financial accounts. That personal exposure does not resolve when the company recovers. The root cause is full MDM enrollment of personal devices, which places the entire device under Intune's wipe authority. Microsoft Intune supports a fundamentally different model: Mobile Application Management (MAM) without device enrollment. Under MAM-only, Intune wraps only the managed applications — Outlook, Authenticator, Teams — in a protected container. A remote wipe command can only erase that managed app container, not the device. Personal photos, password managers, bank apps, and MFA credentials are entirely out of scope. Organizations that have not yet migrated BYOD to MAM-only enrollment should treat that migration as urgent, not optional. Configuration path: Intune admin center → Apps → App protection policies → create policy targeting enrolled but personally-owned devices, then unenroll those devices from full device management.
  4. Gate MDM console access with phishing-resistant MFA and Conditional Access — password-plus-TOTP is not sufficient. Credential compromise is the entry point for the entire Stryker attack chain. Traditional MFA using TOTP codes (Google Authenticator, Microsoft Authenticator push notifications) can be bypassed through real-time phishing proxies and adversary-in-the-middle attacks — the same techniques Handala's toolkit is documented to use. Phishing-resistant MFA — FIDO2 hardware security keys (YubiKey, Titan) or Windows Hello for Business — eliminates this bypass entirely because authentication is cryptographically bound to the origin domain. Require phishing-resistant MFA specifically for any account with Intune Administrator, Global Administrator, or Cloud Device Administrator roles. Additionally, create a Conditional Access policy that requires a compliant, managed device to access the Intune management console at all — blocking any authentication attempt from an unmanaged machine, including the kind of fresh session a threat actor opens after credential theft.
  5. Enable multi-account approval for destructive Intune actions — configure it to scope specifically to wipe. Microsoft Intune includes a multi-account approval feature that prevents any single administrator from executing mass destructive actions without secondary authorization. This control directly addresses the Stryker attack vector: even with a valid Global Administrator session, the wipe command cannot execute until a second authorized administrator approves it. The feature is not enabled by default and requires deliberate configuration. Path: Intune admin center → Tenant administration → Multi admin approval → create an access policy with resource type "Remote actions," assign an approver group separate from the requestor group. Pair this with an approval timeout — if no approval is received within a defined window, the action expires rather than proceeding.
  6. Export and version-control MDM enrollment baselines outside the tenant — recovery time depends on it. Recovery from a mass wipe is not just a hardware problem. Every device must be re-enrolled in Intune, have its configuration profiles reapplied, have software and security tools reinstalled, and have user identity re-provisioned. If the Intune configuration profiles, Windows Autopilot deployment profiles, compliance policies, and app assignment configurations are stored only within the compromised tenant, rebuilding them from memory or documentation adds significant time to an already multi-week operation. Export these baselines regularly — using Microsoft Graph API exports or purpose-built tools — and store them in an immutable, offline-or-separately-tenanted location. Test restoring a device from zero using those exports. Organizations that have never run a mass reprovisioning drill will discover, mid-incident, that their documentation is incomplete.
  7. Wiper attacks without malware are invisible to signature-based detection — build behavioral detection into identity and device management layers. Security operations centers that rely on malware signatures or anomalous disk-write activity to identify wiper attacks have no visibility into an Intune-driven factory reset. The wipe appears as a legitimate administrative action until devices go dark. Detection must shift upstream: monitor Entra ID for off-hours admin sessions, unusual sign-in locations for privileged accounts, and any bulk device action issued within a short time window. Microsoft Defender for Cloud Apps can be configured to alert on mass remote action events in Intune. CASB policies that flag any single session attempting wipe operations against more than a defined device threshold — before the action completes — are now a required detection layer, not a future enhancement.
  8. Conduct a formal threat landscape review after every M&A event involving entities in conflict zones. Handala targeted Stryker because of a 2019 acquisition of an Israeli company — seven years after the fact. The recommendation is not general awareness of geopolitical exposure; it is a structured process. After any acquisition, partnership announcement, or significant investment relationship with an entity in an active conflict zone, organizations should: map which internal systems the acquired entity's infrastructure has been merged into; assess whether that merger elevates the parent organization's profile as a target for geopolitically motivated actors; and document that assessment in the formal threat model. This is an M&A due diligence gap that no checklist currently captures by default, and it needs to be.
  9. Prior breach history is live risk until forensically closed — not a resolved file. Stryker disclosed a separate unauthorized access event in December 2024 involving data extracted from its network over a month-long window in mid-2024. Whether any persistence from that earlier compromise contributed to Handala's access in 2026 remains unconfirmed. Researchers at Guardz noted that the Handala logo appearing on device login screens before the wipe confirms the operation was staged in advance — pre-positioning that requires dwell time in the environment. No post-incident assessment of the March 2026 attack is complete without asking whether any access from 2024 was ever fully evicted. For any organization that has experienced a prior breach: a penetration test or purple team exercise that specifically tests for residual persistence is not optional in the aftermath. Closed investigations are not the same as clean environments.
  10. Business continuity plans must include a mass reprovisioning scenario — tested, not just documented. Most ransomware recovery exercises assume partial availability: some systems encrypted, others still operational. A wiper attack that destroys 80,000 devices simultaneously eliminates that assumption entirely. Organizations should define and drill a specific scenario: zero enrolled devices, identity infrastructure intact, target to restore minimum operational capacity within a defined time window. That drill will surface gaps — incomplete Autopilot profiles, missing software licenses for re-deployment, identity re-provisioning bottlenecks, help desk capacity ceilings — that no tabletop exercise will find. Stryker's shift to entirely manual ordering processes across a $25 billion revenue operation is the benchmark for what happens when that scenario has never been rehearsed.

Stryker confirmed its products remained safe to use throughout the incident — surgical robots, defibrillators, and neurotechnology devices were unaffected. The company's electronic ordering system remained offline as of the most recent update, with no public timeline given for full restoration. A prior breach disclosed in December 2024 remains an unresolved thread in the investigation. Tens of thousands of employees face lingering personal exposure from the wipe of enrolled personal devices. And the question of how long it takes to rebuild 80,000 devices across 61 countries has no clean answer yet.

What the attack exposed is not a flaw in any specific product or network configuration. It exposed the gap between how organizations think about attack surfaces and where attacks are now arriving: not through the firewall, but through the management console that controls the devices sitting behind it — and, once those devices fall, through the personal accounts of every employee who trusted their employer's enrollment request.

Sources

  1. FOX 17 / fox17online.com — Stryker headquarters in Kalamazoo closes amid cyber attack affecting global systems
  2. Cybersecurity Dive — Stryker investigating cyberattack that caused widespread outage
  3. Cybersecurity Dive — Stryker attack raises concerns about role of device management tool
  4. KrebsOnSecurity — Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  5. BleepingComputer — Stryker attack wiped tens of thousands of devices, no malware needed
  6. TechCrunch — Stryker says it's restoring systems after pro-Iran hackers wiped thousands of employee devices
  7. NBC News — Iran appears to have conducted a significant cyberattack against a U.S. company
  8. CNN — Pro-Iran hackers claim cyberattack on major US medical device maker
  9. Palo Alto Networks Unit 42 — Insights: Increased Risk of Wiper Attacks (Handala / Void Manticore)
  10. Security Affairs — Attack on Stryker's Microsoft environment wiped employee devices without malware
  11. Arctic Wolf — Stryker Systems Disrupted in Cyber Attack; Handala Group Claims Responsibility
  12. TechRadar — Stryker hackers allegedly wiped tens of thousands of devices without using any malware
  13. Stryker Newsroom — A Message to Our Customers (Customer Updates: Stryker Network Disruption)
  14. TIME — Iran-Linked Group Says It's Behind Cyberattack on U.S. Company
  15. NewsNation — Iran-linked hackers tied to cyberattack on US company Stryker
  16. Industrial Cyber — Suspected Iran-linked cyberattack hits medical technology giant Stryker
  17. WWMT News Channel 3 — Michigan's Stryker: No timeline yet to restore network operations after cyberattack
  18. SecureWorld — Iran-Linked Hacktivist Group Hits Stryker in Destructive Wiper Attack
  19. Chief Healthcare Executive — The Stryker cyberattack and what hospitals should be doing
  20. The Record (Recorded Future News) — Stryker says hospital tools are safe, but digital ordering systems still down after cyberattack
  21. Guardz — The Stryker Story: When Device Management Platform Becomes a Weapon
  22. Forrester Research — From Operating Rooms To iPhones: What The Stryker Attack Reveals About Third-Party Risk
  23. Forrester Research — The Stryker Attack: Enterprise Resiliency Plans Can't Ignore UEM
  24. Becker's Spine Review — Stryker suffers data breach: 6 things to know (December 2024)
  25. JDSupra / Console & Associates — Stryker Corporation Provides Notice of June 2024 Data Breach
  26. HIPAA Journal — Iran Linked Hacking Group Wipes Data of U.S. Medical Device Manufacturer
← all articles