Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Bild generiert von KI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Bild generiert von KI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

The cyberattack on Stryker, a multinational producer of medical equipment, surfaced on March 11, 2026, amid warnings of retaliatory hacks following US and Israeli airstrikes on Iran in late February. Initial reports came from social media posts by purported Stryker employees and a story in the Irish Examiner, describing wiped phones and computers displaying the Handala Hack logo. The group, active since at least 2023 and named after a Palestinian cartoon character symbolizing resistance, claimed responsibility on its Telegram channel and website. Handala cited the killing of 165 civilians at a girls' school in Iran by a US Tomahawk missile and prior US-Israeli operations against Iran as motivations.

Stryker acknowledged the incident on March 12, stating it faced a "global network disruption to our Microsoft environment as a result of a cyber attack." The company reported no evidence of ransomware or malware, and responders believe the disruption is contained to its internal Microsoft systems. Critical devices such as Lifepak for heart monitoring, Lifenet for patient data management, and Mako for surgeries continue to function normally. In a US Securities and Exchange Commission filing, Stryker noted it has no timeline for restoring normal operations.

Security researchers from Check Point, who track Handala as "Void Manticore," describe the group as affiliated with Iran's Ministry of Intelligence and Security. It has a history of destructive wiping attacks using custom tools, public software, and manual methods, often gaining access via underground services. Analysts suggest the attackers may have exploited Stryker's Microsoft InTune tool to issue deletion commands across its Windows network. Flashpoint researchers highlighted the symbolic targeting of Stryker, a key supplier of lifesaving devices to the US and allies, as a low-cost way for pro-Iranian actors to demonstrate reach while maintaining plausible deniability under a pro-Palestinian persona.

The breach, which reportedly affected tens of thousands of computers, underscores Iran's use of hacker groups for psychological retaliation when military options are limited.

Was die Leute sagen

Discussions on X highlight the Iran-linked Handala group's claimed wiper cyberattack on Stryker as retaliation for US-Israeli strikes, disrupting global operations but not critical medical devices. Sentiments include alarm over healthcare vulnerabilities and data destruction, geopolitical concerns, calls for bolstered US cybersecurity, and criticisms of escalating conflict. Technical analyses emphasize destructive intent via malware like Intune abuse over ransomware.

Verwandte Artikel

Illustration depicting Iranian blockade of Strait of Hormuz, US-Israeli airstrikes on Tehran, and surging oil prices amid escalating conflict.
Bild generiert von KI

US-Israeli strikes kill Iran's supreme leader, close Strait of Hormuz

Von KI berichtet Bild generiert von KI

US-Israeli airstrikes over the weekend killed Iran's Supreme Leader Ayatollah Ali Khamenei, prompting Iranian retaliation across the region and the closure of the Strait of Hormuz. This escalation has driven oil prices above $85 per barrel, the highest since July 2024, amid concerns over disrupted energy flows. Global markets reacted with falling stocks and rising commodity prices.

A prayer app popular in Iran was hacked to send push notifications urging users to surrender as Israeli and US strikes targeted the country. The messages promised amnesty and stated that help was on the way. Residents in Tehran and other cities reported explosions in the early hours of Saturday morning.

Von KI berichtet

On March 1, Iran attacked Amazon Web Services data centers in the UAE with drones, disrupting digital services in the region. Ten days later, Tasnim news agency, linked to Iran's IRGC, declared offices and infrastructure of Google, Microsoft, IBM, Nvidia, Oracle, and Palantir in Israel and the Gulf as legitimate targets.

Die Vereinigten Staaten haben eine Flugzeugträgerkampfgruppe in die Gewässer des Nahen Ostens entsandt, während Teheran vor Vergeltung bei jedem amerikanischen Angriff als Reaktion auf die Niederschlagung von Anti-Regierungsprotesten warnt. Menschenrechtsorganisationen haben fast 6.000 Todesopfer bei den von iranischen Sicherheitskräften unterdrückten Protesten bestätigt, wobei die tatsächliche Zahl mehrmals höher ausfallen könnte. Eine 18-tägige Internetabschaltung hat das volle Ausmaß der Gewalt verschleiert.

Von KI berichtet

Die Vereinigten Staaten und Israel haben früh am Samstag eine großangelegte Militäroffensive gegen den Iran gestartet, mit mächtigen Explosionen in Teheran gemeldet und wachsenden Ängsten vor einem breiteren regionalen Krieg. Der israelische Sicherheitsminister Israel Katz bezeichnete die Operation als „präventiven“ Schlag. US-Präsident Donald Trump bestätigte den Beginn von „großangelegten Kampfeinsätzen“, um die ballistischen Raketenfähigkeiten des Iran zu zerschlagen.

Die Secretaría de Inteligencia del Estado (SIDE) Argentiniens bestätigte, dass sie einen verteilten Ablehnungsdienst-Angriff (DDoS) auf die offizielle Website des Außenministeriums abgewehrt hat. Der Vorfall wird einer Hacktivisten-Kampagne zugeschrieben, die mit dem kürzlichen Beitritt des Landes zum Friedensrat im Zusammenhang steht, der von den USA gefördert wird. Es wurden keine Schäden an Systemen gemeldet.

Von KI berichtet

Die Polizei vermutet, dass das kriminelle Foxtrot-Netzwerk Attentatspläne gegen Kritiker des iranischen Regimes und israelische Interessen in Schweden in Auftrag gibt, so Quellen gegenüber SVT. Die Aufträge werden demnach über verschlüsselte Apps wie Signal geteilt. Der schwedische Sicherheitsdienst warnt vor Bedrohungen gegen Personen, die als Gefahr für das iranische Regime gelten.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen