Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Image generated by AI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Image generated by AI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

The cyberattack on Stryker, a multinational producer of medical equipment, surfaced on March 11, 2026, amid warnings of retaliatory hacks following US and Israeli airstrikes on Iran in late February. Initial reports came from social media posts by purported Stryker employees and a story in the Irish Examiner, describing wiped phones and computers displaying the Handala Hack logo. The group, active since at least 2023 and named after a Palestinian cartoon character symbolizing resistance, claimed responsibility on its Telegram channel and website. Handala cited the killing of 165 civilians at a girls' school in Iran by a US Tomahawk missile and prior US-Israeli operations against Iran as motivations.

Stryker acknowledged the incident on March 12, stating it faced a "global network disruption to our Microsoft environment as a result of a cyber attack." The company reported no evidence of ransomware or malware, and responders believe the disruption is contained to its internal Microsoft systems. Critical devices such as Lifepak for heart monitoring, Lifenet for patient data management, and Mako for surgeries continue to function normally. In a US Securities and Exchange Commission filing, Stryker noted it has no timeline for restoring normal operations.

Security researchers from Check Point, who track Handala as "Void Manticore," describe the group as affiliated with Iran's Ministry of Intelligence and Security. It has a history of destructive wiping attacks using custom tools, public software, and manual methods, often gaining access via underground services. Analysts suggest the attackers may have exploited Stryker's Microsoft InTune tool to issue deletion commands across its Windows network. Flashpoint researchers highlighted the symbolic targeting of Stryker, a key supplier of lifesaving devices to the US and allies, as a low-cost way for pro-Iranian actors to demonstrate reach while maintaining plausible deniability under a pro-Palestinian persona.

The breach, which reportedly affected tens of thousands of computers, underscores Iran's use of hacker groups for psychological retaliation when military options are limited.

What people are saying

Discussions on X highlight the Iran-linked Handala group's claimed wiper cyberattack on Stryker as retaliation for US-Israeli strikes, disrupting global operations but not critical medical devices. Sentiments include alarm over healthcare vulnerabilities and data destruction, geopolitical concerns, calls for bolstered US cybersecurity, and criticisms of escalating conflict. Technical analyses emphasize destructive intent via malware like Intune abuse over ransomware.

Related Articles

Illustration depicting Iranian blockade of Strait of Hormuz, US-Israeli airstrikes on Tehran, and surging oil prices amid escalating conflict.
Image generated by AI

US-Israeli strikes kill Iran's supreme leader, close Strait of Hormuz

Reported by AI Image generated by AI

US-Israeli airstrikes over the weekend killed Iran's Supreme Leader Ayatollah Ali Khamenei, prompting Iranian retaliation across the region and the closure of the Strait of Hormuz. This escalation has driven oil prices above $85 per barrel, the highest since July 2024, amid concerns over disrupted energy flows. Global markets reacted with falling stocks and rising commodity prices.

A prayer app popular in Iran was hacked to send push notifications urging users to surrender as Israeli and US strikes targeted the country. The messages promised amnesty and stated that help was on the way. Residents in Tehran and other cities reported explosions in the early hours of Saturday morning.

Reported by AI

On March 1, Iran attacked Amazon Web Services data centers in the UAE with drones, disrupting digital services in the region. Ten days later, Tasnim news agency, linked to Iran's IRGC, declared offices and infrastructure of Google, Microsoft, IBM, Nvidia, Oracle, and Palantir in Israel and the Gulf as legitimate targets.

The United States and Israel launched a large-scale military offensive against Iran early Saturday, with powerful explosions reported across Tehran and fears mounting of a wider regional war. Israeli Security Minister Israel Katz described the operation as a “preemptive” strike. U.S. President Donald Trump confirmed the start of “large-scale combat operations” to dismantle Iran’s ballistic missile capabilities.

Reported by AI

In a further escalation of the ongoing conflict, Israel's air force struck Revolutionary Guard Corps sites in Tehran and Isfahan on March 12, following initial US-Israeli attacks earlier in the month. Iran retaliated with missiles and drones targeting Israel, US bases, and Gulf states, while attacks on shipping in the Strait of Hormuz—through which 20% of global oil passes—have raised fears of a major energy crisis.

Police suspect the criminal Foxtrot network is commissioning assassination plots against Iranian regime critics and Israeli interests in Sweden, according to sources told SVT. The assignments are reportedly shared via encrypted apps like Signal. Sweden's Security Service warns of threats against individuals seen as dangers to the Iranian regime.

Reported by AI

A cyberattack targeted a car breathalyzer firm, leaving drivers stuck. WIRED covered the incident in its security news published on March 21, 2026.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline