Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
AI에 의해 생성된 이미지

Iran-linked hackers disrupt Stryker's network in apparent retaliation

AI에 의해 생성된 이미지

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

The cyberattack on Stryker, a multinational producer of medical equipment, surfaced on March 11, 2026, amid warnings of retaliatory hacks following US and Israeli airstrikes on Iran in late February. Initial reports came from social media posts by purported Stryker employees and a story in the Irish Examiner, describing wiped phones and computers displaying the Handala Hack logo. The group, active since at least 2023 and named after a Palestinian cartoon character symbolizing resistance, claimed responsibility on its Telegram channel and website. Handala cited the killing of 165 civilians at a girls' school in Iran by a US Tomahawk missile and prior US-Israeli operations against Iran as motivations.

Stryker acknowledged the incident on March 12, stating it faced a "global network disruption to our Microsoft environment as a result of a cyber attack." The company reported no evidence of ransomware or malware, and responders believe the disruption is contained to its internal Microsoft systems. Critical devices such as Lifepak for heart monitoring, Lifenet for patient data management, and Mako for surgeries continue to function normally. In a US Securities and Exchange Commission filing, Stryker noted it has no timeline for restoring normal operations.

Security researchers from Check Point, who track Handala as "Void Manticore," describe the group as affiliated with Iran's Ministry of Intelligence and Security. It has a history of destructive wiping attacks using custom tools, public software, and manual methods, often gaining access via underground services. Analysts suggest the attackers may have exploited Stryker's Microsoft InTune tool to issue deletion commands across its Windows network. Flashpoint researchers highlighted the symbolic targeting of Stryker, a key supplier of lifesaving devices to the US and allies, as a low-cost way for pro-Iranian actors to demonstrate reach while maintaining plausible deniability under a pro-Palestinian persona.

The breach, which reportedly affected tens of thousands of computers, underscores Iran's use of hacker groups for psychological retaliation when military options are limited.

사람들이 말하는 것

Discussions on X highlight the Iran-linked Handala group's claimed wiper cyberattack on Stryker as retaliation for US-Israeli strikes, disrupting global operations but not critical medical devices. Sentiments include alarm over healthcare vulnerabilities and data destruction, geopolitical concerns, calls for bolstered US cybersecurity, and criticisms of escalating conflict. Technical analyses emphasize destructive intent via malware like Intune abuse over ransomware.

관련 기사

Illustration depicting Iranian blockade of Strait of Hormuz, US-Israeli airstrikes on Tehran, and surging oil prices amid escalating conflict.
AI에 의해 생성된 이미지

US-Israeli strikes kill Iran's supreme leader, close Strait of Hormuz

AI에 의해 보고됨 AI에 의해 생성된 이미지

US-Israeli airstrikes over the weekend killed Iran's Supreme Leader Ayatollah Ali Khamenei, prompting Iranian retaliation across the region and the closure of the Strait of Hormuz. This escalation has driven oil prices above $85 per barrel, the highest since July 2024, amid concerns over disrupted energy flows. Global markets reacted with falling stocks and rising commodity prices.

A prayer app popular in Iran was hacked to send push notifications urging users to surrender as Israeli and US strikes targeted the country. The messages promised amnesty and stated that help was on the way. Residents in Tehran and other cities reported explosions in the early hours of Saturday morning.

AI에 의해 보고됨

3월 1일, 이란은 드론으로 아랍에미리트에 있는 Amazon Web Services 데이터 센터를 공격하여 이 지역의 디지털 서비스를 중단시켰습니다. 열흘 후, 이란의 IRGC와 연계된 타스님 통신은 이스라엘과 걸프 지역에 있는 구글, 마이크로소프트, IBM, 엔비디아, 오라클, 팔란티르의 사무실과 인프라를 합법적인 공격 대상이라고 선언했습니다.

The United States has deployed an aircraft carrier strike group to Middle Eastern waters, as Tehran warns of retaliation against any American attack in response to the crackdown on anti-government protests. Rights groups have confirmed nearly 6,000 deaths in the protests suppressed by Iranian security forces, though the actual toll could be several times higher. An 18-day internet shutdown has obscured the full extent of the violence.

AI에 의해 보고됨

The United States and Israel launched a large-scale military offensive against Iran early Saturday, with powerful explosions reported across Tehran and fears mounting of a wider regional war. Israeli Security Minister Israel Katz described the operation as a “preemptive” strike. U.S. President Donald Trump confirmed the start of “large-scale combat operations” to dismantle Iran’s ballistic missile capabilities.

Argentina's secretariat of state intelligence (side) confirmed it neutralized a distributed denial-of-service (ddos) cyberattack on the foreign ministry's official website. The incident is attributed to a hacktivist campaign linked to the country's recent entry into the board of peace, promoted by the united states. No damage to systems was reported.

AI에 의해 보고됨

Police suspect the criminal Foxtrot network is commissioning assassination plots against Iranian regime critics and Israeli interests in Sweden, according to sources told SVT. The assignments are reportedly shared via encrypted apps like Signal. Sweden's Security Service warns of threats against individuals seen as dangers to the Iranian regime.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부