> Back to All Posts

Stryker Cyberattack Wiped 80,000 Devices in Hours

Stryker cyberattack

The Stryker cyberattack did not follow the usual playbook. There was no ransomware, no malicious code, and no encrypted files waiting on a ransom demand. Instead, attackers turned a legitimate Microsoft tool against one of the world’s largest medical device companies and wiped approximately 80,000 employee devices in less than three hours.

The incident, which began on March 11, 2026, sent shockwaves through the cybersecurity industry. Not because of what the attackers brought with them, but because of what they did not need to bring at all.

What Is Stryker and Why Does It Matter?

Stryker Corporation is a Fortune 500 medical technology company headquartered in Michigan. It manufactures surgical tools, orthopedic implants, hospital beds, and medical imaging systems. With over 56,000 employees across 61 countries and more than $22 billion in annual revenue, it is a critical part of global healthcare infrastructure.

That scale made it an effective target. A disruption to Stryker’s internal systems does not just hurt one office. It ripples across supply chains, hospitals, and surgical teams worldwide.

How the Stryker Cyberattack Actually Worked

The attackers first compromised an administrator account inside Stryker’s Microsoft environment. From there, they created a new Global Administrator account, which gave them unrestricted control over the company’s device management platform.

That platform is Microsoft Intune, a cloud-based service companies use to manage and secure employee devices remotely. It is a legitimate, widely-used enterprise tool. Security teams use it to push software updates, enforce security policies, and, when needed, remotely wipe devices that are lost or stolen.

The attackers used that last feature as a weapon.

Between 5:00 and 8:00 a.m. UTC on March 11, they issued wipe commands across Stryker’s managed device fleet. Employees in multiple countries woke up to find their laptops and phones completely erased overnight. In some offices, up to 95% of endpoints were wiped before the company could contain the damage.

Because the attack used a built-in system feature rather than malicious software, traditional endpoint detection tools found nothing to flag. No malware signatures. No suspicious binaries. Just a wave of factory reset commands issued from a trusted admin account.

Who Claimed Responsibility

A group called Handala claimed the Stryker cyberattack shortly after it happened. The group presents itself as a pro-Palestinian hacktivist collective, but cybersecurity researchers at Palo Alto Networks assess it operates under Iran’s Ministry of Intelligence and Security. It is also linked to the threat actor known as Void Manticore.

Handala claimed it wiped over 200,000 systems and stole 50 terabytes of corporate data. Investigators found no evidence of data exfiltration. The confirmed device count sits at approximately 80,000. The group framed the attack as a political response to U.S. military action in Iran, calling it “the start of a new era in cyber warfare.”

The Operational Fallout

The Stryker cyberattack caused immediate and widespread disruption. Order processing, manufacturing, and shipping systems went offline. Electronic ordering remained unavailable, forcing customers to place all orders manually through sales representatives. Stryker’s stock dropped more than 3% in the aftermath.

The company filed an 8-K disclosure with the U.S. Securities and Exchange Commission and confirmed it has no fixed timeline for full system restoration.

One critical distinction held: medical devices across Stryker’s global portfolio remained unaffected. Life-saving and connected technologies were isolated from the internal Microsoft environment that took the hit. Cloud-hosted platforms operating on separate infrastructure, including those hosted on AWS and Google Cloud, also remained operational.

What This Attack Changes

The Stryker cyberattack is a clear example of what security researchers call a “living-off-the-land” attack. The threat actor used no custom tools. They used the company’s own infrastructure against it.

This approach has a key advantage for attackers. Security systems are built to detect foreign code, unusual processes, and known malware signatures. They are not built to question whether a Global Administrator issuing wipe commands at 5 a.m. is actually authorized to do so.

The investigation is being led by Microsoft’s Detection and Response Team alongside Palo Alto Unit 42. Security researchers believe phishing or infostealer malware may have provided the initial foothold to compromise the admin account. Whether multi-factor authentication was in place on that account remains unknown.

Final Thoughts

The Stryker cyberattack is a turning point in how organizations need to think about cloud security. The threat did not come from a virus. It came from a compromised set of credentials and a legitimate admin tool.

For companies running Microsoft Intune or similar endpoint management platforms, this is a direct warning. Access controls, multi-factor authentication, and audit logging on administrator accounts are not optional extras. They are the last line of defense when attackers decide to use your own tools against you.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.