Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Stryker attack wiped tens of thousands of devices, no malware needed
    Cybersecurity

    Stryker attack wiped tens of thousands of devices, no malware needed

    adminBy adminMarch 16, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Stryker attack wiped tens of thousands of devices, no malware needed
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Stryker attack wiped tens of thousands of devices, no malware needed

    Last week’s cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices.

    The organization says in an update on Sunday that all its medical devices are safe to use but electronic ordering systems remain offline, and customers must place orders manually through sales representatives.

    Stryker emphasizes that the incident was not a ransomware attack and that the threat actor did not deploy any malware on its systems.

    Last week, Stryker was the target of a cyberattack claimed by the Handala hacktivist group, believed to be linked to Iran.

    The attacker alleged that they wiped “over 200,000 systems, servers, and mobile devices” and stole 50 terabytes of data. However, investigators did not find any indication that data was exfiltrated.

    Following the disruption, Stryker employees in multiple countries started to complain that their managed devices had been remotely wiped overnight.

    Some employees had their personal devices enrolled in the company network and lost personal data during the wiping process.

    Hackers had Global Admin privileges

    A source familiar with the attack told BleepingComputer that the threat actor used the wipe command in Intune, Microsoft’s cloud-based endpoint management service, to erase data from nearly 80,000 devices between 5:00 and 8:00 a.m. UTC on March 11.

    The attacker carried out the action after compromising an administrator account and creating a new Global Administrator account.

    The investigation is being conducted by the Microsoft Detection and Response Team (DART) in collaboration with cybersecurity experts from Palo Alto Unit 42.

    Stryker’s update highlights that the attack did not impact any of its products, connected or otherwise, and was limited exclusively to the internal Microsoft corporate environment.

    “All Stryker products across our global portfolio, including connected, digital, and life-saving technologies, remain safe to use,” the company says.

    Restoration efforts are currently underway, the main focus being on resuming shipping and transactional services. Customers are encouraged to maintain normal communication with company personnel while the infrastructure is steadily recovered.

    Any order placed before the cyberattack will be honored as systems are restored, while those placed during the disruption will be processed when systems are back online, and the supply flow resumes to normal.

    The company is working with its global manufacturing sites to deal with potential operational impact.

    Stryker’s current priority is to restore the supply-chain system and resume customer orders and shipping. “Our core transactional systems are already on a clear path to full recovery,” the company says.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Attack Devices Malware needed Stryker tens thousands wiped
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAI Search Barely Cites Syndicated News Or Press Releases
    Next Article Samsung says Privacy Display can limit Galaxy S26 Ultra visibility
    admin
    • Website

    Related Posts

    This popular image-saving Chrome extension was just flagged as malware

    March 16, 2026

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    March 16, 2026

    Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact

    March 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This popular image-saving Chrome extension was just flagged as malware

    March 16, 2026

    Cisco extends its Secure AI Factory with Nvidia

    March 16, 2026

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    March 16, 2026

    AI Content Wasn’t Good Enough. Now It Is.

    March 16, 2026
    Categories
    • Blogging (41)
    • Cybersecurity (806)
    • Privacy & Online Earning (123)
    • SEO & Digital Marketing (495)
    • Tech Tools & Mobile / Apps (991)
    • WiFi / Internet & Networking (131)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This popular image-saving Chrome extension was just flagged as malware

    March 16, 2026

    Cisco extends its Secure AI Factory with Nvidia

    March 16, 2026

    Telus Digital confirms hack as ShinyHunters claims credit for massive data theft

    March 16, 2026
    Most Popular
    • This popular image-saving Chrome extension was just flagged as malware
    • Cisco extends its Secure AI Factory with Nvidia
    • Telus Digital confirms hack as ShinyHunters claims credit for massive data theft
    • AI Content Wasn’t Good Enough. Now It Is.
    • Samsung says Privacy Display can limit Galaxy S26 Ultra visibility
    • Stryker attack wiped tens of thousands of devices, no malware needed
    • AI Search Barely Cites Syndicated News Or Press Releases
    • You Can Finally Get an Apple Watch Ultra 2 for Under $500
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.