On March 11, 2026, Stryker Corporation, one of the world’s largest medical technology companies, woke up to a global crisis. Within hours, 200,000+ devices across 79 countries were wiped. Manufacturing stopped. Offices shut down. A 9% stock drop followed.
This incident, now widely referred to as the Stryker Cyberattack 2026, is being studied as one of the most destructive wiper attacks against a healthcare technology company in recent years.
What Happened?
Iran-linked hacking group Handala executed a large-scale wiper attack against Stryker’s global IT environment, targeting the company’s Microsoft infrastructure and using enterprise device management tools as a weapon.
In their own words, the attackers claimed to have:
Wiped 200,000+ servers, laptops, and mobile devices
Stolen 50 TB of company data
Forced office shutdowns across 79 countries
Stryker confirmed the breach via an SEC 8-K filing, describing a “severe global disruption to the Company’s Microsoft environment.”
The Stryker Microsoft Intune attack, as security researchers are calling it, highlights how enterprise device management platforms can become powerful attack vectors when privileged access is compromised.
Timeline of the Stryker Cyberattack
Understanding the timeline of the Stryker cyberattack helps illustrate how quickly a global enterprise can be disrupted once attackers gain control of privileged infrastructure.
Early March 2026
Attackers likely gain initial access through exposed credentials or phishing.
Days before the attack
Privilege escalation occurs as attackers move laterally through Stryker’s network environment.
March 11, 2026 – 3:30 AM EST
A mass device wipe command is triggered through Microsoft Intune.
Morning of March 11
Employees worldwide arrive to find wiped devices and inaccessible systems.
Later that day
Stryker files an SEC 8-K confirming a severe disruption to its Microsoft environment.
Following days
Stryker’s stock drops approximately 9% as the scale of the disruption becomes public.
Who Is Handala?
Handala is not a loosely organized hacktivist group. Multiple threat intelligence firms, including Check Point Research and Palo Alto Networks, have confirmed ties between the group and Iran’s Ministry of Intelligence and Security (MOIS).
The group emerged in December 2023 following the October 7 Hamas attacks and has since targeted Israeli and Western civilian infrastructure, with a particular focus on healthcare, energy, and defense supply chains.
Their motive here was ideological. Stryker acquired Israeli medtech firm OrthoSpace in 2019 and holds contracts with the US Department of Defense. Handala cited Stryker’s Israeli business connection, as well as a deadly strike on a girls’ school in Minab, Iran, as justification for the attack.
How Did the Attack Happen?
This is the part every security leader needs to understand.
Handala did not breach Stryker through a zero-day exploit. They used Stryker’s own enterprise tools against it.
The most dangerous cyber weapon in this attack was not malware.
It was trusted enterprise infrastructure.
Step 1: Initial Access
Attackers gained entry, likely through phishing or exploitation of externally exposed credentials, days or weeks before the attack.
Step 2: Privilege Escalation
Lateral movement through the network until they achieved admin-level access to Microsoft Active Directory and Azure Entra ID.
Step 3: Intune Weaponized
Microsoft Intune, a cloud-based device management platform used by IT teams to configure and push policies to every enrolled device, was hijacked. With admin access, it becomes a global kill switch.
Step 4: The Wipe
At approximately 3:30 AM EST on March 11, a mass factory reset was triggered across all enrolled devices globally.
Employees arrived at work to blank screens. The Handala logo appeared on Entra login pages. Up to 95% of devices in some departments were erased before any response was possible.
The core vulnerability was not a software flaw. It was privileged access to a trusted platform, ungoverned.
What Was the Impact?
Operational
Global manufacturing, order processing, and shipping halted. 56,000 employees told to power down devices immediately.
Healthcare
Stryker’s Lifenet ECG transmission platform, used by emergency medical services to relay patient data to hospitals, was reported non-functional across parts of Maryland.
Financial
Stryker shares fell approximately 9% following the incident. Full financial impact remains under investigation.
According to industry research such as IBM’s Cost of a Data Breach Report, the average breach cost in healthcare exceeds $10 million, the highest of any industry. Large-scale operational disruptions like the Stryker attack can push losses far beyond that figure when manufacturing, logistics, and healthcare services are impacted.
What was NOT affected
Patient-facing medical devices including Mako surgical robots and LifePak35 monitors operate on independent networks and remained safe.
What CISOs Must Take Away
1. MDM platforms are crown jewels, treat them accordingly.
Admin access to Microsoft Intune or JAMF is effectively a factory-reset trigger for your entire organization. MFA, privileged access workstations, and just-in-time access controls for MDM admin accounts are non-negotiable.
2. Wiper attacks need a different recovery plan.
Ransomware locks your data. Wipers destroy it. Most BCPs are not built for total endpoint loss. Test your mass reprovisioning capability before an attacker forces you to.
3. Geopolitical risk is now cyber risk.
Any organization with acquisitions, contracts, or supply chain ties in geopolitically sensitive regions carries inherited threat actor attention. This is now a board-level risk input, not just a security team concern.
4. External exposure is where it starts.
Handala’s access began with publicly accessible systems. Every exposed asset with weak credentials is a potential entry point.
How Zeron Addresses These Risks
The Stryker cyberattack is a case study in what happens when cyber risk remains a technical problem rather than a business decision.
Externo continuously maps your external attack surface, identifying exposed assets and vulnerable entry points before attackers find them. Handala’s access began with publicly facing systems, and Externo ensures yours are never an open door.
Interno monitors internal risk and insider threat indicators across your environment. Once Handala was inside Stryker’s network, lateral movement and privilege escalation went undetected long enough to reach the crown jewels. Interno is built to catch exactly that.
Vendor Pulse assesses the cyber risk posture of your third-party vendors and supply chain continuously. Hospitals that depended on Stryker’s systems had no visibility into the risk they were inheriting. Vendor Pulse closes that blind spot.
ZIN Advisor, Zeron’s agentic AI risk copilot, gives security teams continuous, prioritized intelligence on active threats, closing the gap between detection and action.
The goal is not to react faster. It is to know more, earlier, and make better decisions.
Understand your cyber risk in financial terms before the next attack lands.
The goal is not to react faster. It is to know more, earlier, and make better decisions.
Final Thought
The Stryker cyberattack 2026 demonstrates a new reality for modern enterprises.
Attackers no longer need sophisticated malware to shut down a global company.
Sometimes all they need is admin access to the tools you trust the most.
Understand your cyber risk in financial terms before the next attack lands.