A significant cybersecurity incident in the medical technology sector has hit global medtech manufacturer Stryker, where attackers remotely erased data on approximately 80,000 devices. The operation was executed through Microsoft’s corporate device management platform Microsoft Intune, without deploying traditional malware or ransomware, underscoring how abuse of legitimate cloud tools can cause large-scale damage.
How the Stryker Cyberattack Unfolded: From Admin Compromise to Mass Remote Wipe
According to Stryker and sources familiar with the investigation, the attackers initially compromised an administrative account in the company’s Microsoft environment. With that foothold, they created a new user with Global Administrator privileges, effectively gaining full control over Stryker’s Microsoft 365 and Intune infrastructure.
Armed with Global Administrator rights, the adversaries used Microsoft Intune to push a large-scale remote wipe command. Remote wipe is a legitimate mobile device management (MDM) function designed to securely erase data from lost or stolen devices. In this case, it was repurposed as a destructive capability, resulting in data being deleted from around 80,000 endpoints between 05:00 and 08:00 UTC on 11 March 2026.
The attack affected not only corporate laptops and mobile devices but also employees’ personal devices enrolled under BYOD (bring your own device) policies and managed through Intune. This highlights a key BYOD risk: once a personal device is brought under corporate MDM control, a compromised admin can apply the same destructive policies to it as to company-owned hardware.
Handala Claims vs. Forensic Reality: No Ransomware, No Proven Data Theft
The Iran-linked hacktivist group Handala publicly claimed responsibility, asserting that it had wiped over 200,000 Stryker devices and exfiltrated about 50 TB of sensitive data. However, the findings of the joint investigation paint a different picture.
Analysis by Stryker, Microsoft Detection and Response Team (DART) and Palo Alto Networks Unit 42 has so far found no indicators of:
- deployed ransomware or classic malicious payloads;
- active data-encrypting malware campaigns;
- confirmed large-scale data exfiltration matching Handala’s claims.
Crucially, the company states that Stryker medical devices were not affected. The incident was contained to internal Microsoft cloud infrastructure and associated endpoints. Clinical devices in hospitals and other healthcare facilities remained operational and safe to use.
Operational Impact on Stryker and Healthcare Supply Chains
While patient-facing equipment was not compromised, the mass erasure of data on workstations and mobile devices significantly disrupted Stryker’s internal operations. The company’s immediate priority became restoring:
- order processing and sales systems;
- logistics and supply chain workflows;
- shipping and fulfillment processes for customers worldwide.
Stryker has assured customers that all orders placed before and during the attack will be fulfilled once systems are fully restored. Nonetheless, any delay in medical device deliveries can directly impact healthcare providers’ ability to deliver timely care—similar to the knock-on effects seen during past healthcare cyber incidents such as the 2017 WannaCry outbreak that disrupted parts of the UK’s National Health Service.
FBI Seizure of Handala Domains and Ongoing Threat Activity
In response to the group’s broader activity, the FBI has seized two domains associated with Handala: handala-redwanted[.]to and handala-hack[.]to. Both domains now display a seizure notice issued under a warrant from the U.S. District Court for the District of Maryland.
The DNS records for these domains have been repointed to ns1.fbi.seized.gov and ns2.fbi.seized.gov. Official documentation describes the domains as having been used to conduct “malicious cyber activity on behalf of a foreign state.” It remains undisclosed whether law enforcement has obtained access to underlying server content or activity logs.
Handala acknowledged the takedowns on its Telegram channel and stated its intention to build a more resilient infrastructure. This response reinforces a critical reality: seizing domains and infrastructure may disrupt operations, but it rarely eliminates a determined threat actor.
Key Security Lessons: Protecting Microsoft Intune, MDM and Privileged Accounts
This incident is a clear illustration of how identity and cloud control-plane compromise can be as destructive as any malware campaign. By abusing legitimate tools like Intune, attackers conducted a “living off the land” operation—using built‑in administrative capabilities against the organization itself.
Industry reports such as Verizon’s Data Breach Investigations Report consistently show that the majority of breaches involve stolen or misused credentials rather than zero‑day exploits. Against that backdrop, the Stryker attack reinforces several best practices for enterprises relying on Microsoft 365 and MDM platforms:
- Harden privileged accounts: Enforce strong multi‑factor authentication (MFA), use dedicated “privileged access workstations” for admin tasks, and strictly prohibit daily work under admin accounts.
- Minimize Global Administrators: Keep the number of Global Admins as low as possible, use just‑in‑time elevation where feasible, and perform regular reviews of admin roles and activity logs.
- Segment corporate and BYOD management: Apply different policies and risk thresholds to personal devices, and carefully consider whether full remote wipe should ever be allowed for BYOD endpoints.
- Restrict high‑impact MDM actions: Gate operations such as mass remote wipe behind additional approvals, change‑management processes, and near real‑time monitoring and alerting.
- Adopt a Zero Trust model: Assume compromise, continuously verify user and device health, use conditional access policies, and monitor for anomalous behavior across Microsoft 365 and Intune.
- Test incident response for cloud and MDM abuse: Regularly run tabletop exercises and technical drills focused specifically on compromised admin accounts and malicious configuration changes in MDM platforms.
This attack on Stryker underscores that even highly regulated, technologically mature organizations remain vulnerable when the risks of cloud-based device and identity management are underestimated. Treating Microsoft 365, Intune and other MDM solutions as core “crown jewels,” rigorously protecting privileged access, and continuously monitoring for abnormal administrative activity are now essential steps for any organization that wants to reduce the likelihood and impact of similar attacks.