Greater than per week after the blistering March 11 cyberattack on Stryker, the Michigan-based medtech firm continues to revive techniques to resume regular operations.
The assault, claimed by Iran-linked menace actor Handala, affected the corporate’s ordering, processing, delivery and manufacturing. In a publish on X, Handala asserted that it wiped information from 200,000 techniques, servers, laptops and cell gadgets, stealing 50 TB of information and forcing places of work in 79 international locations to shut. The publish claimed, “All of the acquired information is now within the arms of the free folks of the world, prepared for use for the true development of humanity.”
Representatives for Stryker maintained that no malware or ransomware was concerned, and that the incident was contained to the corporate’s inside Microsoft surroundings. Safety consultants have since raised issues about endpoint administration instruments such as Microsoft Intune, which was used in the course of the assault.
This week’s information is proof that any group is prone to cyberattacks and emphasizes the necessity for safety groups to focus not solely on prevention, but additionally on proactive catastrophe restoration (DR) efforts that, in a worst-case situation, can swiftly restore techniques and assist guarantee enterprise continuity.
Stryker‘s manufacturing, delivery disrupted after cyberattack
The cyberattack on Stryker disrupted the firm’s manufacturing and delivery operations, elevating issues in regards to the ripple results of such incidents on provide chains. The disruption underscores the vulnerability of essential operational techniques to cyberthreats and the rising dangers for producers reliant on interconnected techniques.
Stryker said, “We’re working diligently to revive our techniques and, above all, we’re dedicated to making sure our prospects can proceed to ship seamless affected person care.”
Stryker assault raises issues about position of gadget administration softwares
The Stryker cyberattack uncovered safety issues about Microsoft Intune, a broadly used gadget administration software. Handala hackers used Intune to remotely wipe information from hundreds of gadgets, disrupting Stryker’s inside operations.
Researchers from anti-ransomware vendor Halcyon reported that the payload utilized by the attackers included distant wipe instructions, which deleted information from affected gadgets. To conduct such an assault, the researchers mentioned, the malicious actor would wish Intune administrator or international administrator privileges. Whereas Stryker confirmed that its medical gadgets and affected person providers remained unaffected, the assault underscores important issues in regards to the safety of gadget administration instruments.
Stryker’s outage is a DR wake-up name
The Stryker outage serves as a stark reminder of the significance of DR planning. The assault highlighted gaps in preparedness and the essential want for resilient restoration methods.
The incident additionally underscores the necessity for enterprises to reassess their DR frameworks to mitigate operational and reputational injury. International organizations resembling Stryker are inclined to important injury from assaults as a result of their information tends to be fragmented and advanced, which might gradual restoration after an incident.
Stryker begins restoring techniques after cyberattack
In keeping with an organization assertion, restoration efforts at Stryker are “progressing steadily.” The medical gadget producer reported that the incident has been contained and that it has carried out measures to deal with the delays brought on by the occasion, although it has not disclosed particular particulars in regards to the assault or its origins.
Stryker didn’t present a timeline for the complete resumption of operations. A spokesperson for the corporate mentioned, “We’re actively bringing our techniques again on-line and are prioritizing techniques that immediately assist prospects, ordering and delivery.”
CISA urges enhanced endpoint security
CISA has known as on U.S. organizations to strengthen endpoint safety following the Stryker cyberattack. In collaboration with Microsoft and Stryker, CISA suggested implementing role-based entry management, privileged identification administration, phishing-resistant MFA and secondary administrative approval for high-level adjustments.
Richard Livingston is an editor with Informa TechTarget’s SearchSecurity web site, protecting cybersecurity information, traits and evaluation.









