On March 11, 2026, medical technology company Stryker disclosed a cybersecurity incident in which attackers disrupted the company’s global operations, left employees locked out of corporate systems, and caused delays in manufacturing, order processing, and shipping of medical devices to hospitals. The Iran-linked group Handala, since linked by U.S. law enforcement action to Iran’s Ministry of Intelligence and Security (MOIS), claimed responsibility. The FBI has since seized multiple Handala websites and CISA issued emergency guidance to the healthcare sector.
What makes this incident significant for healthcare security leaders isn’t just the scale. It’s the method. Attackers compromised privileged administrator credentials and used Microsoft Intune’s legitimate device management functions to remotely wipe approximately 80,000 corporate devices. While Stryker initially stated no malware was involved, subsequent investigation revealed that a malicious file was used to conceal attacker activity within its systems. The tools worked as designed. The identity governance around them didn’t.
