Blog
|

On March 11, 2026, medical technology company Stryker disclosed a cybersecurity incident in which attackers disrupted the company’s global operations, left employees locked out of corporate systems, and caused delays in manufacturing, order processing, and shipping of medical devices to hospitals. The Iran-linked group Handala, since linked by U.S. law enforcement action  to Iran’s Ministry of Intelligence and Security (MOIS), claimed responsibility. The FBI has since seized multiple Handala websites and CISA issued emergency guidance to the healthcare sector

What makes this incident significant for healthcare security leaders isn’t just the scale. It’s the method. Attackers compromised privileged administrator credentials and used Microsoft Intune’s legitimate device management functions to remotely wipe approximately 80,000 corporate devices. While Stryker initially stated no malware was involved, subsequent investigation revealed that a malicious file was used to conceal attacker activity within its systems. The tools worked as designed. The identity governance around them didn’t.

The tools worked as designed. The identity governance around them didn’t.

The Compliance Gap

Why this Matters Under the Proposed HIPAA Security Rule Update

The proposed HIPAA Security Rule update would eliminate the distinction between addressable and required safeguards, making all implementation specifications mandatory. For healthcare organizations managing ePHI across cloud, hybrid, and on-premises environments, the Stryker incident exposes exactly the kind of identity-plane vulnerability that auditors will be looking for. 

Identity and Access Management

HIPAA’s access control requirements under § 164.312(a) would require documented, enforceable controls over who can access ePHI systems. The Stryker case shows what happens when a single Global Administrator account provides broad, standing access  to an entire device management environment. If one compromised identity can wipe thousands of endpoints, that same identity could access, exfiltrate, or destroy ePHI.

Cyber Resilience Assessment

Evaluate identity and access controls across your cloud, hybrid, and on-premises environment, identifying where standing privilege creates compliance exposure and mapping gaps directly to HIPAA Security Rule requirements

Evaluate your HIPAA security posture

Audit Controls and Visibility

Under § 164.312(b), organizations must maintain audit logs that can detect unauthorized activity. Remote device management commands are legitimate administrative operations. Without correlation between identity sign-in events and device management actions, destructive commands can execute without triggering alerts.

Managed Detection and Response

24/7 monitoring that correlates identity events with administrative actions across cloud and hybrid environments, detecting the kind of anomalous privileged activity that preceded the Stryker disruption — regardless of which cloud platform or endpoint management tool you run.

See how Armor MDR detects identity threats

Contingency Planning

HIPAA § 164.308(a)(7) requires tested contingency plans  for restoring access to ePHI. The proposed HIPAA Security Rule update would go further, introducing a 72-hour system restoration requirement and a 24-hour incident notification timeline.

Stryker activated its incident response plan and engaged Palo Alto Networks Unit 42, but the disruption still caused nearly two weeks of operational impact, including delayed surgeries at hospitals dependent on Stryker devices.

Separate from the device wipes, Handala has claimed large-scale data exfiltration, and class action lawsuits have since been filed alleging failure to protect sensitive information. If confirmed, this would trigger breach notification obligations under HIPAA § 164.408 for any ePHI involved.

Secure and Compliant Cloud

Build and test contingency plans that account for identity-plane compromise. Armor Enterprise Cloud provides a hardened private cloud environment for regulated workloads, while Armor Agent for Servers secures applications wherever they run.

Explore secure infrastructure for regulated workloads

The Counterpoint

The Identity-First Attack Pattern 

The Stryker case represents a broader shift in how threat actors target healthcare environments. Rather than relying solely on traditional malware, threat actors are increasingly targeting the control plane itself: the identity systems that manage devices, users, and access. 

This approach is effective because it uses an organization’s own administrative tools against it. When a privileged identity is compromised, an attacker can issue device wipes, modify compliance policies, deploy scripts, and change access controls using the same admin functions your IT team uses every day. The attack surface isn’t the tool. It’s the gap between the tool’s capabilities and how tightly the organization governs access to them. Traditional endpoint detection may miss the destructive phase entirely because the wipe commands originate from a trusted management platform. 

The Stryker incident involved Microsoft’s identity and device management stack, but the root cause was how privileged access was governed, not a flaw in the platform. The same risk exists in any cloud or hybrid environment where privileged identities control critical infrastructure. Whether your organization runs Microsoft, Oracle, AWS, or a multi-cloud environment, the question is the same: are the identities that administer your endpoints and ePHI systems protected with the same rigor as the data they can access? 

Rather than relying solely on traditional malware, threat actors are increasingly targeting the control plane itself…

…the root cause was how privileged access was governed, not a flaw in the platform.

How it Happened

From Compromised Credential to Operational Disruption

Initial access Privilege Execution Impact Consequence Privileged credentials compromised Global Admin or equivalent role Legitimate sign-in Entra ID authentication Attacker passes MFA or bypasses it Admin console access Device management console Intune admin functions available Remote wipe commands Mass device wipe executed Laptops, phones, servers wiped Operational disruption Manufacturing, shipping halted Patient care impact Surgeries delayed at hospitals No malware needed legitimate admin tools No endpoint alerts trusted platform action
The Checklist

What to Evaluate in Your Own Environment 

If the Stryker incident prompts a review of your identity security posture, the good news is that the controls to prevent this kind of attack already exist. Microsoft and other cloud providers offer robust privileged access management capabilities. The gap is in adoption and configuration. CISA’s post-incident guidance reinforces what these platforms already make possible: 

Inventory Privileged Identities

Know exactly who holds Global Administrator, Intune Administrator, and similar Entra ID roles. Standing broad access is the primary risk factor the Stryker incident exposed.  

Require Phishing-Resistant MFA for All Admin Accounts

Standard MFA is a baseline. Phishing-resistant methods (FIDO2 keys, certificate-based authentication) significantly reduce the risk of credential theft that likely preceded the Stryker compromise. The proposed HIPAA Security Rule update would make MFA mandatory for all information systems containing ePHI, elevating this from a best practice to a regulatory requirement.

Implement Just-In-Time Privileged Access

Microsoft Entra Privileged Identity Management allows admin rights to be temporary and re-authenticated when elevated, rather than always-on. 

Require Multi-Admin Approval for Destructive Actions

Device wipes, policy changes, and script deployments should require a second authorized administrator. This single control could have significantly limited the mass wipe that disrupted Stryker’s global operations. 

Correlate Entra Sign-Ins with Intune Audit Logs

Detecting an admin signing in from an unusual location and immediately issuing wipe commands requires connecting identity events to device management events. Without this correlation, the attack looks like business as usual. 

The Takeaway

The Compliance Connection

For healthcare CISOs preparing for the updated HIPAA Security Rule, the Stryker incident isn’t a cautionary tale. It’s a preview of the evidentiary standard auditors will apply. The proposed rule would require organizations to demonstrate that access controls, audit logging, and contingency plans are operationalized, not just documented. 

An environment where a single compromised identity can cause enterprise-wide disruption is an environment that fails that evidentiary standard. 

The priority is not just securing your device management tools. It’s securing the identities that can administer them. That means reducing standing privilege, strongly verifying the admin at sign-in, and making destructive actions require another human to approve.

Logo for ArmorNancy Free Chief Risk Officer Armor

About Armor

Armor is a global leader in cloud-native managed detection and response. Trusted by over 1,700 organizations across 40 countries, Armor delivers cybersecurity, compliance consulting, and 24/7 managed defense built for transparency, speed, and results. By combining human expertise with AI-driven precision, Armor safeguards critical environments to outpace evolving threats and build lasting resilience. For more information visit our website, follow us on LinkedIn, or request a free Cyber Resilience assessment.