Company says it doesn’t know how long it will take to restore its Microsoft environment.
Within hours of the US and Israel launching airstrikes on Iran two weeks ago, security professionals warned organizations around the world to be on heightened watch for destructive retaliatory hacks. On Wednesday, the predictions appeared to come true as Stryker, a multinational maker of medical devices, confirmed a cyberattack that took down much of its infrastructure, and a hacking group long known to be aligned with the Iranian government claimed responsibility.
Where things stand
When and how did the attack come about?
The first indications were social media posts and a report from a news organization in Ireland. Messages posted by purported Stryker employees or their family members on social media said workers’ phones and computers had been wiped. A report the Irish Examiner published Wednesday morning, citing multiple anonymous sources, made the same claims and said some employees witnessed login pages on wiped devices displaying the logo of Handala Hack, a group that researchers who have followed it for years say is aligned with the Iranian government.
What is the status now?
Stryker said Thursday that it’s in the midst of responding to a “global network disruption to our Microsoft environment as a result of a cyber attack.” The update went on to say responders have no indication that ransomware or malware—the usual causes for such outages—were involved. The responders believe the incident is now contained and limited to the internal Microsoft environment.
The company did say that Lifepak, Lifenet, and Mako devices—which medical professionals use to monitor for and control heart attacks, manage and transmit patient information in real time, and perform surgeries—were all functioning normally. In a Securities and Exchange Commission filing on Wednesday, Stryker said it had no timeline for recovering normal day-to-day activities.
How was Stryker’s network breached in the first place?
That information isn’t yet known publicly. That leaves outsiders to make educated guesses. Iran-sponsored hackers have a long history of using wiper malware to permanently destroy data and the hard drives that store it. Shamoon, a wiper that targeted Saudi Aramco, the world’s largest exporter of crude oil, in 2012 and again struck Saudi Arabian organizations four years later, has been linked to Iran, although not conclusively. In 2019, researchers reported the discovery of a new wiper, dubbed ZeroCleare, that has also been linked to Iran.
There are reasons to believe that the attack against Stryker may not have fit this precise pattern. For one, Stryker has said that it has yet to find evidence of malware. And for another, some social media posts—and an unnamed source cited in this report from KrebsOnSecurity—indicate the data wiping was carried out using InTune, a tool made by Microsoft that allows administrators to remotely control large fleets of machines from a single interface.
What’s more, security firm Check Point said that “Void Manticore,” its internal tracking name for Handala Hack, has historically used both custom-built and publicly available tools and manual hands-on techniques for data wiping. Company researchers also said that the group often relies on underground criminal services to obtain initial access to targets, a means that may have been used against Stryker.
Taken together, these considerations may indicate that the threat actors accessed Stryker’s InTune interface through an access broker or other means and used the tool to issue deletion commands throughout the company’s Windows network.
What else is known about Handala Hack?
The group has existed since at least 2023. It takes its name from a character in the political cartoons of Palestinian artist Naji al-Ali. The group’s logo depicts a small Palestinian boy who is a symbol associated with Palestinian resistance.
Check Point and other security firms have said Handala Hack is affiliated with Iran’s Ministry of Intelligence and Security and maintains multiple online personas. Compared to other nation-state-sponsored hacking groups, Handala Hack has kept a comparatively lower profile. Still, it has carried out a series of destructive wiping attacks and influence operations over the years.
Around the same time the Stryker attack came to light, posts to a Telegram account and website controlled by Handala Hack took credit for the takedown. Handala posts cited last week’s killing of 165 civilians at a girls’ school in Iran by an American Tomahawk missile and past hacking operations that the US and Israel have perpetuated on Iran.
What is the point of striking a corporation in retaliation for airstrikes carried out by the US and Israel?
Such actions are taken for their psychological effects, which are often disproportionately larger than the resources required to bring them about. With limited means for Iran to strike back militarily, the Stryker disruption allows an alternative means for the country and its allies to retaliate. The success is intended to demonstrate that pro-Iranian forces can still exact a price that has a material effect on large populations in the US, Israel, and countries allied with them.
As a major supplier of lifesaving medical devices relied on throughout the US and its allies, Stryker plays a strategic and symbolic role in their security, researchers at Flash Point said Thursday. “By operating behind a persona styled as a grassroots, pro-Palestinian resistance movement, Iranian state-nexus actors are able to conduct destructive cyber operations against Western organizations while maintaining a degree of plausible deniability.”
Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.



