Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Stryker Windows Attack: Who, What, Why

Image © Arstechnica
A major medical-device maker's Windows network has been disrupted by a wiper-style cyberattack, with attribution to Handala Hack and no clear restoration timeline.

Security researchers warned of destructive cyber actions following recent geopolitical tensions, and that warning appears to have materialized as Stryker confirmed a global disruption to its Microsoft environment. The company said there is no current evidence of ransomware or traditional malware. The incident is believed to be contained within the Windows domain, with Lifepak, Lifenet, and Mako devices continuing to operate normally.

What happened

Initial signals surfaced on social media and in Irish press reports, with purported Stryker employees or their families saying workstations and mobile devices had been wiped. Observers noted login pages on wiped devices displaying a Handala Hack logo, a group researchers link to Iran’s government.

Current status

Stryker stated it is responding to a global network disruption affecting its Microsoft environment and emphasized that there is no indication of ransomware or malware. The firm said the incident is contained to the internal Microsoft environment and that patient-monitoring devices remain functional.

What analysts think

Experts have offered different theories. Some point to using Microsoft Intune to issue wipe commands, while others note that the attack may involve wiper malware. Check Point researchers described Handala Hack as an actor with both publicly available tools and bespoke methods, sometimes leveraging access brokers to gain initial access.

Why it matters

As a supplier of lifesaving medical devices, Stryker’s disruption underscores risks to healthcare providers and the broader supply chain. The timing—following airstrikes in the region—also frames the incident as a political signal, illustrating how state-linked actors may use cyber operations to pressure Western organizations even without conventional military action.

 

Arstechnica

Notícias relacionadas

Testes confirmam convivência 5G Broadcast com redes móveis
IA física pressiona redes móveis por uplink
IA física nas telecomunicações: disputa de domínio
Ericsson: avanços de APIs e SA lentos
Teste de 5G Broadcast leva TV a celulares
NB-IoT avança na rastreabilidade móvel rodoviária

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais