Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Stryker Windows Attack: Who, What, Why

Image © Arstechnica
A major medical-device maker's Windows network has been disrupted by a wiper-style cyberattack, with attribution to Handala Hack and no clear restoration timeline.

Security researchers warned of destructive cyber actions following recent geopolitical tensions, and that warning appears to have materialized as Stryker confirmed a global disruption to its Microsoft environment. The company said there is no current evidence of ransomware or traditional malware. The incident is believed to be contained within the Windows domain, with Lifepak, Lifenet, and Mako devices continuing to operate normally.

What happened

Initial signals surfaced on social media and in Irish press reports, with purported Stryker employees or their families saying workstations and mobile devices had been wiped. Observers noted login pages on wiped devices displaying a Handala Hack logo, a group researchers link to Iran’s government.

Current status

Stryker stated it is responding to a global network disruption affecting its Microsoft environment and emphasized that there is no indication of ransomware or malware. The firm said the incident is contained to the internal Microsoft environment and that patient-monitoring devices remain functional.

What analysts think

Experts have offered different theories. Some point to using Microsoft Intune to issue wipe commands, while others note that the attack may involve wiper malware. Check Point researchers described Handala Hack as an actor with both publicly available tools and bespoke methods, sometimes leveraging access brokers to gain initial access.

Why it matters

As a supplier of lifesaving medical devices, Stryker’s disruption underscores risks to healthcare providers and the broader supply chain. The timing—following airstrikes in the region—also frames the incident as a political signal, illustrating how state-linked actors may use cyber operations to pressure Western organizations even without conventional military action.

 

Arstechnica

Related News

Greenlight expands fiber builds NE Pennsylvania
GFiber to Merge with Astound Broadband
Spectrum Expands RingCentral Partnership
Connectivity: The True Foundation of Smart Communities
KadNap: Takedown-Resistant Router Botnet Uncovered
Weather and Super Bowl Drive Churn Risk

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more