Security researchers warned of destructive cyber actions following recent geopolitical tensions, and that warning appears to have materialized as Stryker confirmed a global disruption to its Microsoft environment. The company said there is no current evidence of ransomware or traditional malware. The incident is believed to be contained within the Windows domain, with Lifepak, Lifenet, and Mako devices continuing to operate normally.
What happened
Initial signals surfaced on social media and in Irish press reports, with purported Stryker employees or their families saying workstations and mobile devices had been wiped. Observers noted login pages on wiped devices displaying a Handala Hack logo, a group researchers link to Iran’s government.
Current status
Stryker stated it is responding to a global network disruption affecting its Microsoft environment and emphasized that there is no indication of ransomware or malware. The firm said the incident is contained to the internal Microsoft environment and that patient-monitoring devices remain functional.
What analysts think
Experts have offered different theories. Some point to using Microsoft Intune to issue wipe commands, while others note that the attack may involve wiper malware. Check Point researchers described Handala Hack as an actor with both publicly available tools and bespoke methods, sometimes leveraging access brokers to gain initial access.
Why it matters
As a supplier of lifesaving medical devices, Stryker’s disruption underscores risks to healthcare providers and the broader supply chain. The timing—following airstrikes in the region—also frames the incident as a political signal, illustrating how state-linked actors may use cyber operations to pressure Western organizations even without conventional military action.