Home OSINT News Signals
CYBER

Iran-Backed Hackers Claim Destructive Wiper Attack on Medical Giant Stryker

đź•“ 2 min read

A hacktivist group with established ties to Iran's intelligence apparatus has publicly claimed responsibility for a large-scale data-wiping cyberattack against Stryker, a leading global medical technology corporation headquartered in Michigan. The attack has caused significant operational disruption, with news reports from Ireland—Stryker's largest operational hub outside the United States—indicating the company sent home over 5,000 employees. Further evidence of the incident's severity comes from a voicemail message at Stryker's main U.S. headquarters, which states the company is currently experiencing a "building emergency," a term often used during major IT outages.

Stryker [NYSE:SYK], a major manufacturer of medical and surgical equipment with reported global sales of $25 billion last year, appears to have been targeted in a politically motivated operation. In a detailed statement published on Telegram, the Iranian group known as Handala (or the Handala Hack Team) asserted it had successfully erased data from more than 200,000 systems, servers, and mobile devices, forcing the closure of Stryker's offices across 79 countries. The group's manifesto declared, "All the acquired data is now in the hands of the free people of the world, ready to be used for the true advancement of humanity and the exposure of injustice and corruption," though the veracity of a data theft claim alongside a wiper attack is often difficult to confirm.

The group explicitly stated the attack was retaliation for a February 28 missile strike that hit an Iranian school, killing at least 175 people, most of whom were children. This aligns the incident with a pattern of Iranian cyber operations that leverage geopolitical events as justification. A recent report from *The New York Times* indicates an ongoing military investigation has determined the United States was responsible for the deadly Tomahawk missile strike, providing context for the alleged motive. Handala was recently profiled by cybersecurity firm Palo Alto Networks, which links the group to Iran's Ministry of Intelligence and Security (MOIS). The firm assesses Handala as one of several online personas operated by "Void Manticore," a threat actor affiliated with the MOIS, and notes the group emerged in late 2023.

This attack against a critical healthcare technology provider represents a serious escalation, moving beyond espionage or data theft to destructive, disruptive action that can directly impact patient care and global medical supply chains. The targeting of a company like Stryker, which employs approximately 56,000 people worldwide according to its website, underscores the increasing willingness of state-aligned actors to weaponize cyber capabilities against civilian economic infrastructure in pursuit of political goals. It serves as a stark reminder for all organizations in critical sectors to bolster their defenses against destructive malware, ensure robust offline backups, and have comprehensive incident response plans for rapid recovery from such debilitating attacks.

Telegram X LinkedIn
Back to News