Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack

Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack

Posted on March 18, 2026 By CWS

Recent findings indicate that Iranian hackers utilized compromised credentials obtained through infostealer malware in a significant cyberattack on Stryker, a leading US medical technology company. The breach, which surfaced on March 11, was attributed to the hacker group Handala, known for its ties to Iran’s Ministry of Intelligence and Security (MOIS).

Stryker, renowned for its production of surgical equipment and orthopedic implants, faced substantial disruption after Handala claimed responsibility for the attack. The group alleged wiping over 200,000 devices, forcing the company to close offices across numerous countries. Claims of data theft were also made by the hackers.

Details of the Stryker Cyberattack

Initial reports suggested the use of wiper malware, a tactic previously associated with Handala. However, Stryker confirmed that no such malware was found in their systems. Instead, it appears the attackers exploited Stryker’s Microsoft Intune platform, used for managing desktop and mobile devices, to erase data.

According to Bleeping Computer, the hackers managed to compromise an Intune administrator account and subsequently created a global admin account, which facilitated the device wipe. This method underscores the importance of securing administrative access within organizations.

Role of Infostealer Malware

Alon Gal, CTO of Hudson Rock, a threat intelligence firm, uncovered evidence of credentials being obtained via infostealer malware. Analysis of malware logs revealed that credentials for Stryker’s administrator accounts, along with other Microsoft services and mobile device management credentials, were compromised.

Gal noted that these credentials were not freshly obtained; they were months, if not years, old, suggesting Stryker had ample time to reset them and potentially prevent the breach. This highlights the ongoing risks posed by outdated but still active credentials.

Impact and Response

Stryker reported that the cyberattack affected only its Windows environment, leading to disruptions in order processing, manufacturing, and shipping. The company has been actively restoring impacted systems, prioritizing those crucial for customer service and logistics.

The US cybersecurity agency CISA and the FBI have engaged with Stryker to investigate the incident further. Despite the attack, Stryker assured that all its products remain safe for use, and the presence of sales representatives in medical facilities poses no risk.

While pro-Iranian hackers have intensified attacks against US and Israeli targets, this incident marks one of the most significant breaches against the United States. Handala has been particularly active since the onset of regional conflicts, though their claims often lack complete verification.

Notably, Forbes reported the deaths of two Iranian cyber operation leaders in recent airstrikes, which included individuals linked to state-sponsored hacking activities. This development may impact the future operations of groups like Handala.

Security Week News Tags:credential theft, Cyberattack, Cybersecurity, Handala, infostealer malware, Iranian hackers, Microsoft Intune, MOIS, Stryker breach, US medical technology

Post navigation

Previous Post: Understanding Magecart Threats in Web Supply Chains
Next Post: ForceMemo Malware Compromises GitHub Python Repositories

Related Posts

2025 Sees Surge in Cybersecurity M&A Activity 2025 Sees Surge in Cybersecurity M&A Activity Security Week News
Malware Distributed via Cloned AI Tool Sites in New Campaign Malware Distributed via Cloned AI Tool Sites in New Campaign Security Week News
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware Security Week News
SimpleHelp Vulnerability Exploited Against Utility Billing Software Users SimpleHelp Vulnerability Exploited Against Utility Billing Software Users Security Week News
SonicWall SSL VPN Accounts in Attacker Crosshairs SonicWall SSL VPN Accounts in Attacker Crosshairs Security Week News
Russian Hacker Pleads Guilty Over Phobos Ransomware Russian Hacker Pleads Guilty Over Phobos Ransomware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Native Emerges with $42M to Enhance Cloud Security
  • Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining
  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Native Emerges with $42M to Enhance Cloud Security
  • Emerging Malware Threatens Network Devices with DDoS and Crypto-Mining
  • Join the Supply Chain & Risk Summit for Key Insights
  • Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions
  • AI in SaaS: Uncovering Hidden Risks and Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark