Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Stryker Discovers Malicious File in Iran-Linked Cyberattack Probe

Stryker Discovers Malicious File in Iran-Linked Cyberattack Probe

Posted on March 24, 2026 By CWS

Medical technology leader Stryker has provided an update on its investigation into a recent cyberattack with links to Iran, announcing the identification of a malicious file utilized by the attackers. This development marks a significant step in understanding the breach.

Details of the Cyberattack

First discovered on March 11, the cyberattack was claimed by the hacker group Handala, which is believed to be associated with Iran’s Ministry of Intelligence and Security (MOIS). The group asserted that they had erased data from over 200,000 devices, prompting Stryker to close offices globally.

Initial reports suggested the employment of wiper malware by Handala, a known tactic of the group. However, Stryker’s investigation found no traces of traditional malware or ransomware within its networks.

Investigation Findings and Methods

According to Stryker, the attackers likely compromised systems by exploiting Stryker’s Microsoft Intune setup, enabling remote management of devices and applications. Access may have been gained using credentials acquired through infostealer malware.

The attack significantly affected Stryker’s operations, including order processing, manufacturing, and shipping. The company indicated that substantial progress has been made in system restoration efforts.

Stryker, in collaboration with Palo Alto Networks Unit 42 and other cybersecurity experts, identified a malicious file that allowed the attackers to execute commands and remain undetected. This file, however, did not have the capability to propagate within or outside Stryker’s environment.

Security Measures and Government Involvement

Stryker emphasized that no malicious activity was directed at its customers, suppliers, or partners. The findings suggest the use of customized tools by the hackers rather than reliance on pre-existing malware.

The US government has officially recognized Handala’s connection to Iran’s MOIS, taking down several websites linked to the group. The FBI has issued alerts on the types of malware used by MOIS-affiliated hackers, including those masquerading as legitimate applications.

While Stryker collaborates with US authorities in investigating the incident, the FBI’s malware descriptions may not directly relate to this case if no malware was indeed used against the company.

As Stryker continues to work towards full recovery, the company remains vigilant, taking lessons from the investigation to bolster its cybersecurity measures against future threats.

Security Week News Tags:Cyberattack, FBI, Handala, infostealer malware, Iran, malicious file, Microsoft Intune, MOIS, Palo Alto Networks, Stryker

Post navigation

Previous Post: Citrix Urges Immediate Patching of Critical NetScaler Flaws
Next Post: Gcore Highlights 150% Rise in DDoS Threats

Related Posts

Oracle’s First 2026 CPU Delivers 337 New Security Patches Oracle’s First 2026 CPU Delivers 337 New Security Patches Security Week News
Canadian Airline WestJet Says Hackers Stole Customer Data Canadian Airline WestJet Says Hackers Stole Customer Data Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) Black Hat USA 2025 – Summary of Vendor Announcements (Part 3) Security Week News
Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems Security Week News
Hackers Win 0,000 on First Day of Pwn2Own Berlin 2025 Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 Security Week News
Siemens, Schneider, and Others Address ICS Vulnerabilities Siemens, Schneider, and Others Address ICS Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation
  • Russian Hacker Sentenced for Role in US Ransomware Attacks
  • HackerOne Staff Data Compromised in Navia Security Breach
  • FCC Restricts New Import of Foreign Routers Over Security Risks
  • Python Package Compromised by TeamPCP Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in ClawHub Allows Malicious Skill Ranking Manipulation
  • Russian Hacker Sentenced for Role in US Ransomware Attacks
  • HackerOne Staff Data Compromised in Navia Security Breach
  • FCC Restricts New Import of Foreign Routers Over Security Risks
  • Python Package Compromised by TeamPCP Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark