BusinessCybersecurityNewswireTechnology

Iran-Linked Hackers Target Medtech Giant Stryker in Cyber War

▼ Summary

– An Iran-linked hacking group claimed responsibility for a cyberattack on U.S. medical device company Stryker, linking it to Middle East conflict retaliation.
– The attack caused a global disruption to Stryker’s Microsoft systems, wiping devices and preventing thousands of employees from working.
– Stryker stated there is no indication of malware or ransomware and believes the incident is contained to its internal Microsoft environment.
– The attack is significant due to Stryker’s role as a supplier to the U.S. military and its global reach, impacting over 150 million patients annually.
– This incident occurred shortly after the White House released a new cyber strategy signaling a tougher U.S. response to foreign cyberattacks.

A major cyberattack has disrupted operations at Stryker, a leading global medical technology company, with a hacking group linked to Iran claiming responsibility. This incident highlights the growing risk of state-aligned cyber operations targeting critical healthcare infrastructure. The attack caused a significant global outage of the company’s Microsoft systems, impacting its ability to function normally and raising serious concerns about the security of medical supply chains.

The company formally acknowledged the incident in a regulatory filing, stating the cyberattack led to a widespread disruption across its network. Reports indicate the breach originated in the United States before propagating internationally, resulting in numerous employee laptops and mobile devices being completely wiped of data. At Stryker’s large facility in Cork, Ireland, thousands of staff were reportedly unable to work due to the system-wide failure.

In an official statement, Stryker noted that its teams are actively working to restore its global network. The company emphasized there is currently no evidence of malware or ransomware deployment, suggesting the attackers focused on disruption and data access rather than encryption for financial gain. Stryker believes the incident is confined to its own internal Microsoft environment.

The group behind the attack publicly stated its actions were retaliatory, citing recent cyber operations against Iran. The hackers alleged they successfully wiped over 200,000 devices and servers while exfiltrating a massive 50 terabytes of sensitive company data. As a further demonstration of their access, they defaced the corporate login portal, replacing it with their own branding.

As a manufacturer of artificial joints, surgical robotics, hospital beds, and a vast array of medical devices, Stryker’s products are integral to healthcare systems worldwide. The company generates billions in annual revenue and estimates its technologies touch the lives of over 150 million patients every year. Given its substantial contracts to supply medical equipment to the U.S. military, an attack on Stryker’s operations could be interpreted as an indirect strike on American defense and healthcare infrastructure.

This cybersecurity event follows closely on the heels of a newly released U.S. policy framework outlining a more assertive strategy for defending national interests in cyberspace. The timing underscores the persistent and evolving threat posed by foreign cyber actors to strategic commercial and governmental assets.

(Source: HelpNet Security)

Topics

cyberattack incident 100% iran-linked hackers 95% stryker corporation 90% microsoft systems 85% global disruption 85% data wiping 80% data theft 75% middle east conflict 70% medical device industry 70% operational impact 65%