CISA Warns US Orgs to Secure Microsoft Intune After Breach

▼ Summary
– CISA warned U.S. organizations to harden their Microsoft Intune endpoint management systems following a cyberattack on Stryker Corporation.
– The attack, claimed by the Iranian-linked Handala group, involved wiping nearly 80,000 devices using Intune’s built-in command after stealing data.
– The hackers executed the attack by creating a new Global Administrator account after initially compromising an admin account.
– CISA’s recommendations include using a least-privilege approach, enforcing multi-factor authentication, and requiring multi-admin approval for sensitive actions.
– These practices aim to shift from relying on “trusted administrators” to building a more protected administrative environment by design.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert urging organizations to immediately strengthen their Microsoft Intune configurations following a significant breach at medical technology leader Stryker. This incident, claimed by the Iranian-linked hacktivist group Handala, demonstrates a sophisticated attack vector where compromised administrative credentials were used to execute a devastating, widespread device wipe. The advisory underscores the urgent need for IT teams to implement strict access controls and multi-layered authentication to protect their endpoint management systems from similar threats.
In the attack, which occurred in the early hours of March 11, threat actors leveraged a newly created Global Administrator account to access Stryker’s Microsoft Intune environment. They reportedly stole an enormous volume of data—approximately 50 terabytes—before using the platform’s own built-in command to remotely wipe nearly 80,000 corporate devices. This action crippled operations and highlighted a critical vulnerability in how administrative access is managed within cloud-based endpoint solutions.
CISA’s directive calls for a comprehensive review and hardening of all endpoint management systems, with specific guidance for Microsoft Intune. The cornerstone of their recommendation is the adoption of a least-privilege access model. This means administrators should only be granted the absolute minimum permissions necessary to perform their duties through Intune’s role-based access control (RBAC). Broad, sweeping administrative privileges create a single point of failure that attackers can exploit to gain control over an entire network.
Beyond limiting permissions, CISA and Microsoft emphasize the non-negotiable importance of enforcing multi-factor authentication (MFA) and maintaining rigorous privileged-access hygiene. Organizations should utilize Microsoft Entra ID features, such as Conditional Access policies and risk-based signals, to add dynamic security layers. These measures ensure that even if credentials are stolen, unauthorized users cannot easily perform sensitive actions.
A further critical safeguard is the implementation of multi-admin approval for high-impact tasks. Sensitive operations like mass device wipes, application deployments, and changes to RBAC settings should require explicit consent from a second authorized administrator. This creates a crucial checkpoint that can prevent a single compromised account from unleashing catastrophic changes. Microsoft notes that combining these practices moves security from a model of implicit trust in administrators to a “protected administration by design” framework.
The group behind the breach, Handala, is a known threat actor with ties to Iran’s Ministry of Intelligence and Security. Emerging in late 2023, they have primarily targeted Israeli entities with data-wiping malware. Their attack on Stryker represents an escalation, showcasing their ability to weaponize legitimate IT management tools for destructive purposes. This incident serves as a stark reminder that endpoint management platforms, which hold the keys to an organization’s digital fleet, are high-value targets for advanced persistent threats. Proactive configuration and vigilant access management are no longer optional but essential components of modern cybersecurity defense.
(Source: BleepingComputer)




