Blogs
Simran Vohra

Author

  • Published: Mar 12 2026 06:07 PM
  • Last Updated: Mar 12 2026 06:08 PM

Iran-linked Handala hackers launched a massive cyberattack on Stryker, wiping 200K devices and disrupting hospitals worldwide. Here’s why it matters.



Newsletter

wave

Handala, a group of Iranian-affiliated hackers, has delivered a catastrophic Wiper attack against Stryker Corp., wiping the data from more than 200,000 devices and shutting down offices in 79 different countries. This attack is perhaps the most aggressive state-sponsored cyberattack on a U.S. healthcare provider since the escalation of tensions following a U.S. airstrike that killed a number of Iranians who were attending a school in Iran last month. The significant delays in care created by the attack have left many hospitals struggling to access supplies for their surgical procedures and created very real access issues for everyday patients, all while the full scope of the delays is still being understood by all involved.

Who Are Handala and Why Stryker Now?

Handala Hack Team popped up in late 2023, tied to Iran's Ministry of Intelligence and Security (MOIS) through the "Void Manticore" cluster, aka Banished Kitten or Storm-0842. They focus on Israel but pivot to high-profile hits when agendas align, like supply-chain jumps via IT providers.​

They picked Stryker for its 2019 buyout of Israeli firm OrthoSpace, dubbing it "Zionist-linked," plus retaliation for the school bombing amid US-Iran-Israel flare-ups. No patient devices got hit directly, Stryker stresses the breach stayed in their Microsoft setup.

The Attack Unfolds: From Midnight Wipe to Global Shutdown

Everything kicked off just after midnight on March 10 on the US East Coast. Employees logging in saw Handala's logo and Palestinian flags plastered across login screens, followed by total blackout. Hackers hijacked Microsoft Intune, Stryker's cloud tool for managing devices, to remotely wipe laptops, servers, and even personal phones running company Outlook apps.

Stryker's Cork, Ireland hub—its biggest outside the US—sent 5,000 workers home immediately. Staff turned to WhatsApp for updates as anything network-tied went dark. In Michigan headquarters, voicemails warned of a "building emergency," and doors stayed locked all day.

Here's a quick timeline of key events:

Date/Time Event
Date/Time Event
Feb 28, 2026 US Tomahawk missile strikes Iranian all-girls school in Minab, killing 175, mostly children. Ongoing probe pins it on US.
March 10, ~00:01 ET Outages hit Stryker's internal Microsoft environment; devices start wiping via Intune.
March 10, Morning Handala claims responsibility on Telegram, boasts 200K+ systems erased, 50TB data stolen. Blames "Zionist-rooted" Stryker for US actions.​
March 10, Day Offices shut in 79 countries; Ireland, US sites empty. Stock dips 3.4%.
March 11-12 Stryker confirms no ransomware or malware spread beyond internals; restoration underway.

This wasn't ransomware chasing cash. It was pure destruction—a wiper op designed to cripple operations long-term.

Compare this to Iran's cyber playbook:

Past Iran Attack Target Damage Stryker Parallel
2012-13 Ababil 46 US banks DDoS outages Destructive, not money-grab
2013 Bowman Dam NY water control SCADA access Critical infra risk
2014 Sands Casino Vegas casino data $40M+ wipe Wiper tactics match
2017 Mabna 144 US unis 31TB theft Data exfil + destruction

Stryker dodged malware spread, but the Intune exploit exposes a cloud blind spot few medtech firms discuss openly.

What Stryker Does and Why Patients Feel the Pinch

Founded in 1941 by Dr. Homer Stryker, this Kalamazoo, Michigan powerhouse rakes in $22.6 billion yearly from orthopedics (hips, knees, spines—40% revenue), MedSurg/Neurotech (endoscopy, emergency gear—60%). With 56,000 employees in 61 countries and 14,200 patents, they touch 150 million patients a year via hospitals worldwide.

Nearly every US surgery center stocks their implants and tools. One anonymous hospital pro told KrebsOnSecurity orders halted instantly, sparking supply fears. No widespread shortages yet, per American Hospital Association's John Riggi, but prolonged downtime could delay joint replacements or neuro ops.

Real risks to everyday folks:

  • Elective surgeries: Hip/knee waits spike if sterile tools run low.

  • Trauma care: Backup suppliers exist, but rural spots hurt first.

  • Global ripple: India, Europe clinics lean on Stryker; disruptions hit Delhi hospitals too.​

  • Investor hit: Shares fell 3.4%, wiping $3B+ market cap temporarily.​

This isn't abstract. If you're facing surgery, call your provider now—stock up alternatives like Zimmer Biomet or Medtronic if possible.

Other Articles to Read:

The Hidden Supply Chain Bomb No One Expected

Everyone fixates on the wipe scale, but the unique angle? Intune's role turns employee BYOD (bring your own device) into a hacker superweapon. Cloud consoles promise easy management but hand attackers admin keys if creds leak.​

Experts like Scott Bailey call it total network loss control, implicating Microsoft 365 tenancy. Stryker urges Intune uninstalls too late for thousands. Healthcare's IoT-heavy devices (Stryker's patient platforms partner with Microsoft) dodged direct hits, but trust erodes.

Past parallels like Change Healthcare's 2024 ransomware showed med supply chaos. Stryker's faster containment helps, yet it spotlights geopolitics invading clouds. Iran ups destructive ops as US strikes escalate, next could be pharma giants.​

Lessons for Businesses and What to Watch

Smart firms audit cloud admins yesterday. Enforce zero-trust: segment employee devices, rotate Intune creds, drill offline backups. Hospitals? Diversify vendors; stock 30-day buffers for Strykers.​

Stryker's restoring fast no external malware confirmed. Watch stock rebound, FBI probes (they indicted IRGC before), and Handala leaks of that 50TB. If supplies tighten, your knee surgery waits.

Geopolitics just made healthcare a battlefield. Patients win by demanding resilient chainsask your doc about backups. This attack proves nation-states target wallets via wrists and hips, forcing us all to rethink digital fronts in medicine.

FAQ

Hackers from the Iran-backed Handala group remotely wiped over 200,000 devices—including laptops, servers, and employee mobile devices—using Stryker's Microsoft Intune system. This caused a global network outage, shutting down offices in 79 countries starting just after midnight ET on March 10.

The group claimed the attack retaliated for a US Tomahawk missile strike on an all-girls school in Minab, Iran, on February 28, which killed 175 people. They labeled Stryker "Zionist-linked" due to its 2019 acquisition of Israeli firm OrthoSpace, tying it to broader US-Iran tensions.

No patient-facing devices were compromised, and Stryker confirmed no ransomware or malware spread beyond internal Microsoft systems. However, supply chain delays could impact elective surgeries like hip or knee replacements if manufacturing lags, though backups exist.

Stryker states the incident is contained, with teams working alongside Microsoft to restore systems. No data ransom demands occurred, and early checks show no external breaches. Stock dipped 3.4% initially but operations prioritize continuity.

Patients facing Stryker-dependent procedures should confirm with providers about alternatives like Zimmer Biomet. Hospitals need 30-day supply buffers. Employees should uninstall Intune profiles from personal devices and monitor for leaks of the claimed 50TB stolen data.

Search Anything...!