Advertisement Advertisement Skip to content Home About the Author Advertising/Speaking Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker March 11, 2026 43 Comments A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside the United States, said that the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U.S. headquarters says the company is currently experiencing a building emergency. Based in Kalamazoo, Michigan, Stryker [NYSE:SYK] is a medical and surgical equipment maker that reported $25 billion in global sales last year. In a lengthy statement posted to Telegram, a hacktivist group known as Handala (a.k.a. Handala Hack Team) claimed that Stryker’s offices in 79 countries have been forced to shut down after the group erased data from more than 200,000 systems, servers and mobile devices. A manifesto posted by the Iran-backed hacktivist group Handala, claiming a mass data-wiping attack against medical technology maker Stryker. “All the acquired data is now in the hands of the free people of the world, ready to be used for the true advancement of humanity and the exposure of injustice and corruption,” a portion of the Handala statement reads. The group said the wiper attack was in retaliation for a February 28 missile strike that hit an Iranian school and killed at least 175 people, most of them children. The New York Times reports today that an ongoing military investigation has determined the United States is responsible for the deadly Tomahawk missile strike. Handala was one of several hacker groups recently profiled by Palo Alto Networks, which links it to Iran’s Ministry of Intelligence and Security (MOIS). Palo Alto says Handala surfaced in late 2023 and is assessed as one of several online personas maintained by Void Manticore, a MOIS-affiliated actor. Stryker's website states that the company has 56,000 employees in 61 countries. A phone call placed Wednesday morning to the media line at Stryker’s Michigan headquarters sent this author to a voicemail message stating, “We are currently experiencing a building emergency. Please try your call again later.” A report from The Irish Examiner on Wednesday said that Stryker staff were now communicating via WhatsApp for any updates on when they could return to work. The story quoted an unnamed employee who said anything connected to the network was down and that “anyone with Microsoft Outlook on their personal phones had their devices wiped.” “Multiple sources have reported that systems in Cork headquarters have been ‘shut down’ and that Stryker devices held by employees have been wiped out,” the Examiner reported. “The login pages coming up on these devices now feature the Handala logo.” Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. A trusted source with knowledge of the attack, who spoke on condition of anonymity, told KrebsOnSecurity that in this case, the perpetrators used a Microsoft service called Intune to issue a ‘remote wipe’ command against all connected devices. Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, providing a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently. Palo Alto says Handala’s hack-and-leak activity is primarily focused on Israel, with occasional targeting outside that scope when it serves a specific agenda. The security firm said Handala also has taken credit for recent attacks against fuel systems in Jordan and an Israeli energy exploration company. “Recent observed activities are opportunistic and ‘quick and dirty,’ with a noticeable focus on supply-chain footholds (e.g., IT/service providers) to reach downstream victims, followed by ‘proof’ posts to amplify credibility and intimidate targets,” Palo Alto researchers wrote. The Handala manifesto posted to Telegram referred to Stryker as a “Zionist-rooted corporation,” which may be a reference to the company’s 2019 acquisition of the Israeli company OrthoSpace. Stryker is a major supplier of medical devices, and the ongoing attack is already affecting healthcare providers. One healthcare professional at a major university medical system in the United States told KrebsOnSecurity they are currently unable to order surgical supplies that they normally source through Stryker. “This is a real-world supply chain attack,” the expert said, who asked to remain anonymous because they were not authorized to speak to the press. “Pretty much every hospital in the U.S. is affected by this issue.”
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
Summary: A hacktivist group linked to Iran's intelligence agencies has claimed responsibility for a data-wiping attack on Stryker, a major medical technology company. The incident forced the shutdown of offices in 79 countries and affected over 50,000 employees.
Key facts
- Hackers claim responsibility for a data-wiping attack on Stryker.
- The attack reportedly affected over 200,000 systems in 79 countries.
- Stryker sent home more than 5,000 workers in Ireland.
Why it matters
The Iran-backed hackers' claim of a wiper attack on Stryker highlights the geopolitical tensions and cyber warfare risks, impacting global supply chains and healthcare sectors.
Key metrics
- Employees Affected: Over 50,000 people (This number includes both Stryker employees and potentially contractors or partner organizations.)
- Systems Affected: 200,000+ systems (The attack reportedly impacted servers, systems, and mobile devices across multiple countries.)