Employees at Stryker’s facilities in Ireland, one of the company’s largest hubs outside the United States, were reportedly sent home on March 11. Systems were down. Access was restricted. Something was clearly wrong, but details were scarce.
Around the same time, reports began circulating that the Michigan-based medical technology giant was facing a major cyber incident. A voicemail at its US headquarters referenced a ‘building emergency’ Internally, operations were disrupted. Externally, questions were mounting.
Then came the claim. A hacktivist group known as Handala Hack Team, believed to have links to Iranian intelligence, posted a lengthy statement on Telegram, claiming responsibility for a large-scale data-wiping attack. According to the group, more than 200,000 systems, servers, and devices across 79 countries had been wiped. No ransom demand, negotiation, just erasure.
Right now, it is still unclear how much damage has actually been done, and the claims haven’t been independently confirmed. But even the possibility of an attack at that scale targeting a company so deeply embedded in global healthcare has sent ripples far beyond the organisation itself. Because Stryker is not just another corporate name.
Its products sit inside operating rooms. Its systems support surgical workflows. Its supply chains feed directly into hospitals, clinics, and critical care environments. So, when something like this happens, the impact does not stay contained; it spreads.
Not Just Another Breach
For years, cyberattacks have followed a familiar pattern. Break in, encrypt systems, demand payment. Ransomware became almost routine, but this incident doesn’t quite fit that mould. There is no clear financial motive. No demand. No obvious attempt to monetise the breach.
Instead, what is being described if the claims hold is something more destructive. A wiper-style attack, designed not to extract value, but to remove it entirely. That distinction matters.

Errol Weiss, Chief Security Officer at Health-ISAC, sees this as part of a broader shift.
“We are absolutely seeing a shift toward disruption-focused attacks in healthcare, and it is tightly linked to the broader geopolitical tensions. Iran-aligned and sympathetic hacktivist groups have been increasingly targeting US and Israeli critical infrastructure to make political statements and retaliate for actions against Iran since the war escalated in late February,” Weiss told International Finance.
In other words, what he meant was that the timing isn’t random. The digital world is increasingly reflecting real-world tensions, including those involving Iran and the United States. Healthcare, somewhat unexpectedly, is becoming a part of that equation.
Weiss puts it plainly: “Destructive activity against healthcare and its supply chain is not just about money anymore. It is about sending a message, and creating maximum operational and psychological impact.”
Authorised Tools Used In Unauthorised Ways
If the intent is shifting, so are the methods. One of the more striking aspects of this incident is the reported use of Microsoft Intune, a legitimate enterprise device management platform, to carry out system wipes. No obvious malware, no dramatic breach signature, just authorised tools, used in unauthorised ways. It’s subtle, quiet, and incredibly effective.
Weiss explains why this approach is so difficult to defend against: “Abusing legitimate tools like Microsoft Intune is a classic ‘living off the land’ tactic, and it is incredibly hard to spot because it looks like normal administrative and IT activity.”
That is the uncomfortable reality. The attack does not look like an attack. It looks like a routine admin action, which means traditional detection methods, the ones designed to spot malicious software, don’t always work. That leaves organisations exposed in ways they are not always prepared for.
Weiss points to a critical gap. He says, “For high-risk actions, like issuing a device wipe, there should be built-in controls such as dual-admin approval, so a single compromised account cannot trigger a catastrophic event.”
One account, one mistake, one breach, and suddenly, thousands of systems can disappear.
Not Entirely New, But Potentially Escalating

Chester Wisniewski, Global Field CTO at Sophos, offers a slightly more cautious take on whether this marks a definitive shift.
“Overall, no, but in this case, we might begin to see this shift. Historically, Iran has utilised ‘wiper’ attacks. If they ramp up their activity. These attacks might become more prevalent,” he told International Finance.
While disruption-focused attacks are not yet dominant, the conditions are there, and they may be evolving.
On the use of legitimate tools, Wisniewski is clear that this is not new.
“Living off the land has been very common for at least a decade now. This technique was even used during the Target breach in 2013,” he said.
“What’s changed is the context, and the scale. Looking for common strains of malware is still important, but careful monitoring of behaviour and unusual tool usage is essential for an effective defence,” he added.
In other words, organisations need to rethink what ‘normal’ looks like inside their own systems, because attackers are already doing that.
The Ripple Effect Nobody Talks About
When a company like Stryker is disrupted, the immediate assumption is straightforward: hospitals will feel the impact. But Weiss highlights something more nuanced and, in some ways, more concerning.
He says, “The healthcare supply chain is deeply interconnected, but paradoxically, much of the downstream fallout we see is actually self-inflicted.”
It’s a surprising statement, but it makes sense.
“Hyper-conditioned to fear a ransomware or malware outbreak, many organisations default to a knee-jerk reaction: proactively severing B2B connections. That instinct to isolate, disconnect, protect is understandable, but it can backfire,” he said.
“That panic is what frequently escalates a targeted incident into a widespread service disruption. The damage doesn’t just come from the attack. It comes from the reaction to it. In a sector like healthcare, where timing and coordination matter, those reactions can have real consequences,” he added.
A Sector Under Pressure
There is an ongoing debate about whether healthcare is being specifically targeted or simply exposed.
Weiss says, “Healthcare is a prime target because its disruption creates immediate, tangible panic and maximum pain at a very personal level. Hospitals aren’t just infrastructure; they’re emotional infrastructure. Disrupt them, and the impact is immediate and visible.”
“The historical underinvestment in cybersecurity and reliance on complex, fragile supply chains make the health sector a highly vulnerable pressure point during global conflicts,” he added.
However, Wisniewski takes a more measured stance: “I am not sure there is evidence for this…the majority of attacks are opportunistic.”
It’s a subtle difference in interpretation, but perhaps both can be true. Healthcare may not always be the intended target, but it remains one of the most impactful ones.
Where It Breaks: Identity And Trust
If there is a single thread running through incidents like this, it is identity. Who has access, who can act, and who is trusted.
Wisniewski points to a striking statistic: “Almost 70% of incidents we responded to in 2025 were the result of some sort of identity compromise. That is not a technical failure. That is a trust failure.”
Credentials stolen, access abused, systems misused. Once inside, attackers don’t need to force their way through; they just walk.
Highlights another dimension of the problem, Weiss said, “Too many healthcare organisations still treat their centralised device management platforms as inherently trusted infrastructure rather than primary attack surfaces.”
This assumption that certain systems are safe creates blind spots, and attackers tend to find those first.
Recovery Isn’t Just About Numbers
The scale of the alleged attack – tens or even hundreds of thousands of systems – sounds overwhelming, and it is. But not all systems are equal.
As Chester Wisniewski explains, “It is important to differentiate quantity from importance.”
Many endpoints, such as laptops and desktops, can be rebuilt slowly and with significant effort, but in a relatively predictable way. What’s far more challenging to restore are the on-premise servers and cloud infrastructure that sit at the core of operations.
Those systems are different. They are not just devices; they represent the functioning backbone of the business. Restoring them is not simply an IT exercise; it becomes a business-critical process that can define how quickly an organisation recovers.
Are We Ready for What Comes Next?
This is where the conversation shifts from analysis to something more serious. Because if this incident is not an outlier, but a preview of what is coming, then the question becomes unavoidable: are we actually ready?
Errol Weiss doesn’t hesitate in his response, stating, “Candidly, the healthcare sector is drastically underprepared. Which brings us to the part that is difficult to ignore: If hospitals are left fighting these large-scale fires alone, people could die.”
This is not framed as a distant possibility. It reads more like a warning.
What Needs To Change
There is no single fix here, no silver bullet that can eliminate the risk. But there are clear starting points.
Wisniewski keeps it simple: keep firewalls and VPNs updated, enforce strong MFA, and watch closely for identity misuse. Basic steps, but they only matter if you actually stick to them.
At the same time, Weiss argues for stronger safeguards and a more collaborative approach.
He said, “Organisations should immediately lock down their administrative environments, but defence cannot happen in a silo. Because attackers are already sharing knowledge and evolving together, defenders need to do the same.”
More Than Just a Cyber Incident
The claims surrounding this attack may ultimately turn out to be exaggerated. It’s also possible that the disruption will be contained. In a few weeks, this may just become another case study in a long history of cyber incidents. However, it doesn’t quite feel that way, because this incident represents something much larger.
Cyberattacks are not just about data or money anymore. They are about disruption, sending a message, and hitting systems people depend on most. When something like this hits a company like Stryker, it doesn’t stay online; it spills into hospitals, supply chains, and real life.
