Iran-Aligned Hackers Hit Stryker, Disrupt Microsoft Network

Stryker said a cyberattack disrupted its Microsoft environment and much of its infrastructure, while Handala Hack claimed responsibility and security researchers warn pro-Iranian groups have expanded attacks since the war began Feb. 28.

Overview

A summary of the key points of this story verified across multiple sources.

1.

Stryker confirmed a cyberattack disrupted its Microsoft environment and took down much of its infrastructure, and Handala Hack claimed responsibility.

2.

Security professionals had warned of destructive retaliatory hacks, and pro-Iranian hackers have targeted U.S. and Middle Eastern sites since the war began Feb. 28, according to researchers.

3.

Stryker said responders believe the incident is contained and limited to its internal Microsoft environment and that they have no indication ransomware or malware were involved, according to an SEC filing.

4.

Researchers reported pro-Iranian hackers have targeted data centers, industrial facilities in Israel, a school in Saudi Arabia and an airport in Kuwait, and CrowdStrike detected a surge of Russian activity supporting Tehran.

5.

Stryker said Lifepak, Lifenet and Mako devices were functioning normally, but the company had no timeline for restoring normal operations, and experts urged organizations to patch systems and prepare for disruption.

Written using shared reports from
7 sources
.
Report issue

Analysis

Compare how each side frames the story — including which facts they emphasize or leave out.

Center-leaning sources frame the Stryker incident as a notable escalation by foregrounding Iran-linked culpability and destructive intent. They emphasize historic “wiper” attacks (Aramco, Sands), highlight Handala’s claims and cybersecurity firms’ links to Iran, and spotlight expert detail about Microsoft Intune wipes—creating a narrative of state‑tied escalation.

FAQ

Dig deeper on this story with frequently asked questions.

Handala is an Iranian-linked hacking group, often described as pro-Palestinian hacktivists tied to Iran's Ministry of Intelligence and Security, that claimed responsibility for the destructive cyberattack on Stryker's Microsoft environment via their Telegram channel.

Stryker stated there is no indication of ransomware or malware involvement, and they believe the incident is contained to their internal Microsoft environment.

The attack caused a global network disruption to Stryker's Microsoft environment, wiping remote Windows devices like laptops and cellphones, leading to outages in systems including electronic ordering, but critical medical devices like Lifepak, Lifenet, and Mako remained functional.

Yes, pro-Iranian hackers have targeted data centers and industrial facilities in Israel, a school in Saudi Arabia, and an airport in Kuwait since the war began on February 28, with researchers noting expanded activities.

Stryker activated business continuity measures, instructed employees to disconnect devices, is restoring systems like electronic ordering, and confirmed no impact on critical devices or patient care at hospitals like Providence and MultiCare.