Medtech giant Stryker offline after Iran-linked wiper malware attack
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是史赛克公司遭受了Handala组织的wiper恶意软件攻击。史赛克是医疗科技巨头,员工超过5万,2024年销售额226亿美元。Handala声称窃取了50TB数据,并清除了公司网络中的数万系统和服务器,导致全球79个国家的办公室关闭。 攻击影响了员工的设备,包括手机和电脑,导致内部服务中断,部分地方只能用纸笔工作。史赛克正在努力恢复系统,并与微软合作处理这一事件。 用户要求用中文总结,不需要特定开头,直接描述内容。我需要确保信息准确且简洁,不超过100字。 可能的结构:史赛克被Handala攻击,导致系统被清空、数据被盗、全球办公室关闭,影响员工设备和内部服务。 现在组合成一句话:史赛克遭遇Handala组织的wiper恶意软件攻击,导致大量系统被清空、50TB数据被盗、全球79国办公室关闭,并影响员工设备和内部服务。 检查字数是否在限制内,并确保信息完整。 </think> 医疗科技巨头史赛克遭遇伊朗关联的黑客组织Handala发起的wiper恶意软件攻击,导致其全球网络中数万台系统和服务器被清空,50TB关键数据被盗,79个国家的办公室被迫关闭,员工设备受影响,内部服务中断。 2026-3-11 17:32:0 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Stryker

Leading medical technology company Stryker has been hit by a wiper malware attack claimed by Handala, an Iranian-linked and pro-Palestinian hacktivist group.

The medtech giant manufactures a range of products, including surgical and neurotechnology equipment. With over 53,000 employees, Stryker is a Fortune 500 company that reported global sales of $22.6 billion in 2024.

Handala says they stole 50 terabytes of data before wiping tens of thousands of systems and servers across the company's network, forcing Stryker to shut down in "an unprecedented blow."

"In this operation, over 200,000 systems, servers, and mobile devices have been wiped and 50 terabytes of critical data have been extracted," the attackers said. "Stryker’s offices in 79 countries have been forced to shut down."

Handala's Stryker statement
Handala's Stryker statement (BleepingComputer)

This aligns with reports from people claiming to be Stryker employees from the United States, Ireland, Costa Rica, and Australia, who said their managed Windows and mobile devices were remotely wiped in the middle of the night. The attackers have also defaced the company's Entra login page to display a Handala logo.

A Stryker employee told BleepingComputer the incident began early Wednesday morning, when devices enrolled in the company's mobile device management system were remotely wiped. The employee said colleagues who had personal phones enrolled for work access also lost data after their devices were reset.

Staff were instructed to remove corporate management and applications from their personal devices, including the Intune Company Portal, Teams, and VPN clients.

Numerous employees also report that the attack disrupted access to internal services and applications, forcing some locations to revert to "pen and paper" workflows after systems became unavailable.

As a result of the attack, Stryker is now working to restore their systems amid a global outage, as first reported by The Wall Street Journal.

"We are experiencing a severe, global disruption impacting all Stryker laptops and systems that connect to our network," Stryker told employees in Cork, Ireland, according to local media.

"At this time, the root cause has not yet been identified. We are actively engaged with Microsoft and treating this a critical, enterprise-wide incident," the company also told employees in Asia.

Handala (also known as Handala Hack Team, Hatef, Hamsa) first surfaced in December 2025 as a hacktivist operation linked to Iran's Ministry of Intelligence and Security (MOIS) that targets Israeli organizations with destructive malware designed to wipe Windows and Linux devices.

They are also known for stealing sensitive data from victims' compromised systems and publishing it on the group's data leak portals.

BleepingComputer reached out to a Stryker spokesperson with questions about the incident, but a response was not immediately available.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/
如有侵权请联系:admin#unsafe.sh