Stryker says hospital tools are safe, but digital ordering systems still down after cyberattack
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细读一下这篇文章。 文章主要讲的是Stryker公司遭受了网络攻击,导致他们的电子订购系统瘫痪了一周。Stryker是一家医疗设备公司,生产各种数字工具、急救设备和植入物。这次攻击影响了全球多个地点的工厂和工作,导致停产和中断。 攻击者声称是伊朗支持的Handala组织,他们攻击Stryker是因为其与美国国防部的合作。Stryker没有确认这一点,但提到攻击利用了微软Intune的远程擦除功能,清除了数千台设备的信息。 尽管系统下线,但Stryker强调他们的医疗设备是安全的,没有受到影响。他们还提到正在恢复系统,并通过手动方式协调销售代表与客户沟通补货。 用户的需求是总结文章内容,所以我要抓住关键点:网络攻击导致系统瘫痪、影响范围、攻击者声称的身份、以及医疗设备的安全性。 现在把这些信息浓缩到100字以内,确保简洁明了。不需要复杂的句子结构,直接陈述事实即可。 </think> 医疗设备公司Stryker遭遇网络攻击一周后仍无法恢复电子订购系统,数千台设备信息被清除。此次攻击由伊朗关联组织Handala声称实施,针对其与美国国防部合作。尽管部分内部系统受影响,Stryker强调其医疗设备未受波及且安全可用。 2026-3-16 17:30:47 Author: therecord.media(查看原文) 阅读量:10 收藏

Electronic ordering systems belonging to the The medical device company Stryker are still down a week after a cyberattack believed to have wiped thousands of company devices of all information. 

The Fortune 500 company produces a wide range of digital tools for hospitals, emergency medical equipment, disposable products for surgical procedures and implants used for hip, knee and shoulder replacements. Since Wednesday, Stryker has dealt with company-wide technology outages that caused factory closures and work disruptions at its locations in multiple countries. 

In an update on Sunday afternoon, Stryker officials said that while it works to bring its electronic ordering systems back online, sales representatives would coordinate directly with customers to replenish goods through manual methods.  

“Orders placed prior to the disruption will be reconciled as systems are restored, and electronic orders placed during the disruption will process once systems are back online, and supply is flowing normally,” the company said. 

Healthcare devices safe

Stryker officials went to great lengths to tell customers that all of its connected digital products are safe for healthcare facilities to use. Several statements released on Friday and Sunday imply the company is getting a deluge of questions about the safety of the software and hardware deployed at hundreds of hospitals around the world. 

The cyberattack “was contained to Stryker’s internal Microsoft environment, and as a result it did not affect any of our products — connected or otherwise,” Stryker said.  

The company told customers that it went through a previously-established protocol to confirm that its “connected products were not impacted by the incident and remain safe to use.”

Stryker said its connected beds and stretchers were not impacted because the devices “have their own security protocols and operate completely independently of the Stryker network.”

The company has dozens of other technological tools embedded in hospital networks and confirmed to customers that none of them were impacted by the cyberattack. This includes the Vocera Voice hands-free, voice-controlled communication system and the Care.ai sensor system used in hospital rooms. 

Stryker's Surgical Visualization Platforms, endoscopy business, the surgical sponge management system and other products can continue to be used during surgeries, the company explained. 

They added it is safe for Stryker employees to be onsite at hospitals as well as healthcare facilities and that there is no danger in communicating by phone or email with the company’s staff. 

The company did not provide a timeline for when systems would be restored but said they are focusing on the platforms that handle ordering, shipping and customer support. 

The attack on Stryker was claimed by an Iranian-aligned group called Handala. In a statement, the group said it targeted Stryker because of its work with the U.S. Defense Department. Stryker has not confirmed whether the incident has been officially attributed to Iranian cyber actors. 

Stryker said last week that no ransomware or malware was involved in the incident and employees reported that any devices with Microsoft Intune installed had been wiped clean. Stryker uses Microsoft Intune to manage all company devices and cybersecurity experts said it has a feature that would allow someone with administrative access to wipe all devices. 

Incident responders at Cisco Talos said last week that the attack “was almost certainly executed by compromising high-level administrative accounts, based on our identification of hundreds of leaked Stryker credentials on the dark web.” 

“The threat actors likely gained access to Stryker’s Microsoft Intune management console, within which they reportedly weaponized the platform's native remote wipe feature to simultaneously reset connected corporate devices,” the company said. “This living-off-the-land (LOTL) technique allowed the group to cause widespread destruction and data loss, possibly without the need for traditional wiper malware.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/stryker-cyberattack-impact-iran
如有侵权请联系:admin#unsafe.sh