Medtech giant Stryker fully operational after data-wiping attack
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我先看看文章讲的是什么。 文章主要讲的是Stryker公司遭受了网络攻击,然后恢复了运营。攻击者来自Handala黑客组织,他们声称窃取了50TB的数据,并破坏了近8万台设备。Stryker用了三周时间恢复系统,现在全球制造网络已经全面运营,生产也迅速恢复到满负荷状态。他们还提到了CISA和微软发布的安全指南,以及FBI查封了黑客使用的网站。 我需要把这些信息浓缩到100字以内。首先确定关键点:Stryker被黑、数据泄露、设备被破坏、三周后恢复、生产恢复正常、CISA和微软的回应、FBI的行动。 然后把这些点连贯地组织起来,确保不超过字数限制。可能需要去掉一些细节,比如具体的金额或产品类型,只保留主要事件和结果。 最后检查一下是否符合用户的要求:用中文、直接描述内容、不使用特定开头。确保语言简洁明了。 </think> Stryker Corporation在遭遇Handala黑客组织声称的网络攻击后三周内全面恢复运营。攻击导致50TB数据被盗及近8万台设备被破坏。CISA和微软发布安全指南以防范类似攻击,FBI查封黑客网站。Stryker称已恢复正常生产并继续支持医疗供应。 2026-4-2 13:30:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Stryker

Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group.

The Fortune 500 medtech giant has over 53,000 employees, makes a wide range of products (including neurotechnology and surgical equipment), and reported global sales of $22.6 billion in 2024.

The attackers began wiping Stryker's systems on March 11, claiming they had stolen 50 terabytes of data before wiping nearly 80,000 devices early that morning, using a new Global Administrator account created after compromising a Windows domain admin account.

After the attack was disclosed, CISA and Microsoft released guidance on securing Intune and hardening Windows domains to block similar attacks, while the FBI seized two websites used by the Handala hackers.

On Wednesday, Stryker announced that it had restored enough systems to return to pre-attack operational levels and that production would quickly reach full capacity.

"As of this week, we are fully operational across our global manufacturing network. Production is moving rapidly toward peak capacity with discipline and stability, supported by restored commercial, ordering and distribution systems," Stryker said.

"Overall product supply remains healthy, with strong availability across most product lines, as we continue to meet customer demand and support patient care."

"Our work continues around the clock in close partnership with third‑party cybersecurity experts, relevant government agencies and industry partners as our investigation progresses, reflecting a shared commitment to protecting the healthcare ecosystem and supporting ongoing recovery efforts," it added.

This comes after the company said on March 23 that its teams were prioritizing the restoration of systems that directly support customer, ordering, and shipping operations.

Although it was initially believed the attackers hadn't used any malicious tools during the breach, Stryker also revealed that security experts who helped with the investigation found a malicious file that helped the attackers hide malicious activity while inside the company's network.

Handala (also known as Handala Hack Team, Hatef, Hamsa) surfaced in December 2023 as an Iranian-linked and pro-Palestinian hacktivist operation that has been targeting Israeli organizations with Windows and Linux data-wiping malware.

The hacktivist group has been linked to Iran's Ministry of Intelligence and Security (MOIS) and is also known for leaking sensitive data stolen from victims' compromised systems.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/medtech-giant-stryker-fully-operational-after-data-wiping-attack/
如有侵权请联系:admin#unsafe.sh