Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack

Stryker was targeted by the Handala group, which claims to have wiped more than 200,000 of the company’s devices.

Stryker cyberattack

Medical technology giant Stryker has been targeted by a highly disruptive cyberattack carried out by an Iran-linked hacker group.

Stryker is a Fortune 500 company that specializes in the manufacturing of surgical equipment, orthopedic implants, and neurotechnology. Headquartered in Michigan, the company employs approximately 56,000 people and reported over $25 billion in revenue for 2025. Its critical role in the healthcare supply chain makes it an essential partner for hospitals worldwide.

The Iran-linked hacker group named Handala has taken credit for the attack, claiming to have struck an “unprecedented blow” to the company.

The hackers claim to have wiped more than 200,000 servers, mobile devices, and other systems, forcing Stryker to shut down offices in 79 countries. They also allegedly stole 50TB of data from the company’s systems. 

Handala has been highly active since the start of the US-Israel-Iran conflict.

The Wall Street Journal reported [paywalled] on Wednesday that Stryker has confirmed dealing with a cyber incident that resulted in a global outage, with staff and contractors seeing the Handala logo on login pages.

Advertisement. Scroll to continue reading.

The attack reportedly wiped phones, laptops, and other devices configured to connect to Stryker’s network. Windows systems appear to have been hit particularly hard.

Stryker advised workers not to turn on company devices and to disconnect from all networks immediately, WSJ reported. 

“Stryker is experiencing a global network disruption to our Microsoft environment as a result of a cyber attack. We have no indication of ransomware or malware and believe the incident is contained,” the company posted in an update Wednesday afternoon.

SecurityWeek has reached out to Stryker for additional comment and will update this article if the company responds.

The Handala group has been closely monitored by cybersecurity firms tracking activity surrounding the US-Israel-Iran war.

On the surface, Handala is a hacktivist group aligned with pro-Palestinian and anti-Israeli sentiment. However, many in the cybersecurity community believe it’s a front for Void Manticore, a threat actor sponsored by the Iranian government. 

The hackers are known for phishing, data theft, extortion, and destructive attacks involving custom wiper malware. Threat intelligence company Flashpoint reported that the group has also been involved in information operations and psychological warfare. 

Since the start of the Iran war, Handala has claimed to have wiped Israeli military weather servers, intercepted security feeds in Jerusalem, stolen and wiped data from the systems of various companies, doxxed Israeli intelligence officers, and hacked an Israeli oil and gas exploration company.

The group often boasts about its alleged achievements on its Telegram and X accounts, but its claims are often difficult to verify. 

[ Save the Date: ICS Cybersecurity Conference – October 6-8, 2026 | W Hotel Nashville ]

Related: Iranian APT Hacked US Airport, Bank, Software Company

Related: Iranian Strikes on Amazon Data Centers Highlight Industry’s Vulnerability to Physical Disasters

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

MongoDB has appointed Doug Bowers as Chief Information Security Officer.

Ben Wilkens has been promoted to Director of Cybersecurity at NMFTA.

Cato Networks has appointed Meital Koren as Chief Legal Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.