Reach security professionals who buy.

850K+ monthly readers 72% have budget authority
Advertise on Breached.Company →

Updated March 12, 2026 — Additional details from employee Reddit posts, Kim Zetter’s reporting, and emerging healthcare impact assessments have been incorporated below.


On March 11, 2026, Stryker Corporation — one of the world’s largest medical device manufacturers with operations across 79 countries — confirmed it was hit by a cyberattack that has caused systems to shut down globally. In internal communications to employees, the company described the disruption as “severe.” The Iran-linked hacktivist group Handala Hack claimed full responsibility within hours, describing the attack as direct retaliation for U.S.-Israeli military strikes against Iran that began February 28, 2026.

Executive Summary

Bottom Line Up Front: Handala Hack, an Iran-affiliated threat actor with documented ties to the Islamic Revolutionary Guard Corps (IRGC), executed a destructive cyberattack against Stryker Corporation on March 11, 2026. The group claims to have erased data from more than 200,000 Stryker systems, servers, and mobile devices globally, and stolen approximately 50TB of sensitive corporate data — threatening public disclosure. Stryker confirmed network-wide disruption but initially stated it found “no indication of ransomware or malware,” a claim that security analysts found difficult to reconcile with the scale of the reported damage. This attack represents Iran’s first major cyberoffensive against a U.S. corporation since the current war began.


The Attack: What Happened on March 11, 2026

The attack struck Stryker’s global Microsoft infrastructure, cutting off employees across the company’s worldwide operations from corporate networks, internal software systems, and company communications. The disruption was immediate and widespread — staff in multiple regions simultaneously lost access to systems needed to do their jobs.

Handala’s Claims:

In a statement posted online, Handala Hack asserted it had:

  • Wiped data from 200,000+ systems — including servers, endpoints, and mobile devices spanning Stryker’s global footprint
  • Exfiltrated approximately 50TB of data from the company’s internal environment
  • Executed the attack in retaliation for the U.S. military strike on an Iranian school in Minab on February 28, 2026, which killed more than 170 people — predominantly schoolgirls
  • Declared this “the beginning of a new chapter in cyber warfare” against U.S. corporate interests

Stryker’s Response — Two Statements:

Stryker issued a public statement and separately communicated with employees, and the language in each is notably different.

Public statement:

“We are experiencing a global network disruption affecting the Windows environment. Our teams are actively working to restore systems and operations as quickly as possible. Stryker has business continuity measures in place, and we’re committed to continuing to serve our customers.”

Internal employee communication:

“We are experiencing a severe, global disruption impacting all Stryker laptops and systems that connect to our network.”

The word “severe” appears only in the internal message — not in public-facing communications — a gap that has drawn attention from security analysts tracking the incident. The company declined to provide a timeline for full system restoration or confirm the data theft allegations.

The absence of ransomware or malware indicators in earlier statements, if accurate, points toward a pure destructive wiper attack — designed to destroy rather than extort — consistent with Iranian threat actor tradecraft and the pattern established by Iran’s Shamoon attack on Saudi Aramco in 2012, which erased data from more than 30,000 systems. Wiper attacks have also been used extensively by Russia against Ukrainian targets and by North Korea in its 2014 Sony Pictures hack.


On the Ground: What Employees Are Reporting

Workers at Stryker across the United States, Australia, India, and Ireland began posting to a Reddit forum early March 11 describing what they were experiencing in real time. The first media reports emerged from Ireland, where Stryker has a significant division.

Attack timing: According to Reddit posts, the cyberattack struck at approximately 3:30 am EDT (one post says 12:30 am EST) — a timing that maximized disruption across global time zones before IT teams could mount a coordinated response.

How it hit devices: According to employees, the hackers:

  • Gained access to administrator accounts and used that access to push an operating system reset to every computer and phone enrolled in Stryker’s Mobile Device Management (MDM) system
  • Defaced every internal login and admin page with Handala’s signature artwork
  • Sent emails directly to company executives claiming ownership of the attack
  • Wiped “many” servers in the company’s data centers, making them completely inaccessible

One Reddit post captured the operational reality bluntly:

“The entire company is at a complete stop. Also, the servers at the DataCenter are inaccessible.”

The BYOD Catastrophe:

One of the most underreported angles of the attack is the MDM/personal device wipe problem. Stryker’s corporate MDM was enrolled not only on company-issued devices but on personal phones belonging to many employees — including senior executives. When the attackers pushed the OS reset through the MDM system, the wipe reportedly extended to personal data on enrolled personal devices.

An employee in Australia described the cascading effect:

“Many colleagues’ phones have been wiped. We were instructed to remove Intune, Company Portal, Teams, and VPN from personal devices. I’ve lost all personal data from personal devices that were enrolled and am now unable to access emails and Teams — because I used my phone to provide two-factor authentication codes.”

This created an operational decapitation problem at exactly the moment leadership needed to coordinate a response: executives simultaneously lost their phones, their personal contacts, and their 2FA methods. The MDM wipe that was meant to protect company data instead stripped decision-makers of the tools they needed to manage the crisis.

This will become a significant governance case study. Corporate BYOD MDM policies need to clearly define what can and cannot be wiped — and whether personal enrollment should even be permitted for senior decision-makers who need to remain reachable during a crisis.


Who Is Handala Hack?

Handala Hack is a pro-Iran hacktivist group that has emerged as one of the most operationally aggressive Iran-affiliated cyber threat actors targeting Western and Israeli interests. The group also operates under the aliases Void Manticore and Storm-842 — designations used by Microsoft and MITRE threat intelligence frameworks respectively.

Key Characteristics:

  • IRGC Nexus: Handala has documented operational and ideological links to Iran’s Islamic Revolutionary Guard Corps, including coordinated timing of attacks to coincide with significant geopolitical events and Iranian government messaging
  • Destructive Focus: Unlike financially motivated threat actors, Handala prioritizes data destruction (wiper malware) and psychological impact over ransomware monetization
  • Hacktivist Cover: The group presents itself publicly as an ideologically motivated hacktivist collective, providing Iran with a degree of plausible deniability while enabling offensive cyber operations
  • Regional Track Record: Prior to the Stryker attack, Handala had primarily targeted Israeli organizations — conducting operations against Israeli financial institutions, government entities, and technology firms — before pivoting to U.S. corporate targets following the February 2026 U.S.-Israeli strikes on Iran

Geopolitical Trigger:

The stated motivation for the Stryker attack was the U.S. strike on a school in Minab, Iran, on February 28, 2026. Handala specifically cited the 170+ deaths — the majority of whom were schoolchildren — as the justification for targeting Stryker. The group’s selection of a medical device company carries clear symbolic intent: attacking an organization associated with healthcare and human welfare as a direct response to what Iran characterizes as deliberate targeting of civilians.


The Broader Iranian Cyber Offensive: Context

The Stryker attack does not exist in isolation. It is part of a significantly escalated Iranian cyber campaign in response to the ongoing U.S.-Israel military strikes on Iran.

Timeline of Key Events:

DateEvent
Feb 28, 2026U.S.-Israeli coordinated airstrikes begin on Iran; Supreme Leader Khamenei killed
Feb 28, 2026U.S. school strike in Minab kills 170+, mostly schoolgirls
Mar 1, 2026Khamenei death confirmed; Mojtaba Khamenei named successor
Mar 1, 2026U.S. intelligence intercepts encrypted transmissions potentially activating Iranian “sleeper assets”
Mar 8, 2026Iran has fired 500+ ballistic missiles and ~2,000 drones since Feb 28
Mar 11, 2026IRGC declares U.S. and Israeli “economic centres and banks” as legitimate targets
Mar 11, 2026Handala Hack attacks Stryker Corporation
Mar 11–12, 2026Bank stocks decline; HSBC closes Qatar branches; Citigroup and Standard Chartered order Dubai staff to work from home

Iranian APT Activity (Seedworm):

In parallel with Handala’s hacktivist campaign, intelligence agencies have documented fresh activity from Seedworm, an Iranian APT group, on the networks of multiple U.S. entities — including a U.S. bank, a U.S. airport, and a U.S. software company. Seedworm deployed a new backdoor malware strain called Dindoor on targeted systems during this period.

IRGC Banking Threats:

On March 11, 2026, the IRGC’s Khatam al-Anbiya Headquarters issued a direct statement declaring U.S. and Israeli-linked “economic centres and banks” as “legitimate targets,” warning civilians to remain at least one kilometer from such institutions. This followed what Iran described as a U.S.-Israeli airstrike on Bank Sepah in Tehran.


Impact Assessment: Why Stryker?

Stryker Corporation is a Fortune 500 medical technology company generating over $22 billion in annual revenue employing 56,000 people globally. Its products include surgical equipment, implants, joint replacements, emergency medical devices, imaging systems, hospital beds, and defibrillators used in hospitals and trauma centers worldwide. The company operates in 79 countries.

Stryker’s Military Contracts — Why This Attack Has National Security Dimensions:

What makes the Stryker target selection more significant than it may appear: Stryker has deep ties to the U.S. military. In 2020, the company signed a $225 million contract with the Defense Logistics Agency to supply medical, patient monitoring, and other equipment to U.S. military personnel. Last year, the military extended that contract in a $450 million deal. Stryker systems are used to treat wounded U.S. military personnel in the field.

The company also shares its name with the U.S. Army’s Stryker armored combat carrier — the troop transport vehicle used in combat operations. Stryker Corporation does not manufacture the vehicle, but the naming parallel has not been lost on Handala’s messaging.

The Attack’s Real-World Implications:

  1. Patient Safety Risk — LIFENET and Cardiac Care: The most acute immediate healthcare impact involves Stryker’s LIFENET system — the platform paramedics use to transmit 12-lead ECG readings to receiving emergency rooms before STEMI (heart attack) patients arrive, so cardiologists can activate the cardiac catheterization lab in advance. Maryland EMS agencies have reportedly issued guidance asking crews to revert to verbal radio descriptions of ECG findings — a meaningful downgrade in the speed and precision of that clinical handoff. Every minute of delay in a STEMI response directly correlates with loss of heart muscle tissue. The disruption of LIFENET is not an abstract systems problem; it is a patient outcome problem with measurable mortality implications.

  2. Supply Chain Disruption: A medical device manufacturer’s internal systems govern everything from order management to manufacturing schedules; a 200,000-system wipe could create months-long supply chain reverberations

  3. 50TB Data Exposure: The alleged exfiltration of 50TB raises serious concerns about:

    • Intellectual property theft — proprietary device designs, surgical techniques, R&D data
    • Customer data — hospital contracts, procurement data, potentially patient outcome data
    • Employee PII — personnel records across a global workforce
    • Regulatory submissions — FDA pre-market approval documents and clinical trial data
  4. Psychological Warfare: By targeting a medical company, Handala amplifies international attention and creates a moral inversion narrative — positioning Iran as a victim retaliating against a company that “should” be neutral


Handala’s Message: “The Beginning of a New Chapter”

Handala’s accompanying statements went beyond claiming the attack — the group issued explicit warnings to the broader U.S. corporate sector:

“This marks the beginning of a new chapter in cyber warfare. American corporations are not bystanders in this war.”

The group’s messaging mirrors the Iranian government’s stated position that U.S. economic interests globally are now fair game for retaliation. This language echoes the IRGC’s concurrent declaration that banks and financial centers are “legitimate targets.”

Security analysts assess this framing is designed to:

  • Deter U.S. corporate support for the U.S.-Israeli military campaign by creating direct liability risk
  • Undermine investor confidence in companies operating internationally
  • Establish a precedent for escalatory cyber operations against civilian economic infrastructure

What Organizations Need to Do Now

For any organization with a global technology footprint — particularly those in healthcare, defense supply chains, or financial services — the Stryker attack provides an urgent operational signal.

Immediate Priority Actions:

  1. Review Microsoft environment hardening — Handala’s documented use of Microsoft-environment-targeted attacks means organizations should immediately audit their Azure AD, Exchange Online, and Microsoft 365 configurations for signs of unauthorized access or persistence

  2. Deploy EDR/XDR with wiper detection — Wiper malware operates quickly and silently; endpoint detection tools configured to detect mass deletion or disk overwrite activity are critical to limiting blast radius

  3. Verify backup integrity — Offline, immutable backups are the only reliable defense against a successful wiper attack; organizations should test restoration procedures immediately

  4. Threat hunt for Dindoor indicators — Security teams should search for indicators of compromise associated with Seedworm’s Dindoor backdoor, which has been deployed against U.S. targets in parallel with this campaign

  5. Escalate incident response readiness — Incident response retainers should be activated; tabletop exercises simulating a destructive cyberattack by a nation-state actor should be conducted urgently

  6. Monitor dark web and Telegram channels — Handala has threatened to publicly release Stryker’s stolen 50TB; organizations should establish monitoring for data leak announcements that may affect their own data if Stryker systems contained their information


The Bigger Picture: Corporate America in the Crosshairs

The Stryker attack signals a meaningful escalation in Iranian cyber doctrine. For years, Iranian cyber operations against U.S. entities were primarily focused on espionage, intelligence collection, and targeted financial sector attacks. The Handala campaign represents a shift toward destructive attacks on corporate infrastructure as a tool of state-sponsored coercion.

The selection of Stryker — which does have significant U.S. military contracts and defense logistics relationships — is not random. It sits at the intersection of healthcare and military supply chain, giving Handala the ability to simultaneously claim they struck a defense contractor and cause maximum public concern by hitting a company that also provides hospital equipment to civilians.

More broadly, the IRGC has issued an explicit warning that the list of U.S. corporate targets extends far beyond Stryker. The IRGC has specifically warned that offices and infrastructure of U.S. companies with links to Israel — and whose technology has been used to assist military operations — are targets for both cyber and physical attack. Named companies include Google, Palantir, Microsoft, IBM, Nvidia, and Oracle. These companies collectively underpin much of the U.S. cloud computing, AI, and enterprise software infrastructure. Whether the Stryker attack is a standalone operation or the opening move in a broader campaign against this target list is the central question security teams across corporate America are asking today.

The FBI and CISA have not yet publicly attributed the attack to Iranian government direction, but the operational profile, timing, and stated motivation are consistent with prior IRGC-directed hacktivist proxy operations.


What Comes Next

With Iran’s cyber campaign now in full escalation mode and the U.S.-Iranian conflict showing no clear path to resolution as of March 12, 2026, security teams should treat the Stryker attack as a proof-of-concept rather than a one-off event.

Critical unknowns:

  • Whether Stryker’s “contained” assessment will hold as forensic analysis progresses
  • Whether Handala will publish the alleged 50TB of stolen data
  • Whether additional U.S. corporations in healthcare, finance, or critical infrastructure will be targeted in coming days

Breached Company will continue to update this story as new details emerge.


Sources: Kim Zetter / Zero Day, CNN, Bloomberg, Al Jazeera, TechCrunch, SecurityWeek, NBC News, Reddit (r/Stryker employee posts), Palo Alto Networks Unit 42, Symantec Threat Intelligence