analyst @ nohacky :~/briefings $
cat / briefings / stryker-handala-wiper-attack
analyst@nohacky:~/briefings/stryker-handala-wiper-attack-data-destruction-t1485.html
reading mode 10 min read
category attack
published 14 Mar 2026
read_time 10 min

The Stryker Wipe: How Handala Turned Microsoft Intune Into a Weapon of Mass Data Destruction

On March 11, 2026, a Fortune 500 medical device manufacturer with operations in 79 countries woke up to find 200,000 devices factory-reset overnight. No ransomware. No malware. Just a legitimate Microsoft management tool, wielded by an Iran-linked threat actor, executing the largest known MITRE T1485: Data Destruction attack against a single U.S. company in history.

For decades, the cybersecurity industry has conditioned organizations to prepare for ransomware. Encrypt your backups. Air-gap your recovery systems. Pay the ransom or lose everything. But on the morning of March 11, 2026, Stryker Corporation — a $25 billion medical technology giant — discovered that the threat model had shifted beneath its feet. There was no ransom note. No encryption key to negotiate over. There was only erasure — total, irreversible, and executed through software the company trusted to protect its devices.

The attack on Stryker, claimed by the Iran-linked hacktivist group Handala, represents more than a single breach. It is a structural warning. It demonstrates that the tools organizations rely on to manage their endpoint fleets — specifically, Mobile Device Management (MDM) platforms like Microsoft Intune — can become instruments of mass destruction when administrative access is compromised. And it raises an uncomfortable question that defenders need to sit with: What happens when the thing that's supposed to protect you is the thing that destroys you?

What Happened: 200,000 Devices, 79 Countries, One Click

The attack began in the early hours of Wednesday, March 11. Stryker employees across the United States, Europe, Asia, Australia, and Central America powered on their laptops and phones to find them completely inoperational. Login screens displayed the Handala group's logo in place of the Stryker corporate interface. Corporate email was gone. Internal applications were inaccessible. Employees in Ireland — where Stryker operates its largest innovation and manufacturing hub outside the U.S., employing over 5,000 people — were sent home.

Handala posted a lengthy manifesto to Telegram and X, claiming responsibility and stating the operation had wiped data from more than 200,000 systems, servers, and mobile devices. The group also claimed to have exfiltrated 50 terabytes of data before triggering the destructive payload. Stryker confirmed the incident in an 8-K filing with the U.S. Securities and Exchange Commission, describing a "global disruption to the Company's Microsoft environment" and noting the company had "no indication of ransomware or malware." A second SEC filing on March 12 revealed that order processing, manufacturing, and shipping had all been disrupted, with no timeline for full restoration (source: SEC 8-K Filing).

"They seem to have obtained access to the Microsoft Intune management console. This is a solution for managing corporate devices." — Rafe Pilling, Director of Threat Intelligence, Sophos (via NBC News)

The mechanism was startling in its simplicity. According to reporting by KrebsOnSecurity and corroborated by cybersecurity researcher Kevin Beaumont, the attackers did not deploy custom wiper malware to achieve the initial destruction. Instead, they compromised high-privilege administrative credentials — likely a Global Admin account — for Stryker's Microsoft Intune environment. From there, they issued a mass remote wipe command to every enrolled device simultaneously.

This is a legitimate feature. Intune's remote wipe capability exists so that IT administrators can factory-reset a lost or stolen device to protect corporate secrets. When a device receives a wipe command from its trusted MDM server, the operating system obeys immediately. It does not ask questions. It resets to factory settings. For employees under Stryker's Bring Your Own Device policy, this meant personal photos, banking two-factor authentication apps, and eSIM configurations were destroyed alongside corporate data (source: KrebsOnSecurity).

critical

No malware was required. No endpoint detection triggered. The wipe was executed through legitimate administrative channels. This is what makes the attack vector fundamentally different from traditional wiper campaigns — and why access control to MDM admin accounts must be treated as a top-priority security concern.

MITRE T1485 in the Cloud Era: Data Destruction Without Malware

The MITRE ATT&CK framework catalogs Data Destruction under technique T1485. Historically, T1485 has been associated with purpose-built wiper malware: Shamoon overwriting Saudi Aramco workstations in 2012, NotPetya masquerading as ransomware to cause billions in damage across Ukraine and the world in 2017, CaddyWiper and HermeticWiper targeting Ukrainian infrastructure during Russia's 2022 invasion. These tools share a common architecture — they are custom-built executables designed to overwrite files, corrupt master boot records, or destroy partition tables.

The Stryker attack redefines what T1485 looks like in practice. The destruction was achieved not through malicious code dropped on an endpoint, but through the abuse of a trusted cloud management platform. Stryker itself confirmed it found no evidence of malware. The attack surface was not the device — it was the identity and the administrative control plane. This represents an evolution that organizations relying exclusively on endpoint detection and response (EDR) tools need to understand: you cannot detect what is technically a legitimate administrative action.

MITRE's T1485 description notes that common file deletion commands like del and rm often only remove pointers to files, leaving data forensically recoverable. A remote wipe issued through MDM goes further. It triggers a full operating system reset — a factory restoration that, on modern devices with encrypted storage, renders prior data effectively unrecoverable. This places the Intune abuse squarely in T1485 territory, but with an attack surface that traditional wiper-focused defenses do not cover.

note

For a full explanation of MITRE T1485: Data Destruction — including techniques, associated threat groups, and detection guidance — see the NoHacky reference at nohacky.com/mitre/t1485-data-destruction.

Who Is Handala? The State Actor Behind the Hacktivist Mask

Handala presents itself as a pro-Palestinian hacktivist group, named after a character in the political cartoons of Palestinian artist Naji al-Ali. The persona emerged in late 2023, shortly after Hamas's October 7 attack on Israel. But the hacktivist framing is a deliberate cover. Multiple independent threat intelligence firms — including Palo Alto Networks Unit 42, Check Point Research, Microsoft, and Brandefense — assess with high confidence that Handala is one of several online personas operated by Void Manticore, an actor affiliated with Iran's Ministry of Intelligence and Security (MOIS).

Void Manticore is tracked across the industry under several names: Storm-842 (Microsoft), COBALT MYSTIQUE, Red Sandstorm, and Banished Kitten. The group maintains at least three known personas: Homeland Justice (used in attacks against Albanian government systems beginning in 2022), Karma (used in operations against Israeli entities), and Handala (the current primary public-facing brand). Check Point Research published a report on March 12, 2026 confirming that all three personas exhibit highly similar TTPs and code overlaps in the wipers they deploy (source: Check Point Research).

"Handala continues to rely on longstanding TTPs, primarily conducting quick, hands-on activity within victim networks and employing multiple wiping methods simultaneously." — Check Point Research, March 12, 2026

A critical detail from the Check Point report: Void Manticore overlaps with activity linked to the MOIS Internal Security Deputy, particularly its Counter-Terrorism Division. According to public reporting cited in the Check Point analysis, the division's supervisor, Seyed Yahya Hosseini Panjaki, was reportedly killed in the opening phase of Israeli strikes on Iran in early March 2026. The Stryker attack occurred days later. Whether this represents a pre-planned operation triggered on schedule or a retaliatory escalation following the loss of a key operational leader is an open intelligence question — but the temporal proximity is notable.

What makes Void Manticore distinctive is not sophistication but intent and follow-through. Their toolkit is deliberately "quick and dirty" — compromised credentials for initial access, lateral movement via RDP and basic tunneling tools, and a combination of custom wipers and manual deletion. In prior campaigns, their custom "Handala Wiper" executable was deployed through Group Policy logon scripts, overwriting file contents and corrupting master boot records. A secondary PowerShell wiper would enumerate and delete user directory files. Check Point noted that the PowerShell script appeared to have been developed with AI assistance, based on its code structure and detailed comments. The final stage involved dropping a propaganda image named handala.gif across all logical drives.

VM
threat actor profile
Void Manticore / Handala

Iranian MOIS-linked destructive operations group conducting wiper attacks and hack-and-leak campaigns under multiple hacktivist personas. Responsible for the March 2026 Stryker wiper attack.

full profile

The Anatomy of Escalation: Why Stryker, Why Now

Stryker has no direct connection to military operations. The company manufactures surgical equipment, orthopedic implants, neurotechnology, and hospital devices. So why would an Iranian state-linked threat actor target a medical device manufacturer?

The answer lies in the calculus of asymmetric warfare and the specific logic of Void Manticore's target selection. Handala's manifesto cited two justifications: the February 28 U.S. missile strike on a school in Minab, Iran, which reportedly killed more than 175 people (an incident the Pentagon has confirmed it is investigating), and Stryker's 2019 acquisition of OrthoSpace, an Israeli orthopedic device company. The manifesto called Stryker "a Zionist-rooted corporation."

But the real targeting logic is more calculated than ideology alone. Stryker was selected for the scale of disruption its compromise would create. A Fortune 500 company with 56,000 employees, $25 billion in annual revenue, operations in 61 countries, and products embedded in hospital supply chains worldwide represents the kind of target that generates maximum media visibility and maximum operational pain. This is consistent with how Void Manticore has operated since 2022: government ministries in Albania, critical infrastructure in Israel, Western NGOs and think tanks from 2024 to 2025, and now a major U.S. corporation.

"Attacks like this unfortunately aren't surprising. Even before the latest geopolitical tensions, hacktivist activity targeting healthcare and other critical infrastructure had been steadily increasing." — Skip Sorrells, Field CTO-CISO, Claroty (via Cyber Magazine)

Iranian officials stated earlier in March 2026 that Tehran would expand its targeting to include economic centers and banks tied to the United States or Israel, and that U.S. companies with ties to the U.S. military or Israel would also be attacked. The Stryker operation appears to be the first significant execution of that stated intent against a U.S. commercial target. Palo Alto Networks Unit 42 published an advisory noting that Handala's operations are increasingly "opportunistic" with a focus on "supply-chain footholds" to reach downstream victims (source: Unit 42).

warning

The explicit message from Handala: any company with business ties to Israel — through acquisitions, partnerships, shared customers, or investment relationships — should consider itself a potential target. The Stryker attack was not driven by a cybersecurity failure. It was driven by a business relationship. Security teams need to incorporate geopolitical exposure into their threat models.

The Ripple Effect: Hospitals, Supply Chains, and the BYOD Problem

The immediate operational impact was severe. Stryker's CEO Kevin Lobo, in a letter to employees posted on LinkedIn, confirmed the attack had been contained and the company was entering the restoration phase. But SEC filings and reporting told a more granular story: order processing, manufacturing, and shipping were all disrupted. Stryker could not provide a timeline for full recovery. Shares fell 9%, dropping from approximately $373 to $339 (source: MedTech Dive).

For hospitals and surgical centers that depend on Stryker products — including surgical tools, robotic surgery systems, and orthopedic implants — every day of disruption carries consequences beyond a corporate balance sheet. The American Hospital Association confirmed it was actively monitoring the situation and exchanging information with federal authorities. While Stryker stated its patient-related services and connected products were not impacted, isolated reports surfaced of procedure delays at hospitals reliant on Stryker technology.

Then there is the Bring Your Own Device problem. Stryker, like many global enterprises, used an MDM-enrolled BYOD policy. Employees who enrolled personal phones for corporate email and applications discovered that the remote wipe command did not distinguish between corporate and personal data. Personal photos, banking apps, authenticator tokens, and eSIM configurations were destroyed. Staff were urgently instructed to remove the Intune Company Portal, Microsoft Teams, and VPN clients from their personal devices. Employees across multiple countries reported reverting to pen-and-paper workflows and communicating via WhatsApp while corporate systems remained offline.

This dimension of the attack exposes a latent trust assumption in every BYOD program: employees consent to corporate management of their personal devices on the understanding that the capability will be used responsibly and securely. When that trust is violated — not by the employer, but by an attacker who has seized the controls — the result is personal harm at a scale that goes well beyond corporate IT disruption.

Defending Against the Unthinkable: What This Attack Demands

Security teams have spent years optimizing for ransomware. Wiper attacks demand a different response posture, and MDM-based wiper attacks demand a posture that, frankly, few organizations have considered at all. The Stryker incident surfaces several structural lessons.

Treat MDM admin access as a Tier 0 asset. The ability to remotely wipe every device in an enterprise fleet is, functionally, the ability to destroy the company. Persistent administrative rights to Intune, Jamf, VMware Workspace ONE, or any MDM platform should require just-in-time (JIT) activation through a system like Microsoft Entra Privileged Identity Management (PIM). No one should hold permanent standing access to the mass wipe capability. Palo Alto Networks Unit 42 specifically recommended enforcing JIT access for all administrative roles, with credentials having zero permissions by default.

Implement threshold-based alerts for bulk wipe operations. A wipe command against one or two devices is a normal IT operation. A wipe command against thousands of devices in a short window is an attack. Organizations should configure alerting rules that trigger immediate investigation when the number of wipe commands exceeds a defined threshold — something as simple as more than three to five wipes within a short timeframe.

Require phishing-resistant MFA on all admin accounts. Hardware-based MFA such as FIDO2 security keys should be mandatory for any account with MDM administrative privileges. Password plus SMS or password plus authenticator app is not sufficient for an account that can destroy 200,000 devices. Conditional Access policies should restrict MDM admin access to specific managed, compliant devices from named locations — not general workstations from any network.

Re-evaluate BYOD enrollment scope. The Stryker attack demonstrates that MDM enrollment of personal devices carries catastrophic downside risk. Organizations should consider whether containerized solutions — which isolate corporate data in a managed container without gaining full-device wipe authority — are more appropriate than full-device enrollment for personal devices.

# Azure AD / Entra ID: Review Intune admin role assignments
$ az rest --method GET --url "https://graph.microsoft.com/v1.0/roleManagement/directory/roleAssignments?\$filter=roleDefinitionId eq 'INTUNE_ADMIN_ROLE_ID'"

# Check for standing (permanent) assignments vs eligible (JIT) assignments
# Any permanent assignment to Intune Administrator should be investigated

The Larger Pattern: Iran's Wiper Doctrine and the Road Ahead

The Stryker attack does not exist in isolation. Iran has maintained a wiper capability for over a decade. Shamoon destroyed more than 30,000 workstations at Saudi Aramco in 2012. The Sands Casino attack in 2014 wiped systems in retaliation for comments by the casino's owner about Iran. ZeroCleare targeted Middle Eastern energy companies in 2019. And since 2022, Void Manticore has deployed a growing roster of wiper families — BiBi Wiper (named after Israeli Prime Minister Benjamin Netanyahu), CaddyWiper, Cl Wiper, and partition wipers — against targets in Israel and Albania.

In the first half of 2025, three additional Iranian-linked wiper families — BlueWipe, SewerGoo, and BeepFreeze — were identified targeting critical infrastructure and government networks in Israel and Albania. PathWiper was deployed in Ukraine in June 2025 via legitimate endpoint administration tools, in an approach that eerily foreshadowed the Intune abuse seen in the Stryker incident. The pattern is clear: Iran's cyber doctrine treats data destruction not as a last resort, but as a primary strategic tool for asymmetric retaliation.

Handala's manifesto stated the Stryker operation was "only the beginning of a new chapter in the cyber war." Whether that is propaganda or an operational roadmap, the implications are the same. Moody's analysis published on March 12, 2026, noted that while Iran's internet connectivity has dropped to 1-4% of normal levels due to combined government shutdowns and U.S./Israeli cyberattacks on Iranian routing infrastructure, the Stryker attack demonstrates that pre-positioned access and cloud-based attack vectors can bypass even severe infrastructure degradation (source: Moody's).

CISA Acting Director Nick Andersen confirmed the agency is investigating the attack, stating the agency is "working shoulder-to-shoulder with our public and private sector partners." FBI Director Kash Patel posted publicly on the day of the attack that the FBI is working around the clock to address the threat (source: Nextgov).

Key Takeaways

  1. MDM platforms are now critical attack surfaces: The Stryker attack demonstrates that Mobile Device Management systems carry the same destructive potential as traditional wiper malware — but bypass endpoint detection entirely because they operate through legitimate administrative channels. Any organization using Intune, Jamf, or equivalent platforms should immediately audit admin access, enforce JIT provisioning, and implement bulk-action alerting.
  2. MITRE T1485: Data Destruction has evolved beyond malware: The framework's description of data destruction must now account for cloud-based management tool abuse. Security teams that scope their T1485 detection to file-overwriting executables and boot record corruption are missing the attack surface that Handala exploited. Detection strategies need to encompass administrative control plane actions, not just endpoint behavior.
  3. Geopolitical exposure is now a cybersecurity variable: Stryker was targeted because of a 2019 acquisition of an Israeli company and because of the scale of disruption its compromise would generate. Organizations with any business relationship to Israel, U.S. defense, or entities operating in conflict-adjacent regions need to factor geopolitical exposure into their risk models and threat intelligence priorities.
  4. Wiper recovery is fundamentally different from ransomware recovery: Encrypted data can theoretically be recovered. Wiped data cannot. Recovery from a mass MDM wipe depends entirely on backup integrity and the speed of device reprovisioning. Organizations that have optimized their recovery posture for ransomware need to separately test and validate their ability to recover from total fleet destruction.
  5. BYOD programs carry catastrophic tail risk: When personal devices are enrolled in MDM, the trust relationship between employer and employee extends to a shared destruction surface. Organizations should critically evaluate whether full-device MDM enrollment of personal devices is worth the risk compared to containerization approaches that limit administrative control.

The Stryker attack is not a story about a company that failed to patch a vulnerability or fell for a phishing email. It is a story about a legitimate enterprise tool being turned against the enterprise that trusted it — and about a state-linked threat actor that understood, precisely, how to exploit that trust for maximum destruction. The 200,000 devices that went dark on March 11 were not destroyed by malware. They were destroyed by a feature.

That distinction should keep every CISO awake tonight.

— end of briefing