Sunday, March 22, 2026

DISRUPTIVE CYBER ATTACK: Medtech Giant Stryker. . ."Stryker’s offices in 79 countries have been forced to shut down."

Microsoft published guidance on hardening Intune administrative controls days after Stryker was breached in an incident claimed by Handala, an Iranian-linked and pro-Palestinian hacktivist group.
Stryker

CISA urges U.S. orgs to secure Microsoft Intune systems after Stryker breach


CISA

CISA warned U.S. organizations to follow Microsoft guidance to strengthen the Intune endpoint management tool after a cyberattack exploited it to wipe medical technology giant Stryker's systems.

Microsoft published guidance on hardening Intune administrative controls days after Stryker was breached in an incident claimed by Handala, an Iranian-linked and pro-Palestinian hacktivist group.

The hackers claim that they stole 50 terabytes of data before using the built-in wipe command in Microsoft's Intune cloud-based endpoint management tool to wipe nearly 80,000 devices in the early morning of March 11.

Now, CISA urged all U.S. organizations to harden their Intune environments to make them more resilient against similar attacks that could target their own networks.

"CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment," the U.S. cybersecurity agency said on Wednesday.

"To defend against similar malicious cyber activity, CISA urges organizations to harden endpoint management system configurations using the recommendations and resources provided in this alert."

CISA's list of recommendations applies to Microsoft Intune and other endpoint management software, and it requires IT administrators to use a least-privilege approach for admin roles, assigning only the necessary permissions through Microsoft Intune's role-based access control (RBAC).

Admins should also enforce MFA and privileged-access hygiene to block unauthorized access to privileged actions in Intune (via Microsoft Entra ID features such as Conditional Access, risk signals, and MFA) and require multi-admin approval for changes to sensitive actions, such as device wipes, application updates, and RBAC modifications.

"When combined, these practices help you shift from relying on 'trusted administrators' toward building a more protected administration by design: least-privilege to contain impact, Microsoft Entra-based controls to ensure users are trusted and are who they say they are, and multi-admin approval to govern the changes that matter most," Microsoft says.

Handala (also known as Handala Hack Team, Hatef, Hamsa), the group that claimed responsibility for the Stryker cyberattack, emerged in December 2023 as a hacktivist operation targeting Israeli organizations with Windows and Linux data-wiping malware.

They have been linked to Iran's Ministry of Intelligence and Security (MOIS) and are known for stealing and leaking sensitive data from compromised systems.

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

 

 

 

Related Articles:

FBI seizes Handala data leak site after Stryker cyberattack

Stryker attack wiped tens of thousands of devices, no malware needed

Critical Microsoft SharePoint flaw now exploited in attacks

CISA flags Wing FTP Server flaw as actively exploited in attacks

Medtech giant Stryker offline after Iran-linked wiper malware attack


POPULAR 
  • FBI links Signal phishing attacks to Russian intelligence services

    The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encrypted messaging apps such as Signal and WhatsApp in phishing campaigns that have already compromised thousands of accounts.

  • Oracle pushes emergency fix for critical Identity Manager RCE flaw

    Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992.

  • Police take down 373,000 fake CSAM sites in Operation Alice

    An international law enforcement action called Operation Alice has shut down over 373,000 dark web sites that offered fake CSAM packages.

  • CISA orders feds to patch max-severity Cisco flaw by Sunday

    The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22.

  • How CISOs Can Survive the Era of Geopolitical Cyberattacks

    Geopolitical tensions are driving destructive cyberattacks designed to disrupt operations, not demand ransom. CISOs must limit lateral movement and contain breaches to reduce the impact of wiper campaigns.

  • This refurbished Surface Pro 6 is travel-friendly and on sale for $230

    This refurbished Surface Pro 6 is available for just $229.99 (MSRP $849.99) for a limited time. With its slim design and reliable specs, it's a practical option for anyone who wants a portable Windows device without spending a fortune.

    • BleepingComputer Deals
    • March 20, 2026
    • 07:12 AM
    • Comment Count 0 

     

     

  • Musician admits to $10M streaming royalty fraud using AI bots

    North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music.

     

  • International joint action disrupts world’s largest DDoS botnets

    Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices.

  • Microsoft: March Windows updates break Teams, OneDrive sign-ins

    Microsoft says the March Windows 11 update breaks sign-ins with Microsoft accounts across multiple Microsoft apps, including Teams and OneDrive.

  • Ex-data analyst stole company data in $2.5M extortion scheme

    A North Carolina man was found guilty of extorting a D.C.-based technology company while still being employed as a data analyst contractor.

  • Navia discloses data breach impacting 2.7 million people

    Navia Benefit Solutions, Inc. (Navia) is informing nearly 2.7 million individuals of a data breach that exposed their sensitive information to attackers.

  • Another Bump-in-the-road for Elon Musk

    POST SCRIPT: Musk’s lawyers said that they will appeal the ruling. “We view today’s verdict, where the jury found both for and against the plaintiffs and found no fraud scheme, as a bump in the road,” the legal team at Quinn Emanuel Urquhart & Sullivan said in a statement.

    Musk, who is an extremely active user of X, has not yet commented on the jury’s decision.

     

    Elbit arms facility set ablaze in EU (VIDEO)

    A defense facility in the Czech Republic linked to the Israeli weapons manufacturer Elbit Systems was set ablaze on March 20, 2026, in what is being investigated as a possible act of terrorism. A group calling itself the "Earthquake Faction" claimed responsibility for the arson attack. . .The company, however, has denied any ties to Israel, insisting its production primarily flows to Ukraine. 

    The Earthquake Faction, which describes itself as “an internationalist underground network,” posted a video purportedly showing the arson attack on an industrial facility in the Czech town of Pardubice on Friday, along with images of the burned-out building.

    The Earthquake Faction se hlásí k požáru v Pardubicích - iDNES.cz

    It said the site was used to “develop weaponry used by the Zionist entity to massacre people daily in Palestine, Lebanon, Iran, and across West Asia.” 

    ‘Israel-linked’ arms facility set ablaze in EU (VIDEO)

    A warehouse belonging to a Czech defense firm supplying Ukraine has been torched by activists over alleged links to an Israeli military contractor 
    https://image.chitra.live/api/v1/wps/3f653cd/91748d9c-a47a-45e5-b55c-d8d3d4753186/0/NGJmZjU1NzEtN2M-630x420.jpg 
    Published 20 Mar, 2026 18:04 | Updated 21 Mar, 2026 20:58 

     

    Firefighters extinguished the blaze, no injuries were reported, and police said there was no danger to the public. Footage from the scene suggested the warehouse was destroyed and an adjacent administrative building badly damaged by the fire. Officials said the incident is being treated as a suspected terrorist attack. 

    The facility was operated by LPP Holding, a Czech arms manufacturer producing civilian and military equipment. The company has denied having any ties to Israel, insisting it merely considered cooperation with Elbit Systems in 2023, but it never came to fruition. LPP Holding noted that it has been supplying Ukraine with sophisticated drone systems, prompting local media to point fingers at Moscow over the blaze.

    The Czech Republic, an EU and NATO member, is a close ally of Israel. Czech officials have supported US and Israeli military actions against Iran and condemned Iranian missile and drone attacks. 

    Pro-Iran Activists BLOW UP Israel’s European Arms Factory | Underground  Group Strikes in Revenge

    Editorial cartoons

     Today's editorial cartoon

     latest cartoons – DarylCagle.com

    FYI: LAS VEGAS BRIEF

     
     

    HACKER NEWS | Y Combinator --- Aggregated

     https://images.devshirt.club/release/hacker-news/hacker-news-illustration.webp
     
    1.Calendrical Calculations (wikipedia.org)

    2 points by tosh 6 minutes ago | hide | past | discuss
    2.When machines pay machines, who bills the machine? (billingbird.io)

    3 points by the_reconciler 7 minutes ago | hide | past | discuss
    3.No existing dev tool fits perfectly, so I built my own (devleo.ch)

    2 points by leonardcser 9 minutes ago | hide | past | 1 comment
    4.One Word Silenced the West [video] (youtube.com)

    2 points by joe_mamba 9 minutes ago | hide | past | discuss
    5.Reports of code's death are greatly exaggerated (stevekrouse.com)

    2 points by stevekrouse 11 minutes ago | hide | past | 1 comment
    6.Only 9% of MSPs have strong email spoofing protection across lookalike domains (shieldmarc.com)

    2 points by AMuffinman 11 minutes ago | hide | past | 1 comment
    7.A little gap that will ensure the future of AI Agents being autonomous

    3 points by utsav-develops 13 minutes ago | hide | past | discuss
    8.Non-trivial error in physics paper found via Lean (arxiv.org)

    3 points by leanexplorer 17 minutes ago | hide | past | 1 comment
    9.Careless Whisper – personal local speech to text (github.com/yarivgilad)

    2 points by harel 18 minutes ago | hide | past | discuss
    10.Amanda Peet on Getting Breast Cancer While Losing Her Parents (newyorker.com)

    2 points by Anon84 27 minutes ago | hide | past | discuss
    11.Decorative Patterns of the Ancient World (1930) (archive.org)

    1 point by bookofjoe 28 minutes ago | hide | past | discuss
    12.CryptoSlate is charging AI agents $0.09 per article via x402 (proofivy.com)

    1 point by maarten3 28 minutes ago | hide | past | discuss
    13.Contrarian AI Investment Theses (investinginai.substack.com)

    2 points by robmay 37 minutes ago | hide | past | discuss
    14.Anthropic sent lawyers – no more Claude Max in OpenCode (twitter.com/thdxr)

    4 points by BaudouinVH 41 minutes ago | hide | past | 2 comments
    15.Ext-Markdown-mirror – now supports Pages Router and better image handling (github.com/jakubkontra)

    1 point by JakubKontra 41 minutes ago | hide | past | discuss
    16.Show HN: 20 years of Hacker News discussions, clustered and visualized (lenzy.ai)

    2 points by BohdanPetryshyn 41 minutes ago | hide | past | 1 comment
    17.q and KDB-X (kx.com)

    1 point by tosh 57 minutes ago | hide | past | discuss
    18.'Miracle': Europe reconnects with lost spacecraft (phys.org)

    20 points by vrganj 58 minutes ago | hide | past | discuss
    19.Freestyle Linked Lists Tricks (nullprogram.com)

    3 points by signa11 1 hour ago | hide | past | discuss
    20.Looking for Contributors and Sponsors – SuggestPilot (github.com/shantanugupta43)

    2 points by shaanuknow 1 hour ago | hide | past | discuss
    21.Cooking with Functions (world.hey.com)

    1 point by rickdg 1 hour ago | hide | past | discuss
    22.Sprite OS (wikipedia.org)

    3 points by 0123456789ABCDE 1 hour ago | hide | past | discuss
    23.An effect notation based on with-clauses and blocks (yoshuawuyts.com)

    1 point by r4um 1 hour ago | hide | past | discuss
    24.AI Playground for developers (built in Vite and Python)" (neuralkore.com)

    1 point by beibayee 1 hour ago | hide | past | discuss
    25.Install your own data breach (world.hey.com)

    1 point by rickdg 1 hour ago | hide | past | discuss
    26.HN: Lasvegasbrief.com – A Signal-Based Newspaper for Las Vegas (lasvegasbrief.com)

    1 point by chainbuilder 1 hour ago | hide | past | 1 comment
    27.Kennedy, Dimona and the Nuclear Proliferation Problem: 1961-1962 (wilsoncenter.org)

    1 point by teleforce 1 hour ago | hide | past | discuss
    28.AI trained on Nietzsche's complete works and notebooks (shryn.ai)

    1 point by erikraschke 1 hour ago | hide | past | 1 comment
    29.Windows native app development is a mess (domenic.me)

    5 points by domenicd 1 hour ago | hide | past | discuss
    30.Data Manipulation in Clojure Compared to R and Python (codewithkira.com)

    2 points by tosh 1 hour ago | hide | past | discuss

     

    DISRUPTIVE CYBER ATTACK: Medtech Giant Stryker. . ."Stryker’s offices in 79 countries have been forced to shut down."

    Microsoft published guidance on hardening Intune administrative controls days after Stryker was breached in an incident claimed by Handala...