Stryker Cyberattack Contained as Company Works to Restore Disrupted Operations

Related

New Data Leak Site Uncovered Linked to Active Initial Access Broker

What happened Researchers uncovered a new Tor-based data leak site...

Trio-Tech Discloses Ransomware Attack Impacting Semiconductor Operations

What happened Trio-Tech International disclosed a ransomware attack affecting its...

Kaplan Data Breach Notification Follows Hack Exposing Personal Information

What happened Kaplan North America began notifying individuals of a...

Female Cybersecurity Leaders to Watch in Virginia

Virginia’s cybersecurity bench is shaped by a rare mix...

Hacker Breaches Resolv DeFi Platform, Steals $24.5 Million in Crypto

What happened A cyberattack on decentralized finance platform Resolv allowed...

Share

What happened

Stryker said it has contained a cyberattack that disrupted its global operations and is now focusing on restoring systems tied to customer service, ordering, and logistics. The incident impacted internal systems, including devices connected to its Microsoft-based environment, affecting order processing, manufacturing, and shipments. The Iran-linked group Handala claimed responsibility for the attack, though the company has not confirmed attribution. Stryker stated that employee laptops, mobile devices, and remote systems were affected, while patient-facing systems and connected medical products were not impacted. The company is working with authorities and external cybersecurity experts as it continues investigating the incident and restoring operations. 

Who is affected

Stryker’s internal business operations, including manufacturing, ordering, and logistics systems, were affected, along with employee devices connected to corporate networks, while patient-related systems remained unaffected. 

Why CISOs should care

The update highlights how large-scale cyber incidents can shift quickly from initial disruption to prolonged recovery phases, with operational continuity and system restoration becoming the primary challenge after containment. 

3 practical actions

  1. Prioritize recovery of critical systems. Focus on restoring systems that directly support customer operations and logistics. 
  2. Validate system integrity post-incident. Ensure affected endpoints and infrastructure are secure before bringing them back online. 
  3. Coordinate with external responders. Work with authorities and cybersecurity experts during investigation and recovery efforts. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.