Robotic Surgery Giant Intuitive Discloses Cyberattack After Phishing Incident

Related

FBI Links Cybercriminals to Sharp Surge in Cargo Theft Attacks

What happened The FBI issued a public service announcement on...

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

What happened ESET has documented a previously unknown China-linked APT...

Cosmetics Giant Rituals Confirms Data Breach of Customer Membership Records

What happened Netherlands-based cosmetics retailer Rituals has confirmed a data...

Organized Fraud Networks Exploit French Fintech Platforms to Launder Stolen Funds

What happened Group-IB researchers have identified a structured three-phase fraud...

Share

What happened

Medical device company Intuitive disclosed a cyberattack after a targeted phishing incident led to unauthorized access to certain internal business applications. The attackers leveraged an employee’s compromised credentials to access the company’s internal administrative network, exposing customer business and contact information, employee data, and corporate information. Intuitive said it activated incident response procedures upon discovery and secured the affected systems. The company emphasized that the breach did not impact its operations, and that its da Vinci surgical systems, Ion platforms, and manufacturing networks were not affected, as they operate on separate infrastructure from internal IT systems. 

Who is affected

Customers, employees, and business contacts whose information was stored in Intuitive’s internal systems are affected, while hospitals and systems using its surgical platforms were not impacted. 

Why CISOs should care

The incident highlights how phishing attacks targeting employee credentials can lead to unauthorized access to sensitive business systems, even when critical operational and product environments remain isolated. 

3 practical actions

  1. Strengthen phishing resistance. Monitor and prevent credential compromise through targeted phishing campaigns. 
  2. Segment critical systems. Maintain separation between business IT systems and operational or product environments. 
  3. Audit internal application access. Review access controls and monitor for unauthorized activity in administrative systems. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts