Stryker breach spotlights risk of weaponized device-management tools

1 min read
Source: Cybersecurity Dive
Stryker breach spotlights risk of weaponized device-management tools
Photo: Cybersecurity Dive
TL;DR Summary

A March 2026 Stryker cyberattack allegedly used Microsoft Intune to remotely wipe thousands of devices, with Iran-linked Handala claiming credit and up to 50 terabytes of data stolen. Researchers say the attack leveraged living-off-the-land techniques rather than a flaw in Intune, highlighting how MDM/UEM platforms can be abused. MFA and multi-account approvals for destructive actions are advised as Stryker works with forensic experts and the CISA investigates the incident.

Share this article

Reading Insights

Total Reads

1

Unique Readers

2

Time Saved

10 min

vs 11 min read

Condensed

97%

2,16169 words

Want the full story? Read the original article

Read on Cybersecurity Dive