Stryker restores systems after pro‑Iran hackers wiped thousands of employee devices

Change
Stryker is restoring its computers and internal network after a March 11 cyberattack in which pro‑Iranian hackers used access to the company's Microsoft Intune management dashboards to remotely wipe tens of thousands of employee laptops and phones.
Stryker restores systems after pro‑Iran hackers wiped thousands of employee devices
Why it matters
Corporate IT must rebuild and re-secure device management and management-console access before endpoints can be trusted or full network services can resume. While restoration continues, order processing, manufacturing, and shipping functions remain impaired and cannot operate normally.
Implications
  • Stryker IT and cybersecurity incident response teams must rebuild and re-secure the Microsoft Intune management environment and rotate administrator credentials — failure to complete this will leave endpoints vulnerable to further remote wipes.
  • Stryker production, manufacturing, and order-fulfillment teams must run manual inventory, order-tracking, and shipping reconciliation procedures until enterprise systems are restored — failure to implement manual controls will prolong shipment and production delays.

Unlock the decision layer.

Go beyond headlines — see impact, exposure, and timing.

  • Implications: What actually changes downstream.
  • Who is affected: Which teams or operators are exposed.
  • What to watch: Deadlines, triggers, and next moves.
  • Real-time alerts: Know the moment a change is published.
  • Ask AI: Clarify any brief instantly, in context.

14-day free trial. Full access. No credit card required.

Start free trial
Source

TechCrunch

Topics

Supply Chain & Logistics Cybersecurity

Stay updated

Don’t check for changes.
Get them as they happen.

Get real-time alerts for executed changes, a daily briefing of what matters, and a weekly summary to stay on top — without having to check constantly.

14-day free trial. Full access. No credit card required.