Stryker attack wiped tens of thousands of devices, no malware needed
好的,我现在需要帮用户总结一篇关于史赛克公司遭受网络攻击的文章,控制在100字以内。首先,我得通读整篇文章,抓住关键信息。 文章提到,上周医疗科技巨头史赛克遭受网络攻击,攻击者利用微软的内部环境远程擦除了数万员工设备。虽然所有医疗设备安全可用,但电子订购系统仍离线,客户需手动下单。史赛克强调这不是勒索软件攻击,也没有植入恶意软件。黑客声称窃取了50TB数据,但调查未发现数据外泄。攻击者拥有全球管理员权限,通过Intune命令擦除近8万设备数据。目前公司正在恢复系统,优先处理供应链和客户订单。 接下来,我需要将这些信息浓缩到100字以内。重点包括:攻击对象、影响范围、系统恢复情况、攻击手段和结果。 可能会这样组织语言:史赛克遭遇网络攻击,内部微软环境受影响,数万员工设备被远程擦除。医疗设备安全可用,但电子订购系统离线。调查发现无数据外泄,攻击者拥有管理员权限。公司正努力恢复系统和订单处理。 检查字数是否在限制内,并确保信息准确全面。 </think> 医疗科技巨头史赛克遭遇网络攻击,其内部微软环境受影响,数万员工设备被远程擦除,但所有医疗设备安全可用,电子订购系统仍离线。调查发现无数据外泄,攻击者拥有管理员权限,目前公司正努力恢复系统和订单处理。 2026-3-16 19:30:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Stryker attack wiped tens of thousands of devices, no malware needed

Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices.

The organization says in an update on Sunday that all its medical devices are safe to use but electronic ordering systems remain offline, and customers must place orders manually through sales representatives.

Stryker emphasizes that the incident was not a ransomware attack and that the threat actor did not deploy any malware on its systems.

Last week, Stryker was the target of a cyberattack claimed by the Handala hacktivist group, believed to be linked to Iran.

The attacker alleged that they wiped “over 200,000 systems, servers, and mobile devices” and stole 50 terabytes of data. However, investigators did not find any indication that data was exfiltrated.

Following the disruption, Stryker employees in multiple countries started to complain that their managed devices had been remotely wiped overnight.

Some employees had their personal devices enrolled in the company network and lost personal data during the wiping process.

Hackers had Global Admin privileges

A source familiar with the attack told BleepingComputer that the threat actor used the wipe command in Intune, Microsoft’s cloud-based endpoint management service, to erase data from nearly 80,000 devices between 5:00 and 8:00 a.m. UTC on March 11.

The attacker carried out the action after compromising an administrator account and creating a new Global Administrator account.

The investigation is being conducted by the Microsoft Detection and Response Team (DART) in collaboration with cybersecurity experts from Palo Alto Unit 42.

Stryker’s update highlights that the attack did not impact any of its products, connected or otherwise, and was limited exclusively to the internal Microsoft corporate environment.

“All Stryker products across our global portfolio, including connected, digital, and life-saving technologies, remain safe to use,” the company says.

Restoration efforts are currently underway, the main focus being on resuming shipping and transactional services. Customers are encouraged to maintain normal communication with company personnel while the infrastructure is steadily recovered.

Any order placed before the cyberattack will be honored as systems are restored, while those placed during the disruption will be processed when systems are back online, and the supply flow resumes to normal.

The company is working with its global manufacturing sites to deal with potential operational impact.

Stryker’s current priority is to restore the supply-chain system and resume customer orders and shipping. “Our core transactional systems are already on a clear path to full recovery,” the company says.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
如有侵权请联系:admin#unsafe.sh