Stryker says malware was involved in recent cyberattack as production lines reopen
好的,我现在需要帮用户总结一下这篇文章的内容,控制在100个字以内。首先,我得通读一下文章,了解主要信息。 文章讲的是医疗设备公司Stryker在遭受伊朗网络攻击后的情况。攻击导致超过20万家公司的设备被擦除,Stryker正在恢复生产线,并与网络安全公司合作确认黑客已被清除。他们正在重建系统或从备份中恢复,并隔离未恢复的系统。此外,攻击影响了紧急医疗服务,导致一些医院暂停连接。Stryker还向客户保证他们的技术是安全的,并且没有涉及勒索软件或恶意软件。 接下来,我需要提取关键点:Stryker遭受网络攻击、设备被擦除、正在恢复生产、与网络安全公司合作、确认黑客已被清除、影响紧急医疗服务、客户技术安全。 然后,把这些信息浓缩到100字以内,确保不遗漏重要细节。可能的结构是:公司名称 + 遭遇攻击 + 影响 + 恢复措施 + 客户保证。 最后,检查字数是否符合要求,并确保语言简洁明了。 </think> 医疗设备公司Stryker在遭遇伊朗网络攻击后,正逐步恢复生产线。超过20万台设备被擦除后,公司与网络安全公司合作确认黑客已被清除,并在重建和恢复系统以防止再次入侵。部分受影响系统仍被隔离。尽管攻击影响了紧急医疗服务并导致部分医院暂停连接,Stryker已向客户保证其技术安全且未受攻击波及。 2026-3-24 21:0:47 Author: therecord.media(查看原文) 阅读量:8 收藏

The medical device firm Stryker said it is ramping production lines back up two weeks after alleged Iranian cyber actors wiped more than 200,000 company devices.

The company sought to reassure customers in a notice on Monday, sharing a letter from cybersecurity firm Palo Alto Networks confirming that the hackers behind the incident have been removed from Stryker systems.

Stryker officials said they are in the process of rebuilding the wiped systems or restoring them from backups predating the known window of compromise to further prevent threat actors from reentering. The impacted systems that have not been restored yet are isolated from the network.

Multiple updates have been sent to hospitals and healthcare facilities around the world after concerns were raised about whether the cyber intrusion extended to Stryker’s customers. 

In a Justice Department affidavit targeting the Iranian hackers behind the incident last week, federal prosecutors said the Stryker attack "had a direct impact on emergency medical services and hospitals within Maryland” and “prompted some hospitals to temporarily suspend connections” to the company out of fear of being affected by the wiper incident.

The affidavit cites one Stryker employee stationed at a hospital in Maryland who struggled to continue working after their device had been wiped following the cyberattack. 

Stryker produces a variety of hospital technology, including bed sensors and hands-free communication devices that allow nurses and doctors to contact each other. Court documents said that "as a result of the disruption to [Stryker] systems… clinicians were instructed to rely on radio consultation and verbal description."

“The disruption to required clinical communication systems demonstrates that the cyberattack on [Stryker] in some cases interfered with the delivery of emergency medical care in Maryland hospitals,” prosecutors wrote. 

Stryker recently sent out urgent notices to customers assuring them that their technology is safe to use and is not connected to the cyberattack, which was targeted at internal corporate Microsoft systems. The Iranian hackers used a native functionality within Microsoft Intune — the device wipe feature — to destroy all company data on more than 200,000 devices across Stryker’s employee base in the U.S., Ireland, India and other countries.

The company said Monday that it is prioritizing the restoration of systems that directly support customers, ordering and shipping. 

Stryker also noted that malware was used by the attackers during the attack. Since the  incident began, the company has repeatedly told the public and regulators that no ransomware or malware was involved. 

In Monday’s update, Stryker said Palo Alto Networks’ incident response team Unit 42 and other experts “identified that the threat actor used a malicious file to run commands which allowed them to hide their activity while in” company systems.

“To be clear, this file was not capable of spreading — either inside or outside of our environment. Most importantly, at no point has our investigation identified malicious activity directed towards our customers, suppliers, vendors or partners,” Stryker said.  

The company shared a copy of a letter from Troy Bettencourt, vice president of incident response at Palo Alto Networks Unit 42. The letter confirms Stryker’s assessment that the incident has been contained and that there is no evidence that the hackers accessed customer, supplier, vendor and partner systems.

The letter says Unit 42 helped remove “unauthorized persistence mechanisms” installed by the threat actors. 

“Unit 42 has found no current evidence of active, uncontained, persistent unauthorized access within the Stryker environment,” Bettencourt said, adding that they are working with Microsoft to monitor the situation going forward.  

Stryker said manufacturing systems are “ramping quickly as critical lines and plants are brought back online.” Global manufacturing sites “continue to stabilize" according to the company. 

Bloomberg reported last week that some surgeries have been cancelled because Stryker-made implants are not available due to the attack. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/stryker-cyberattack-malware-iran
如有侵权请联系:admin#unsafe.sh