Medtech giant Stryker says it’s back up after Iranian cyberattack

CyberScoop
Actively Exploited

Overview

Stryker, a major player in the medical technology sector, recently recovered from a cyberattack attributed to the Iranian hacking group Handala. This attack involved a wiper malware that compromised the company's systems, disrupting operations and potentially affecting patient care and medical device functionality. Although Stryker has announced that its systems are back online, the implications of such an attack raise concerns about the security of healthcare infrastructure. Cyberattacks on medical technology firms can have serious consequences, not only for the companies involved but also for healthcare providers and patients relying on their products. The incident serves as a reminder of the ongoing risks facing the medtech industry and the need for enhanced cybersecurity measures.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Stryker's medical devices and operational systems
  • Timeline: Disclosed on [date]

Original Article Summary

The Handala group claimed responsibility for hitting the company with a wiper attack last month. The post Medtech giant Stryker says it’s back up after Iranian cyberattack appeared first on CyberScoop.

Impact

Stryker's medical devices and operational systems

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Disclosed on [date]

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Malware.

Related Coverage

Thousands of API credentials exposed on public websites

SCM feed for Latest

A recent study conducted by researchers from Stanford University, the University of California, Davis, and TU Delft revealed that thousands of API credentials have been exposed on public websites. Using a tool called TruffleHog, the researchers scanned various sites and discovered sensitive information that could be exploited by malicious actors. This exposure poses significant risks as attackers could gain unauthorized access to systems and data. The findings underscore the need for companies to implement better security practices, such as using environment variables and secure storage solutions for API keys. The research serves as a warning for developers and organizations to regularly audit their code and remove any sensitive information from public repositories.

Apr 2, 2026

CrystalRAT malware-as-a-service offers remote access and prankware features

SCM feed for Latest

CrystalRAT is a new type of malware that has emerged in 2023, functioning as a malware-as-a-service platform. It operates on a subscription model, allowing users to access its capabilities, which include remote access to infected systems and features designed for pranks. Researchers from Kaspersky have noted that CrystalRAT bears a strong resemblance to an earlier malware called WebRAT. This is concerning as it lowers the barrier for entry for cybercriminals, enabling even those with limited technical skills to launch attacks. The rise of such services poses a growing threat to individuals and organizations, as they can be exploited for a variety of malicious purposes including data theft and system manipulation.

Apr 2, 2026

Hasbro hit by cyberattack, investigates possible data breach

Security Affairs

Hasbro, the well-known toy manufacturer, reported a cyberattack on Wednesday that has disrupted some of its operations. The company is currently investigating the incident to determine the extent of the attack and whether any sensitive data has been compromised. This situation raises concerns not only for Hasbro and its employees but also for customers who may be affected if personal information is involved. The investigation is ongoing, and Hasbro is working to restore its normal operations as quickly as possible. This incident serves as a reminder of the vulnerabilities that organizations face in the digital landscape.

Apr 2, 2026

Phishing campaign delivers Casbaneiro and Horabot banking trojans

SCM feed for Latest

A Brazilian cybercrime group known as Augmented Marauder and Water Saci has launched a phishing campaign that spreads two banking trojans: Casbaneiro and Horabot. The attackers use a mix of WhatsApp, ClickFix techniques, and email phishing to deliver these malicious programs. The campaign primarily targets individuals and organizations, aiming to steal sensitive banking information. This is particularly concerning as it showcases the evolving tactics employed by cybercriminals to exploit users through familiar communication channels. Users should be cautious about unsolicited messages and verify the authenticity of links before clicking.

Apr 2, 2026

Ransomware attackers increasingly exploit legitimate IT tools, bypassing antivirus

SCM feed for Latest

Recent reports indicate that ransomware attackers are increasingly using legitimate IT tools, such as Process Hacker and IOBit Unlocker, to bypass traditional antivirus software. These tools have deep access to operating system functions, allowing attackers to execute malicious activities without raising alarms. This trend poses significant risks to organizations, as it makes it harder for security systems to detect and prevent these kinds of attacks. Companies must reassess their security measures to account for the misuse of legitimate software, which could compromise sensitive data and disrupt operations. As attackers continue to evolve their tactics, it’s crucial for users and companies to stay vigilant and update their defenses accordingly.

Apr 2, 2026

WhatsApp warns of spyware in fake iPhone app

SCM feed for Latest

WhatsApp has raised concerns about a fake iPhone app developed by the Italian spyware company SIO. This app is designed to impersonate the legitimate WhatsApp service, potentially tricking users into downloading malicious software. If users unknowingly install this app, their personal information and communications could be at risk. This situation highlights the ongoing threat of spyware and the importance of downloading applications only from trusted sources. Users are encouraged to verify app authenticity before installation to protect their data from potential exploitation.

Apr 2, 2026