Code Defence Cyber security

Stryker restoration begins after Intune wipe attack erases 80โ€š000 devices. ๐Ÿ›‘

One of the world leading medical device makers was crippled without a single line of malware. ๐Ÿ›‘

Disruption Alert ยท Attackers abused Microsoft Intune to wipe 80โ€š000 employee devices.

Investigation details released in the last 24 hours confirm that the attack on @[Stryker](urn:li:organization:1592) was an identity-based disruption campaign. After compromising an administrative accountโ€š the Iran-linked group Handala created a new Global Administrator in @[Microsoft](urn:li:organization:1035) Entra ID and used the wipe command in Intune to erase the fleet.

Nearly 80โ€š000 devicesโ€”including corporate laptops and mobile devicesโ€”were wiped in a three-hour window. While medical products remain safeโ€š electronic ordering and shipping systems remain offline as the company focuses on manual replenishment for hospital customers.

The uncomfortable truth: Your centralized management tools are a double-edged sword; they provide massive efficiency for IT but can be weaponized for total operational destruction in minutes.

โ†’ Enforce phishing-resistant MFA (FIDO2) for all accounts with Global Admin or Intune permissions.

โ†’ Review your Entra ID logs for the creation of unauthorized administrative accounts over the last week.

โ†’ Implement strict Conditional Access policies to prevent administrative actions from unknown IP blocks.

#Cybersecurity #IdentitySecurity #Intune #DisasterRecovery #SOC #CodeDefence

Scroll to Top

Review My Order

0

Subtotal