Iran‑Backed Group Deploys Wiper Malware Against Stryker’s Manufacturing Systems
An Iran‑aligned hacking collective publicly claimed responsibility for a wiper malware campaign that hit Stryker, a leading medical‑technology firm. The malicious code targeted the company’s manufacturing execution and device‑management platforms, attempting to overwrite critical configuration files, production data, and software binaries. By erasing these assets, the attackers sought to halt the assembly of life‑saving devices and disrupt the company’s ability to service existing equipment.
For defenders, this incident underscores the growing willingness of nation‑state actors to use destructive wipers as a tool of geopolitical pressure, especially against high‑impact sectors like healthcare. The attack highlights the need for robust network segmentation, immutable backups, and continuous monitoring of supply‑chain environments. Organizations should prioritize rapid detection of file‑integrity anomalies, enforce least‑privilege access to manufacturing controls, and rehearse incident‑response playbooks that include full data‑restoration scenarios.
Categories: Malware & Ransomware, Threat Intelligence
Source: Read original article
Member discussion