1 min read

Iran‑Backed Wiper Hits Stryker, Threatening MedTech Operations

An Iranian‑aligned hacking group publicly claimed responsibility for a wiper campaign against Stryker, a major provider of medical devices and technology. The malware was designed to overwrite critical files and firmware, effectively rendering surgical equipment and imaging systems inoperable. Initial forensic analysis shows the payload deployed a destructive script that targeted both Windows workstations and embedded controllers within the devices.

The attack jeopardized patient safety by potentially disabling life‑supporting hardware and caused significant operational downtime for hospitals relying on Stryker’s products. Defenders must prioritize rapid detection of file‑wiping behaviors, enforce strict network segmentation between IT and OT environments, and maintain immutable backups. Threat intel on this group’s tooling and tactics should be integrated into SOC rules to prevent similar supply‑chain disruptions in the medical sector.

Categories: Malware & Ransomware, Threat Intelligence

Source: Read original article