1 min read

Iran‑linked wiper disrupts medtech giant Stryker’s production lines

An Iran‑backed threat group deployed a destructive wiper malware against Stryker, a leading medical‑technology manufacturer. The payload targeted Windows workstations and servers on the corporate network, overwriting files and rendering critical manufacturing and supply‑chain systems inoperable. Early detection came after multiple workstations reported “file not found” errors and system reboots, prompting an emergency response.

The attack halted production of several high‑value medical devices, caused significant data loss, and forced Stryker to invoke business‑continuity plans, incurring costly downtime and potential regulatory penalties. Defenders should note the use of a wiper rather than ransomware, indicating a motive to cause disruption, and the targeting of a sector critical to public health. Strengthening network segmentation, applying strict least‑privilege access, and maintaining immutable backups are essential to mitigate similar nation‑state‑backed sabotage campaigns.

Categories: Malware & Ransomware, Threat Intelligence

Source: Read original article