On the morning of March 11, 2026, over 56,000 Stryker employees across 79 countries switched on their devices and found them wiped. Login screens displayed the logo of Handala, an Iran-linked hacktivist group tied to Iran's Ministry of Intelligence and Security (MOIS). Corporate laptops, mobile phones enrolled in device management, servers, and internal applications — all gone. Not encrypted. Not held for ransom. Permanently erased.
The attackers claimed to have wiped more than 200,000 systems and exfiltrated 50 terabytes of data before pulling the trigger. Stryker's Cork, Ireland headquarters — its largest facility outside the United States with approximately 5,500 employees — was hit hardest. Workers were sent home. Manufacturing systems went offline. The company's Lifenet electrocardiogram transmission system went non-functional across multiple US states, disrupting real-time cardiac data transmission from ambulances to hospitals.
Stryker filed an 8-K with the SEC confirming a cybersecurity incident affecting its entire Microsoft environment, stating the timeline for full restoration "is not yet known." The company's shares dropped over 3%.
This wasn't ransomware. This was destruction. And the most devastating detail? The attackers didn't use custom malware to wipe those 200,000 devices. They used Stryker's own Microsoft Intune console — a legitimate enterprise device management tool — to issue a mass remote wipe command. They turned Stryker's IT infrastructure against itself.
The Attack Chain: How Handala Took Down a $25 Billion Company
Based on reporting from KrebsOnSecurity, BleepingComputer, Palo Alto Networks, and multiple cybersecurity analysts, here's what we know about how the attack unfolded:
Phase 1: Initial Access — Credential Compromise. Handala's established TTPs include phishing and credential harvesting. The group — assessed by Palo Alto Networks as an online persona maintained by Void Manticore, an MOIS-affiliated actor — likely gained initial access through compromised credentials. Whether through phishing, infostealer malware, or a supply chain foothold, the attackers obtained valid credentials that gave them a way into Stryker's Microsoft environment.
Phase 2: Persistence and Privilege Escalation — Active Directory Compromise. British cybersecurity expert Kevin Beaumont assessed that the attackers gained access to Stryker's Active Directory services. This is the crown jewel of any Windows enterprise environment — control over AD means control over user accounts, group policies, authentication, and authorization across the entire organization. With AD access, the attackers could escalate privileges, create persistence mechanisms, and move freely through the network.
Phase 3: Data Exfiltration — 50 Terabytes Stolen. Before executing the wipe, Handala claims to have exfiltrated 50 terabytes of critical data. Whether the number is precisely accurate, the category of data matters: proprietary medical device designs, patient outcome data, procurement records, employee information, clinical trial data, and internal communications. This data exfiltration phase would have required significant time — days or weeks of sustained access to identify, stage, and transfer that volume of data.
Phase 4: The Kill Shot — Intune MDM Abuse. This is where the attack became unprecedented. Rather than deploying custom wiper malware that EDR might detect, the attackers used Stryker's own Microsoft Intune console — a cloud-based mobile device management (MDM) platform — to issue remote wipe commands across all enrolled devices simultaneously. Every laptop, every corporate-managed phone, every enrolled endpoint received a legitimate administrative command from a trusted platform to factory-reset itself. Employees who had personal phones enrolled for work access lost personal data too. Staff were urgently instructed to remove Intune Company Portal, Teams, and VPN clients from personal devices.
Phase 5: Defacement and Psychological Impact. The attackers defaced Stryker's Microsoft Entra login page with the Handala logo and sent emails to company executives claiming responsibility. This is consistent with Handala's playbook: maximum visibility, maximum psychological impact, timed for geopolitical messaging.
Why This Attack Was Practically Invisible to Traditional Security
The Stryker breach exploits a fundamental blind spot in modern enterprise security: when attackers use legitimate administrative tools, traditional detection fails.
No malware to detect. Stryker's own statement confirmed "no indication of ransomware or malware." The wipe was executed through a legitimate administrative channel — Intune — using authorized administrative credentials. EDR tools are designed to detect malicious binaries and suspicious process behavior. A remote wipe command from the Intune console looks exactly like what it is: an administrator managing devices. The tool worked as designed. The problem was who pressed the button.
Living off the land at the admin layer. This attack takes the LOTL concept to its logical extreme. The attackers didn't use PowerShell or PsExec to move laterally — they went straight for the administrative console that manages every device in the organization. Once they had privileged access to Intune and Active Directory, they had more power over Stryker's infrastructure than most of Stryker's own IT team.
Extended dwell time for exfiltration. Exfiltrating 50 terabytes requires sustained access over an extended period. During that time, the attackers were operating inside Stryker's environment with valid credentials, accessing systems through legitimate channels. Without a mechanism to detect unauthorized access that looks authorized, the exfiltration window remained open until the attackers chose to close it themselves — by wiping everything.
The nation-state pre-positioning factor. GovInfoSecurity reported that when attackers first infiltrated Stryker's systems, and whether it predated the February 28 start of the US-Israel and Iran conflict, isn't clear. Nation-state hackers often pre-position themselves inside organizations long before activating for a specific operation. The attackers may have been inside Stryker's network for weeks or months before the wipe, quietly mapping the environment and staging data exfiltration.
How Mines Would Have Caught Handala at Every Phase
This is where cyber deception fundamentally changes the equation. Mine2's platform deploys Mines — decoy credentials, fake services, and bogus resources — throughout an organization's environment. Unlike detection tools that try to distinguish malicious activity from legitimate activity, Mines are assets that no legitimate user or process should ever touch. Any interaction is, by definition, unauthorized. Zero false positives. Immediate, high-fidelity signal.
Here's how Mines would have caught the Stryker attack at each phase — long before the wipe command was ever issued.
Phase 1: Credential Mines Catch the Initial Compromise
Stryker's environment almost certainly contained stored credentials across workstations, config files, browser credential stores, and shared documentation — the exact locations where infostealers and phishing campaigns harvest credentials.
Mine2 Credential Mines — fake admin credentials, decoy service account passwords, bogus Azure AD tokens — planted in these same locations would have been swept up alongside real credentials during the initial compromise. The moment the attackers attempted to use a Credential Mine to authenticate, the alert would have fired. The initial access phase — the one Stryker apparently never detected — would have been caught immediately.
Phase 2: Active Directory Mines Detect Privilege Escalation
Compromising Active Directory is the pivotal moment in any enterprise wiper or ransomware attack. The attackers needed to enumerate AD to identify privileged accounts, understand group policies, and locate the Intune administrative console.
Mine2 deploys AD Mines — fake privileged accounts with names like svc_intune_admin, backup_domain_ctrl, or azure_sync_svc — directly in Active Directory. These accounts look like high-value service accounts that an attacker would prioritize. Any authentication attempt, any enumeration that touches these decoy accounts, triggers an immediate alert.
In the Stryker scenario, the attackers needed to identify which accounts had Intune administrative privileges. During that reconnaissance, AD Mines would have caught the enumeration — alerting the security team that someone was systematically probing for admin access to device management infrastructure.
Phase 3: Data Mines Detect the 50-Terabyte Exfiltration
Exfiltrating 50 terabytes of data requires broad access to file shares, databases, document repositories, and internal systems. The attackers couldn't have known exactly where the most valuable data resided — they had to search for it.
Mine2 Data Mines — decoy file shares populated with realistic-looking sensitive documents (fake product designs, bogus clinical trial records, honeytoken patient databases) — are scattered across the network. When the attackers enumerated file shares and accessed data repositories during the staging phase, they would have inevitably touched Data Mines. The alert would have fired days or weeks before the wipe — during the exfiltration phase that traditional tools completely missed.
Phase 4: MineField Decoy Services Catch Network Reconnaissance
Before the attackers could reach the Intune console, they had to map Stryker's network — identifying management interfaces, admin portals, and cloud service endpoints. Mine2's MineField deploys decoy services across the network that look like legitimate management interfaces, admin panels, and cloud integration endpoints.
Any scanning or reconnaissance that hit a MineField decoy would have triggered an immediate alert — revealing the attackers' presence during the network mapping phase, well before they identified the real Intune console.
Phase 5: Cloud Mines Detect Cloud Admin Abuse
Stryker's Microsoft environment — Azure AD, Intune, Entra — represents a cloud-based administrative infrastructure. Mine2's Cloud Mines deploy decoy cloud resources and honeytoken cloud credentials that fire when unauthorized parties attempt to enumerate or access cloud management infrastructure.
When the attackers probed Stryker's Azure environment to identify the Intune administrative console and assess their level of access, Cloud Mines would have detected the enumeration — providing the final warning before the attackers reached the kill switch.
The Critical Timeline: Mines Buy What Stryker Didn't Have — Time
The Stryker attack succeeded because the attackers had unlimited time. They moved through the environment undetected, exfiltrated massive volumes of data, identified the most destructive attack path (Intune admin abuse), and executed on their own schedule.
Mines collapse that timeline. Even one triggered Mine — at any phase — would have given Stryker's security team the signal they needed to investigate, contain, and eject the attackers before the wipe command was issued. The beauty of Mines is that they don't need to catch every phase. They only need to catch one interaction, at any point in the kill chain, to break the attack.
Consider the detection opportunities:
- Credential Mine triggered during initial access → Investigate compromised accounts, reset credentials, hunt for persistence
- AD Mine triggered during privilege escalation → Lock down administrative accounts, audit Intune admin access, isolate affected systems
- Data Mine triggered during exfiltration → Identify compromised data paths, sever attacker access, initiate incident response
- MineField decoy triggered during reconnaissance → Map attacker movement, identify compromised hosts, contain lateral spread
- Cloud Mine triggered during cloud admin enumeration → Emergency lockdown of Intune administrative access, revoke privileged sessions
Any single detection point would have broken the kill chain before the catastrophic wipe.
Lessons for Every Enterprise: Don't Wait for the Wipe
The Stryker attack carries urgent lessons for any organization using cloud-based device management:
Your MDM console is a weapon. Microsoft Intune, VMware Workspace ONE, Jamf — any MDM platform has the power to wipe every device in your organization. Treat administrative access to these platforms with the same paranoia you'd apply to domain admin credentials. Deploy Mines around MDM infrastructure to detect unauthorized access before it's weaponized.
Nation-state attackers pre-position. The Stryker attackers may have been inside the network for weeks before executing the wipe. Traditional detection that focuses on the moment of impact misses the entire reconnaissance, escalation, and exfiltration chain. Mines detect attackers during the quiet phases — when they're still exploring and haven't yet decided to pull the trigger.
Wiper attacks leave nothing to recover. As security analysts have noted, encrypted data can theoretically be recovered if a decryption key is obtained — wiped data cannot. Recovery depends entirely on backup integrity. The best defense against a wiper is detecting the attacker before the wipe command is issued. Mines provide that detection.
Harden, then deceive. Use Mine2's Fortify to lock down unnecessary admin access, enforce MFA on all cloud management consoles, restrict Intune administrative actions to known IP ranges and break-glass accounts, and monitor for anomalous bulk device commands. Then layer Mines on top — so that even if an attacker bypasses hardening controls, the next step they take hits a tripwire.
The Bottom Line
The Stryker wiper attack is a stark reminder that the most devastating cyber attacks don't require sophisticated malware. They require privileged access to legitimate tools. Handala didn't need a zero-day exploit. They needed admin credentials for Microsoft Intune — and the time to use them.
Mine2's Mines would have caught the attackers at every phase of this kill chain: during initial credential compromise, during Active Directory reconnaissance, during data exfiltration, during network mapping, and during cloud admin enumeration. Any single triggered Mine would have alerted Stryker's security team in time to prevent a wipe that took down 200,000 devices across 79 countries.
In a world where nation-state actors are explicitly targeting US companies with destructive cyber operations, detection that only fires after the damage is done isn't detection — it's a post-mortem. Mines fire when the attacker is still exploring, still escalating, still deciding what to do next. That's the window where defense actually works.
Don't wait for the wipe. Deploy Mines across your environment today. See how Mine2's cyber deception platform works →
mine2 team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
DPDP Act 2025 Is Live — And Most Indian Organizations Can't Detect the Breaches It Requires Them to Report
React2Shell CVE-2025-55182: 766 Next.js Hosts Breached in Automated Credential-Theft Wave
Kerberoasting in April 2026: Why CVE-2026-20833 Enforcement Is Not Enough Without AD Mines
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
