The Medical technology giant Stryker has provided an update on the impact of its March 11, 2026, cyberattack, confirming that the incident has had a material impact on its first quarter earnings. In an amended filing with the U.S. Securities and Exchange Commission (SEC), Stryker confirmed that the company is fully operational across its global manufacturing network, and ordering and shipping capabilities have also been fully restored. The company has been working with Palo Alto Networks to investigate the incident, which temporarily disrupted its manufacturing, ordering, and shipping capabilities. The investigation confirmed that the attackers inserted a malicious (non-malware) file to abuse its Microsoft Intune environment.
Stryker has assessed the scope and duration of the operational disruption, including the disruption to its internal systems, the impact on its customers, and regulatory issues. The extent of the financial impact on its first quarter earnings has yet to be disclosed and will be explained in its first quarter earnings report, which is due to be released on April 30, 2026. Stryker does not anticipate the attack will have a material impact on its full-year earnings.
April 3, 2026: Stryker Fully Operational After March Cyberattack
Stryker has announced that it has recovered systems impacted by its March 11 cyberattack and is once again fully operational across its manufacturing network. The company is moving rapidly toward peak production capacity, now that commercial, ordering, and distribution systems have been restored. Stryker said it is continuing to work with third-party cybersecurity experts, government agencies, and industry partners to investigate the cyberattack. Meanwhile, its overall product supply remains healthy with strong availability across most of its product lines, and it is continuing to meet customer demand and support patient care.
An Iran-linked hacking group, Handala, claimed responsibility for the attack, which involved wiping almost 80,000 Windows devices. The group stole 50 terabytes of data and proceeded to leak the stolen data, although two domains used to leak the data were seized by the Federal Bureau of Investigation. The hackers compromised a Windows domain admin account and used it to set up a new Global Administrator account, with the devices remotely wiped using InTune. Following the attack, Microsoft released guidance for customers on hardening security for Windows domains and securing Intune.
The attack caused temporary, global disruption to business operations; however, the cyberattack did not affect the security or safety of its products or devices. The attack caused some disruption to parts of its supply lines, and there was a knock-on effect for some health systems, which had to delay some surgical procedures due to the disruption to Stryker’s ability to deliver patient-specific products.
Stryker engaged Palo Alto Networks to assist with threat hunting, forensic analysis, containment, eradication, and infrastructure review. Palo Alto Networks has confirmed that no evidence has been found of any unauthorized activity since March 11, 2026, and said the immediate risk to Stryker’s operational environment has been mitigated. No evidence was found to indicate that malware or ransomware was used in the attack. The hacking group used a malicious file to run commands, which allowed them to hide their activity from its threat detection solutions. Stryker confirmed that the malicious file did not have the ability to spread inside or outside of its environment.
Stryker is now facing legal action over the theft of sensitive employee data. At least 6 lawsuits have already been filed by employees who claim the company failed to protect their personal data.
March 12, 2026: Iran Linked Hacking Group Wipes Data of U.S. Medical Device Manufacturer
Stryker, a U.S. medical device and medical equipment manufacturer based in Portage, Michigan, is dealing with a cyberattack linked to the current U.S. military action in Iran. The cyberattack started shortly after midnight and has caused an outage of systems across the organization. An Iran-linked hacking group has claimed responsibility for the attack.
Stryker has operations in 61 countries and has a global workforce of more than 56,000 employees. Stryker said in a filing with the U.S. Securities and Exchange Commission (SEC) that the attack has and is expected to continue to cause “disruptions and limitations of access to certain of the Company’s information systems and business applications.” Stryker is currently unable to provide a timeline for when systems and data will be recovered and when normal operations will resume.
This does not appear to have been a ransomware attack, but rather a data theft and wiping attack. The attack affected Stryker’s Microsoft programs, including the wiping of Windows-based devices such as mobile phones and laptops. Stryker said it has found no indications that ransomware or malware was used, and said it believes it has contained the attack. An investigation has been launched to determine the impact of the attack on its computer systems.
According to the Wall Street Journal, Stryker’s login pages were defaced with the hacking group’s logo. Stryker said it has business continuity measures in place and will continue to support its customers and partners while it recovers from the attack. Stryker has also committed to transparency and said it will keep stakeholders informed as the investigation and recovery processes progress.
An Iran-linked hacking group called Handala immediately claimed responsibility for the attack in an announcement on X. The group claimed its attack has caused disruption at 79 Stryker offices around the world, involved more than 200,000 systems, servers, and mobile devices being wiped, and 50 terabytes of data were exfiltrated in the attack. “We announce to the world that, in retaliation for the brutal attack on the Minab school and in response to ongoing cyber assaults against the infrastructure of the Axis of Resistance, our major cyber operation has been executed with complete success,” the group said in a post on X.
While the initial access vector is not known, security researcher Kevin Beaumont suggests that Handala actors gained access to Stryker’s Active Directory services and used the Microsoft endpoint management tool Intune to remotely wipe Microsoft devices, including devices used by employees managed under its bring-your-own-device policy.
While Handala appears at face value to be a hacktivist group, the group has been linked to Iran’s Ministry of Intelligence and Security. Palo Alto Networks suggests that Handala is part of the Ministry of Intelligence and Security and masquerades as a hacktivist group, allowing Iran to deny responsibility for its cyber operations.
While Iran has executed a military response to the US-Israel military action, retaliation to the attacks was always likely to involve more than just missiles. Iran has sophisticated cyber capabilities, and any response was likely to take place in cyberspace. Iranian officials stated this week that Tehran would expand its targeting to include economic centers and banks tied to the United States or Israel, and that U.S. companies with ties to the U.S. military or Israel would also be attacked. Stryker has a presence in Israel, including OrthoSpace, an orthopedic device maker that the company acquired in 2019. Handala claimed that Stryker was “a Zionist-rooted corporation.”
“Attacks like this unfortunately aren’t surprising. Even before the latest geopolitical tensions, hacktivist activity targeting healthcare and other critical infrastructure had been steadily increasing, and that trend makes organizations like medical device manufacturers and hospitals more likely to be caught in the crossfire. In many cases, attackers simply find the path of least resistance—an exposed system, an unsecured management console, or credentials that allow them to move deeper into the environment—and once they gain administrative access, they effectively hold the keys to the kingdom and can disrupt everything from mobile devices to operational systems,” Skip Sorrels, Field CTO and CISO, Claroty, said in a statement provided to The HIPAA Journal. “As a former ICU nurse, I’ve seen firsthand how even small technology outages ripple through care delivery, which is why cybersecurity in healthcare must be treated as part of patient safety, with organizations prioritizing visibility into their cyber-physical systems and closing those “open doors” before attackers find them.”
Steve Povolny, Vice President of AI Strategy & Security Research at Exabeam told The HIPAA Journal the attack illustrates how cyber operations are increasingly becoming the asymmetric response of choice during periods of regional conflict or political tension, and that cyber activity from proxy groups provides Tehran with a deniable way to impose costs on Western economies and technology ecosystems.
“Groups like Handala blur the line between hacktivism and state operations, giving governments plausible deniability while still achieving strategic signaling. The cautionary lesson for defenders is that these campaigns are rarely isolated events,” said Povolny. “They are often part of a broader pressure strategy designed to create disruption across multiple industries that support national stability, from healthcare and logistics to energy and manufacturing. Organizations that do not traditionally view themselves as geopolitical targets may increasingly find themselves on the front lines of state-linked cyber conflict.”
In an update on March 15, 2026, Stryker said it believes that the attack has been contained. Stryker confirmed that the attack affected order processing, manufacturing, and shipments, but no patient-related services or connected medical products were affected. The company is prioritizing the restoration of systems that directly support customers, ordering, and shipping. The investigation into the cyberattack is ongoing. Stryker is working with third-party cybersecurity experts and is coordinating with appropriate authorities, including the White House National Cyber Director, FBI, CISA, DHA, HHS, and H-ISAC. Stryker confirmed that ransomware was not used in the attack and no malware was deployed on its systems.
The post Stryker Cyberattack Has Impacted First Quarter Earnings appeared first on The HIPAA Journal.