Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Stryker is a global leader in medical technologies and, together with our customers, we are driven to make healthcare better. We offer innovative products and services in MedSurg, Neurotechnology and Orthopaedics that help improve patient and healthcare outcomes. Alongside its customers around the world, Stryker impacts more than 150 million patients annually. More information is available at stryker.com and careers.stryker.com. Facts: ● 2024 Sales: $22.6 billion ● Industry: Medical Instruments & Supplies ● Employees: 53,000 worldwide ● 40 years of sales growth leading up to 2020 ● 44+ Manufacturing and R&D Locations Worldwide ● $1.5 billion spent on research and development in 2024 ● ~14,200 patents owned globally in 2024 ● Products sold in ~75 countries ● Fortune 500 Company ● 7 consecutive years as one of Fortune's World's Best Workplaces Stryker’s social media community guidelines: https://www.stryker.com/content/m/legal/social-media-community-guidelines/en/index.html Notice Regarding Employee Conduct on Facebook/LinkedIn Meta/LinkedIn does not permit employers to verify or validate “employees” in the (META: “Works at” LinkedIn: “Experience”) section of users’ profiles. Please be aware that the views expressed by individuals on their personal accounts and do not necessarily represent the views of our company. If you encounter any issues with a person claiming to be our employee, we recommend using the “Report Profile” feature. If you’d like to report concerns to our Ethics Hotline, you may do so at: https://app.convercent.com/en-us/LandingPage/b6bb4e84-9fcb-ea11-a974-000d3ab9f296

Stryker A.I CyberSecurity Scoring

Stryker

Company Details

Linkedin ID:

stryker

Employees number:

50,225

Number of followers:

1,694,532

NAICS:

3391

Industry Type:

Medical Equipment Manufacturing

Homepage:

stryker.com

IP Addresses:

310

Company ID:

STR_3135691

Scan Status:

Completed

AI scoreStryker Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/stryker.jpeg
Stryker Medical Equipment Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreStryker Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/stryker.jpeg
Stryker Medical Equipment Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Stryker Company CyberSecurity News & History

Past Incidents
12
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
StrykerCyber Attack10053/2026NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Iranian-Backed Hackers Breach FBI Director’s Personal Email, Leak Private Photos On March 27, 2026, the Iranian-linked hacktivist group Handala Hack Team claimed responsibility for accessing the personal emails of FBI Director Kash Patel, publishing alleged photos and documents as proof. The leaked images dated between 2010 and 2019 depict Patel in personal settings, including vacations and social gatherings. The U.S. Justice Department confirmed the breach, verifying the authenticity of the materials. Handala framed the attack as retaliation for the ongoing U.S.-Iran conflict and the FBI’s $10 million bounty for information on its members. The group boasted of bypassing the FBI’s security systems, though officials clarified that only Patel’s personal Gmail account not government systems was compromised. The incident highlights persistent risks tied to officials using personal emails for professional matters. About Handala Hack Team Active since 2023 and linked to Iran’s Ministry of Intelligence and Security, Handala specializes in disruptive cyberattacks, often targeting Israeli and Western entities. The group has previously breached Lockheed Martin and executed a 200,000-user data wipe at medical tech firm Stryker, leveraging malware designed to delete or expose sensitive data. The breach underscores vulnerabilities in personal email security, even among high-profile officials.

StrykerBreach10053/2026OracleOracle
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Loblaw Faces Alleged Massive Data Breach as Threat Actor Demands Response A threat actor operating under the handle *"igotafeeling"* on the *DarkWeb Informer* forum has claimed to have breached Loblaw, Canada’s largest food and pharmacy retailer, which owns brands like *President’s Choice, No Frills, Shoppers Drug Mart, Real Canadian Superstore*, and the *PC Optimum* loyalty program. The actor alleges possession of over 1.8 billion records, including: - 75.1 million Salesforce customer records (names, emails, phone numbers, addresses, loyalty IDs, and health card numbers) - 724.9 million Shoppers Drug Mart records (passwords, tokens, loyalty IDs, payment details, and full credit card numbers with expiry dates) - 129.9 million pharmacy fill requests (prescription numbers and patient IDs) - 120.4 million e-commerce fraud-feed records (payment card BINs, last-four digits, and expiry dates) - 20.2 million Delivery Ops Portal records (orders, deliveries, and postal codes) - 3,014 GitLab projects containing Loblaw’s full source code - 19.3 million Oracle identity records (MFA device details and credentials) - 55.3 million marketing and email records across 673 tables The threat actor has given Loblaw until March 19 to respond, accusing the company of *"ghosting"* them and dismissing customer and investor concerns. They have also invited media organizations to verify the data’s authenticity. In response, Loblaw issued a March 12 press release, labeling the incident a *"low-level data breach"* and stating that only *"basic customer information"* (names, phone numbers, and emails) may have been accessed. The company explicitly denied evidence of financial or credit card data compromise directly contradicting the threat actor’s claims. While the breach remains unverified, the scale of the alleged exposure if confirmed would rank among the largest in Canadian history. The situation mirrors past high-profile breaches (e.g., *T-Mobile, Equifax, Capital One*), where initial corporate statements downplayed impact before later revelations proved otherwise. Loblaw customers with *PC Optimum accounts, Shoppers Drug Mart loyalty cards, or prescription histories* may be affected if the claims hold true. The deadline for Loblaw’s response is six days away.

StrykerCyber Attack10053/2026MicrosoftMicrosoft
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Stryker Hit by Global Cyberattack Disrupting Medical Technology Services On March 11, Stryker, a leading medical technology provider serving hospitals worldwide, confirmed a global cyberattack that disrupted its operations. The company reported that its Microsoft environment was compromised but found no evidence of ransomware or malware. Stryker stated the incident had been contained. John Riggi, the American Hospital Association’s (AHA) national advisor for cybersecurity and risk, acknowledged the attack, noting ongoing collaboration with hospitals and federal agencies to assess the threat’s scope. While no direct disruptions to U.S. hospital operations have been reported, Riggi warned that impacts could emerge as hospitals evaluate Stryker’s services, technology, and supply chain particularly if the disruption persists. The incident highlights the vulnerability of critical healthcare infrastructure to cyber threats, even in the absence of traditional ransomware tactics. Further details on the attack’s origin and full impact remain under investigation.

StrykerCyber Attack10053/2026Microsoft SecurityMicrosoft Security
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Stryker Hit by Destructive Cyberattack Linked to Iranian-Backed Group A global medical technology firm, Stryker, suffered a devastating wiper cyberattack on Wednesday, suspected to be orchestrated by Handala Hack, a group with ties to the Iranian regime. The attack targeted the company’s Cork, Ireland headquarters, where up to 5,000 employees including 4,000 in Cork are based, crippling critical IT systems and manufacturing operations. The National Cyber Security Centre (NCSC) in Dublin is responding to the incident, which involved the permanent deletion of data from infected systems a hallmark of wiper attacks, typically politically motivated rather than financially driven. Devices connected to Stryker’s network, including employee phones with Outlook installed, were wiped, and login screens were defaced with the Handala logo, a symbol of Palestinian resistance. The attack has disrupted production of Stryker’s medical devices, with some manufacturing machines still operational but their long-term functionality uncertain. Staff were instructed to avoid connecting to the company’s network via any device, including mobile apps like Microsoft Teams and Outlook, while recovery efforts continue. Employees have been sent home, relying on WhatsApp groups for updates. Stryker, which operates six manufacturing sites and three innovation centers in Ireland, is one of the country’s largest medical tech employers. The company confirmed the incident in a staff memo, stating that security experts and law enforcement are involved in the response, emphasizing that sites and personnel remain safe while efforts focus on restoring systems. Handala Hack, linked to Iran’s cyber warfare campaigns, has recently targeted Israeli, Jordanian, and Saudi oil and gas facilities, as well as the Academy of the Hebrew Language, according to Israeli media. The Israeli National Cyber Directorate has warned of a surge in Iranian cyberattacks against civilian companies, suggesting Stryker may have been targeted due to its business ties with Israel. The attack underscores Iran’s expanding cyber-economic warfare, extending beyond regional conflicts to global operations. With Ireland serving as Stryker’s largest hub outside the U.S., the incident highlights the growing threat of state-backed cyber sabotage in critical industries.

StrykerCyber Attack10072/2026NA
Rankiteo Explanation :
Attack that could injure or kill people

Description: Iranian-Linked Pay2Key Ransomware Targets U.S. Healthcare Organization Amid Rising Cyber Conflict In late February, an unnamed U.S. healthcare organization fell victim to a ransomware attack by Pay2Key, a strain linked to Iranian state-affiliated cyber actors. The incident, investigated by Beazley Security and Halcyon Ransomware Research Center, revealed significant upgrades to the ransomware, making it harder to detect and more destructive. Unlike typical financially motivated attacks, this intrusion showed no evidence of data exfiltration a departure from previous Pay2Key operations, which U.S. intelligence agencies had tied to espionage. Researchers noted the group’s activity surged following recent U.S.-Iran military tensions, suggesting motivations beyond profit, including strategic disruption. The attackers compromised an administrative account days before deploying the ransomware, then attempted to erase logs to cover their tracks. Cynthia Kaiser, Halcyon’s senior vice president and former FBI Cyber Division official, questioned whether the attack was timed to exploit geopolitical chaos, emphasizing the group’s dual role as both a state-aligned actor and a ransomware-as-a-service (RaaS) operator. Pay2Key has undergone significant shifts in recent months. In mid-2025, the group marketed itself on Russian cybercriminal forums, briefly offering to sell its operations for 0.15 BTC while recruiting affiliates with an 80% ransom split up from 70%. Despite internal upheaval, the group remains active, with Morphisec tracking $4 million in ransom payments over four months and a total of $8 million from 170 victims since then. First identified in 2020, Pay2Key has targeted organizations in the U.S., Israel, Azerbaijan, and the UAE, with ransom payments traced to Excoino, an Iranian cryptocurrency exchange requiring national ID verification. A 2024 U.S. advisory highlighted its coordination with other ransomware gangs, reinforcing its ties to Iranian government operations. The healthcare attack preceded a high-profile wiper attack on Stryker, a U.S. medical device company, claimed by the Iranian group Handala, which wiped 200,000 devices. Kaiser warned that unreported Iranian cyberattacks are likely ongoing, with a mix of ransomware, wiper malware, and critical infrastructure targeting expected as tensions persist.

StrykerCyber Attack10052/2026Microsoft SecurityMicrosoft Security
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Stryker Cyberattack Disrupts Global Medical Equipment Operations U.S.-based medical technology giant Stryker confirmed that a cyberattack disrupted its global networks, impacting operations across its systems. The incident, disclosed in recent reports, highlights growing cybersecurity threats targeting critical healthcare infrastructure. Stryker, a leading manufacturer of surgical equipment, implants, and medical devices, has not released details on the nature of the attack, its origin, or whether ransomware or data exfiltration was involved. The company has not specified the duration of the disruption or the extent of the operational impact, though such incidents often lead to delays in production, supply chain interruptions, and potential risks to patient care. The attack underscores the vulnerability of healthcare and medical device companies to cyber threats, which have increasingly become high-value targets for malicious actors. No further updates on recovery efforts or regulatory responses have been provided at this time.

StrykerCyber Attack10053/2025MicrosoftMicrosoft
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Stryker Hit by Suspected Iran-Linked Cyberattack, Causing Global Outages Medical technology giant Stryker suffered a global system outage on March 10, 2025, following a suspected cyberattack linked to an Iran-backed hacking group. The incident began shortly after midnight on the U.S. East Coast, disrupting operations across the company’s network. According to reports, remote devices running Microsoft Windows including laptops and mobile devices connected to Stryker’s systems were wiped, rendering them inoperable. Employees and contractors reported seeing the logo of Handala, a pro-Palestinian hacking group with alleged ties to Iran, on login screens, though Reuters could not independently verify the claim. The attack triggered a 3% drop in Stryker’s stock price after *The Wall Street Journal* first reported the breach. The company has not yet issued an official response to requests for comment. Stryker, a major supplier of medical equipment, operates globally, with facilities including a plant in Carrigtwohill, Ireland. The full extent of the disruption and potential data compromise remains unclear.

StrykerCyber Attack100512/2024NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Pro-Iranian Hackers Claim Breach of FBI Director’s Personal Account A pro-Iranian hacking group, Handala, announced on Friday that it had compromised an account belonging to FBI Director Kash Patel, releasing decades-old personal photographs, a resume, and other documents online. The group, which has ties to Iran and Palestine, posted a statement alongside the materials, taunting Patel and declaring him among their "successfully hacked victims." The leaked files including images of Patel with a vintage sports car and a cigar appear to date back over a decade, primarily involving personal travel and business records. The FBI confirmed awareness of the incident, stating that the exposed data was historical and contained no classified or government information. The bureau added that it had taken steps to mitigate risks from the breach. The timing of the hack remains unclear, though reports from December 2024 indicated Patel had been previously warned by the FBI about Iranian targeting efforts. Handala, which has escalated its cyber operations in recent months, recently claimed responsibility for disrupting systems at Stryker, a Michigan-based medical technology firm, in retaliation for alleged U.S. airstrikes linked to Iranian civilian casualties. The group has been a persistent threat, with the U.S. Justice Department seizing four web domains tied to its operations last week as part of efforts to counter Iranian cyber campaigns. The Trump administration has also offered a $10 million reward for information leading to the identification of Handala members. The incident underscores the growing role of proxy hacking groups in Iran’s broader cyber conflict with Western targets.

StrykerBreach6035/2024NA
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The Vermont Office of the Attorney General reported that Stryker Corporation experienced a cybersecurity incident on June 10, 2024. The breach involved unauthorized access to Stryker internal systems between May 14, 2024, and June 10, 2024, affecting an unspecified number of individuals and potentially compromising personal information including names. A notification letter was included with the report.

StrykerCyber Attack10051/2024NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Iranian Threat Actor Handala Hack Launches Destructive Cyberattacks Across Israel, Albania, and the U.S. A cyber threat group linked to Iran’s Ministry of Intelligence and Security (MOIS), known as Handala Hack (also tracked as Void Manticore, Red Sandstorm, and Banished Kitten), has executed a series of data-destructive attacks targeting organizations in Israel, Albania, and the United States. Unlike traditional espionage-focused operations, the group’s campaigns are designed to permanently erase data, making recovery nearly impossible. Active since late 2023, Handala Hack operates under multiple public-facing personas, including Homeland Justice (used since mid-2022 against Albanian government and telecom sectors) and Karma (now largely replaced by Handala). Recent attacks expanded to the U.S., with medical technology firm Stryker among the confirmed victims. ### Attack Methods and Evolution Check Point researchers identified consistent yet evolving tactics in the group’s operations. While core techniques such as compromised VPN credentials, RDP exploitation, and simultaneous wiper deployments have remained stable since 2024, newer campaigns incorporate: - NetBird, a legitimate peer-to-peer networking tool, to tunnel traffic within victim networks. - An AI-assisted PowerShell script as part of its wiping toolkit. - A decline in operational security, with attacks traced directly to Iranian IP addresses instead of commercial VPNs. ### Multi-Layered Destruction Handala Hack’s destructive phase employs four simultaneous wiping techniques to maximize damage: 1. Handala Wiper – A custom tool distributed via Group Policy logon scripts (`handala.bat`), overwriting files and corrupting Master Boot Records (MBR). The executable runs remotely from domain controllers, evading detection. 2. AI-PowerShell Wiper – Deletes user directory files and floods drives with a propaganda image (`handala.gif`). 3. VeraCrypt Abuse – Legitimate encryption software is downloaded via the victim’s browser to lock drives and prevent recovery. 4. Manual Deletion – Attackers delete virtual machines and files over RDP, a tactic documented in leaked videos. ### Tactical Execution Intrusions typically begin with compromised VPN credentials, obtained through brute-force attacks or supply chain breaches. Once inside, operators use RDP to navigate manually, deploying multiple attacker-controlled machines within a single environment to accelerate destruction. The group’s lack of operational discipline including direct use of Iranian IPs has made attribution easier. The attacks reflect a shift from espionage to pure sabotage, with no financial or intelligence-gathering motives. Instead, the focus is on maximizing disruption across critical sectors.

StrykerCyber Attack10055/2023NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Stryker Hit by Cyberattack Claimed by Pro-Iran Hacking Group Handala Medical technology firm Stryker, a leading manufacturer of surgical tools and medical implants based in Kalamazoo, Michigan, confirmed a cyberattack on Wednesday that disrupted its global Microsoft environment. The company stated it had no evidence of ransomware or malware and believed the incident was contained, though it is still assessing the impact. Continuity measures remain in place to support customers and partners. The pro-Iran hacking group Handala claimed responsibility for the attack, alleging it wiped over 200,000 systems, servers, and mobile devices and exfiltrated 50 terabytes of critical data. The group cited retaliation for the ongoing regional conflict and a February 28 airstrike on a girls' elementary school in Minab, Iran, which killed 168 people, as motivations. While the attack’s origins remain unconfirmed, U.S. military operations were reported near the site. Stryker has not disclosed further details, and U.S. officials have not commented on the incident. The investigation is ongoing.

StrykerCyber Attack10051/2010NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Iran-Linked Hackers Leak FBI Director Kash Patel’s Personal Emails in Cyber Espionage Campaign On March 27, 2026, the Iran-backed hacking group Handala Hack Team publicly released a trove of personal emails belonging to FBI Director Kash Patel, marking a high-profile breach in a series of cyber operations attributed to Iranian state-linked actors. The leaked correspondence, spanning from 2010 to 2019, includes a mix of personal and professional communications tied to Patel’s Gmail account, which had been previously exposed in other data breaches. Western cybersecurity researchers identify Handala as one of several personas used by Iranian government cyberintelligence units, which have recently escalated attacks on Western targets. Earlier this year, the group claimed responsibility for hacking Stryker, a U.S. medical devices manufacturer, further demonstrating its focus on high-value entities. The hackers published photographs of Patel alongside the leaked documents, declaring him among their "successfully hacked victims." A U.S. Justice Department official confirmed the breach, stating that the released material appeared authentic. While the full extent of the compromise remains unclear, the incident underscores the persistent threat posed by state-sponsored cyber espionage, particularly from Iranian-linked groups targeting U.S. officials and critical infrastructure.

Stryker and U.S. Justice Department: FBI director emails breached by Iran-linked hackers — what happened and how to protect yourself
Cyber Attack
Severity: 100
Impact: 5
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Iranian-Backed Hackers Breach FBI Director’s Personal Email, Leak Private Photos On March 27, 2026, the Iranian-linked hacktivist group Handala Hack Team claimed responsibility for accessing the personal emails of FBI Director Kash Patel, publishing alleged photos and documents as proof. The leaked images dated between 2010 and 2019 depict Patel in personal settings, including vacations and social gatherings. The U.S. Justice Department confirmed the breach, verifying the authenticity of the materials. Handala framed the attack as retaliation for the ongoing U.S.-Iran conflict and the FBI’s $10 million bounty for information on its members. The group boasted of bypassing the FBI’s security systems, though officials clarified that only Patel’s personal Gmail account not government systems was compromised. The incident highlights persistent risks tied to officials using personal emails for professional matters. About Handala Hack Team Active since 2023 and linked to Iran’s Ministry of Intelligence and Security, Handala specializes in disruptive cyberattacks, often targeting Israeli and Western entities. The group has previously breached Lockheed Martin and executed a 200,000-user data wipe at medical tech firm Stryker, leveraging malware designed to delete or expose sensitive data. The breach underscores vulnerabilities in personal email security, even among high-profile officials.

Shoppers Drug Mart, President’s Choice, Loblaw, No Frills and PC Optimum: “Threat Actor” on the dark web claims Loblaw’s “low-level” data breach is a much larger threat
Breach
Severity: 100
Impact: 5
Seen: 3/2026
Blog:
Supply Chain Source: OracleOracle
Rankiteo Explanation
Attack threatening the organization's existence

Description: Loblaw Faces Alleged Massive Data Breach as Threat Actor Demands Response A threat actor operating under the handle *"igotafeeling"* on the *DarkWeb Informer* forum has claimed to have breached Loblaw, Canada’s largest food and pharmacy retailer, which owns brands like *President’s Choice, No Frills, Shoppers Drug Mart, Real Canadian Superstore*, and the *PC Optimum* loyalty program. The actor alleges possession of over 1.8 billion records, including: - 75.1 million Salesforce customer records (names, emails, phone numbers, addresses, loyalty IDs, and health card numbers) - 724.9 million Shoppers Drug Mart records (passwords, tokens, loyalty IDs, payment details, and full credit card numbers with expiry dates) - 129.9 million pharmacy fill requests (prescription numbers and patient IDs) - 120.4 million e-commerce fraud-feed records (payment card BINs, last-four digits, and expiry dates) - 20.2 million Delivery Ops Portal records (orders, deliveries, and postal codes) - 3,014 GitLab projects containing Loblaw’s full source code - 19.3 million Oracle identity records (MFA device details and credentials) - 55.3 million marketing and email records across 673 tables The threat actor has given Loblaw until March 19 to respond, accusing the company of *"ghosting"* them and dismissing customer and investor concerns. They have also invited media organizations to verify the data’s authenticity. In response, Loblaw issued a March 12 press release, labeling the incident a *"low-level data breach"* and stating that only *"basic customer information"* (names, phone numbers, and emails) may have been accessed. The company explicitly denied evidence of financial or credit card data compromise directly contradicting the threat actor’s claims. While the breach remains unverified, the scale of the alleged exposure if confirmed would rank among the largest in Canadian history. The situation mirrors past high-profile breaches (e.g., *T-Mobile, Equifax, Capital One*), where initial corporate statements downplayed impact before later revelations proved otherwise. Loblaw customers with *PC Optimum accounts, Shoppers Drug Mart loyalty cards, or prescription histories* may be affected if the claims hold true. The deadline for Loblaw’s response is six days away.

Stryker: Medical technology company Stryker disrupted globally by cyberattack
Cyber Attack
Severity: 100
Impact: 5
Seen: 3/2026
Blog:
Supply Chain Source: MicrosoftMicrosoft
Rankiteo Explanation
Attack threatening the organization's existence

Description: Stryker Hit by Global Cyberattack Disrupting Medical Technology Services On March 11, Stryker, a leading medical technology provider serving hospitals worldwide, confirmed a global cyberattack that disrupted its operations. The company reported that its Microsoft environment was compromised but found no evidence of ransomware or malware. Stryker stated the incident had been contained. John Riggi, the American Hospital Association’s (AHA) national advisor for cybersecurity and risk, acknowledged the attack, noting ongoing collaboration with hospitals and federal agencies to assess the threat’s scope. While no direct disruptions to U.S. hospital operations have been reported, Riggi warned that impacts could emerge as hospitals evaluate Stryker’s services, technology, and supply chain particularly if the disruption persists. The incident highlights the vulnerability of critical healthcare infrastructure to cyber threats, even in the absence of traditional ransomware tactics. Further details on the attack’s origin and full impact remain under investigation.

Stryker: Cork-based Stryker hit with cyber attack linked to Iranian-backed group
Cyber Attack
Severity: 100
Impact: 5
Seen: 3/2026
Blog:
Supply Chain Source: Microsoft SecurityMicrosoft Security
Rankiteo Explanation
Attack threatening the organization's existence

Description: Stryker Hit by Destructive Cyberattack Linked to Iranian-Backed Group A global medical technology firm, Stryker, suffered a devastating wiper cyberattack on Wednesday, suspected to be orchestrated by Handala Hack, a group with ties to the Iranian regime. The attack targeted the company’s Cork, Ireland headquarters, where up to 5,000 employees including 4,000 in Cork are based, crippling critical IT systems and manufacturing operations. The National Cyber Security Centre (NCSC) in Dublin is responding to the incident, which involved the permanent deletion of data from infected systems a hallmark of wiper attacks, typically politically motivated rather than financially driven. Devices connected to Stryker’s network, including employee phones with Outlook installed, were wiped, and login screens were defaced with the Handala logo, a symbol of Palestinian resistance. The attack has disrupted production of Stryker’s medical devices, with some manufacturing machines still operational but their long-term functionality uncertain. Staff were instructed to avoid connecting to the company’s network via any device, including mobile apps like Microsoft Teams and Outlook, while recovery efforts continue. Employees have been sent home, relying on WhatsApp groups for updates. Stryker, which operates six manufacturing sites and three innovation centers in Ireland, is one of the country’s largest medical tech employers. The company confirmed the incident in a staff memo, stating that security experts and law enforcement are involved in the response, emphasizing that sites and personnel remain safe while efforts focus on restoring systems. Handala Hack, linked to Iran’s cyber warfare campaigns, has recently targeted Israeli, Jordanian, and Saudi oil and gas facilities, as well as the Academy of the Hebrew Language, according to Israeli media. The Israeli National Cyber Directorate has warned of a surge in Iranian cyberattacks against civilian companies, suggesting Stryker may have been targeted due to its business ties with Israel. The attack underscores Iran’s expanding cyber-economic warfare, extending beyond regional conflicts to global operations. With Ireland serving as Stryker’s largest hub outside the U.S., the incident highlights the growing threat of state-backed cyber sabotage in critical industries.

Stryker: Iran-linked ransomware gang targeted US healthcare org amid military conflict
Cyber Attack
Severity: 100
Impact: 7
Seen: 2/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack that could injure or kill people

Description: Iranian-Linked Pay2Key Ransomware Targets U.S. Healthcare Organization Amid Rising Cyber Conflict In late February, an unnamed U.S. healthcare organization fell victim to a ransomware attack by Pay2Key, a strain linked to Iranian state-affiliated cyber actors. The incident, investigated by Beazley Security and Halcyon Ransomware Research Center, revealed significant upgrades to the ransomware, making it harder to detect and more destructive. Unlike typical financially motivated attacks, this intrusion showed no evidence of data exfiltration a departure from previous Pay2Key operations, which U.S. intelligence agencies had tied to espionage. Researchers noted the group’s activity surged following recent U.S.-Iran military tensions, suggesting motivations beyond profit, including strategic disruption. The attackers compromised an administrative account days before deploying the ransomware, then attempted to erase logs to cover their tracks. Cynthia Kaiser, Halcyon’s senior vice president and former FBI Cyber Division official, questioned whether the attack was timed to exploit geopolitical chaos, emphasizing the group’s dual role as both a state-aligned actor and a ransomware-as-a-service (RaaS) operator. Pay2Key has undergone significant shifts in recent months. In mid-2025, the group marketed itself on Russian cybercriminal forums, briefly offering to sell its operations for 0.15 BTC while recruiting affiliates with an 80% ransom split up from 70%. Despite internal upheaval, the group remains active, with Morphisec tracking $4 million in ransom payments over four months and a total of $8 million from 170 victims since then. First identified in 2020, Pay2Key has targeted organizations in the U.S., Israel, Azerbaijan, and the UAE, with ransom payments traced to Excoino, an Iranian cryptocurrency exchange requiring national ID verification. A 2024 U.S. advisory highlighted its coordination with other ransomware gangs, reinforcing its ties to Iranian government operations. The healthcare attack preceded a high-profile wiper attack on Stryker, a U.S. medical device company, claimed by the Iranian group Handala, which wiped 200,000 devices. Kaiser warned that unreported Iranian cyberattacks are likely ongoing, with a mix of ransomware, wiper malware, and critical infrastructure targeting expected as tensions persist.

Stryker: U.S. medical equipment company Stryker says cyberattack disrupted its global networks
Cyber Attack
Severity: 100
Impact: 5
Seen: 2/2026
Blog:
Supply Chain Source: Microsoft SecurityMicrosoft Security
Rankiteo Explanation
Attack threatening the organization's existence

Description: Stryker Cyberattack Disrupts Global Medical Equipment Operations U.S.-based medical technology giant Stryker confirmed that a cyberattack disrupted its global networks, impacting operations across its systems. The incident, disclosed in recent reports, highlights growing cybersecurity threats targeting critical healthcare infrastructure. Stryker, a leading manufacturer of surgical equipment, implants, and medical devices, has not released details on the nature of the attack, its origin, or whether ransomware or data exfiltration was involved. The company has not specified the duration of the disruption or the extent of the operational impact, though such incidents often lead to delays in production, supply chain interruptions, and potential risks to patient care. The attack underscores the vulnerability of healthcare and medical device companies to cyber threats, which have increasingly become high-value targets for malicious actors. No further updates on recovery efforts or regulatory responses have been provided at this time.

Stryker: Stryker shares fall after report on suspected Iran-linked cyberattack
Cyber Attack
Severity: 100
Impact: 5
Seen: 3/2025
Blog:
Supply Chain Source: MicrosoftMicrosoft
Rankiteo Explanation
Attack threatening the organization's existence

Description: Stryker Hit by Suspected Iran-Linked Cyberattack, Causing Global Outages Medical technology giant Stryker suffered a global system outage on March 10, 2025, following a suspected cyberattack linked to an Iran-backed hacking group. The incident began shortly after midnight on the U.S. East Coast, disrupting operations across the company’s network. According to reports, remote devices running Microsoft Windows including laptops and mobile devices connected to Stryker’s systems were wiped, rendering them inoperable. Employees and contractors reported seeing the logo of Handala, a pro-Palestinian hacking group with alleged ties to Iran, on login screens, though Reuters could not independently verify the claim. The attack triggered a 3% drop in Stryker’s stock price after *The Wall Street Journal* first reported the breach. The company has not yet issued an official response to requests for comment. Stryker, a major supplier of medical equipment, operates globally, with facilities including a plant in Carrigtwohill, Ireland. The full extent of the disruption and potential data compromise remains unclear.

Stryker and Federal Bureau of Investigation: Pro-Iranian group claims credit for hacking into FBI Director Patel's personal account
Cyber Attack
Severity: 100
Impact: 5
Seen: 12/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Pro-Iranian Hackers Claim Breach of FBI Director’s Personal Account A pro-Iranian hacking group, Handala, announced on Friday that it had compromised an account belonging to FBI Director Kash Patel, releasing decades-old personal photographs, a resume, and other documents online. The group, which has ties to Iran and Palestine, posted a statement alongside the materials, taunting Patel and declaring him among their "successfully hacked victims." The leaked files including images of Patel with a vintage sports car and a cigar appear to date back over a decade, primarily involving personal travel and business records. The FBI confirmed awareness of the incident, stating that the exposed data was historical and contained no classified or government information. The bureau added that it had taken steps to mitigate risks from the breach. The timing of the hack remains unclear, though reports from December 2024 indicated Patel had been previously warned by the FBI about Iranian targeting efforts. Handala, which has escalated its cyber operations in recent months, recently claimed responsibility for disrupting systems at Stryker, a Michigan-based medical technology firm, in retaliation for alleged U.S. airstrikes linked to Iranian civilian casualties. The group has been a persistent threat, with the U.S. Justice Department seizing four web domains tied to its operations last week as part of efforts to counter Iranian cyber campaigns. The Trump administration has also offered a $10 million reward for information leading to the identification of Handala members. The incident underscores the growing role of proxy hacking groups in Iran’s broader cyber conflict with Western targets.

Stryker Corporation
Breach
Severity: 60
Impact: 3
Seen: 5/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The Vermont Office of the Attorney General reported that Stryker Corporation experienced a cybersecurity incident on June 10, 2024. The breach involved unauthorized access to Stryker internal systems between May 14, 2024, and June 10, 2024, affecting an unspecified number of individuals and potentially compromising personal information including names. A notification letter was included with the report.

Stryker: Handala Hack Uses RDP, NetBird, and Parallel Wipers in MOIS-Linked Destructive Intrusions
Cyber Attack
Severity: 100
Impact: 5
Seen: 1/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Iranian Threat Actor Handala Hack Launches Destructive Cyberattacks Across Israel, Albania, and the U.S. A cyber threat group linked to Iran’s Ministry of Intelligence and Security (MOIS), known as Handala Hack (also tracked as Void Manticore, Red Sandstorm, and Banished Kitten), has executed a series of data-destructive attacks targeting organizations in Israel, Albania, and the United States. Unlike traditional espionage-focused operations, the group’s campaigns are designed to permanently erase data, making recovery nearly impossible. Active since late 2023, Handala Hack operates under multiple public-facing personas, including Homeland Justice (used since mid-2022 against Albanian government and telecom sectors) and Karma (now largely replaced by Handala). Recent attacks expanded to the U.S., with medical technology firm Stryker among the confirmed victims. ### Attack Methods and Evolution Check Point researchers identified consistent yet evolving tactics in the group’s operations. While core techniques such as compromised VPN credentials, RDP exploitation, and simultaneous wiper deployments have remained stable since 2024, newer campaigns incorporate: - NetBird, a legitimate peer-to-peer networking tool, to tunnel traffic within victim networks. - An AI-assisted PowerShell script as part of its wiping toolkit. - A decline in operational security, with attacks traced directly to Iranian IP addresses instead of commercial VPNs. ### Multi-Layered Destruction Handala Hack’s destructive phase employs four simultaneous wiping techniques to maximize damage: 1. Handala Wiper – A custom tool distributed via Group Policy logon scripts (`handala.bat`), overwriting files and corrupting Master Boot Records (MBR). The executable runs remotely from domain controllers, evading detection. 2. AI-PowerShell Wiper – Deletes user directory files and floods drives with a propaganda image (`handala.gif`). 3. VeraCrypt Abuse – Legitimate encryption software is downloaded via the victim’s browser to lock drives and prevent recovery. 4. Manual Deletion – Attackers delete virtual machines and files over RDP, a tactic documented in leaked videos. ### Tactical Execution Intrusions typically begin with compromised VPN credentials, obtained through brute-force attacks or supply chain breaches. Once inside, operators use RDP to navigate manually, deploying multiple attacker-controlled machines within a single environment to accelerate destruction. The group’s lack of operational discipline including direct use of Iranian IPs has made attribution easier. The attacks reflect a shift from espionage to pure sabotage, with no financial or intelligence-gathering motives. Instead, the focus is on maximizing disruption across critical sectors.

Stryker: Pro-Iran hacking group claims responsibility for cyberattack on Stryker
Cyber Attack
Severity: 100
Impact: 5
Seen: 5/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Stryker Hit by Cyberattack Claimed by Pro-Iran Hacking Group Handala Medical technology firm Stryker, a leading manufacturer of surgical tools and medical implants based in Kalamazoo, Michigan, confirmed a cyberattack on Wednesday that disrupted its global Microsoft environment. The company stated it had no evidence of ransomware or malware and believed the incident was contained, though it is still assessing the impact. Continuity measures remain in place to support customers and partners. The pro-Iran hacking group Handala claimed responsibility for the attack, alleging it wiped over 200,000 systems, servers, and mobile devices and exfiltrated 50 terabytes of critical data. The group cited retaliation for the ongoing regional conflict and a February 28 airstrike on a girls' elementary school in Minab, Iran, which killed 168 people, as motivations. While the attack’s origins remain unconfirmed, U.S. military operations were reported near the site. Stryker has not disclosed further details, and U.S. officials have not commented on the incident. The investigation is ongoing.

Stryker and Federal Bureau of Investigation: FBI Director Kash Patel’s email leaked by Iran-backed hackers
Cyber Attack
Severity: 100
Impact: 5
Seen: 1/2010
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Iran-Linked Hackers Leak FBI Director Kash Patel’s Personal Emails in Cyber Espionage Campaign On March 27, 2026, the Iran-backed hacking group Handala Hack Team publicly released a trove of personal emails belonging to FBI Director Kash Patel, marking a high-profile breach in a series of cyber operations attributed to Iranian state-linked actors. The leaked correspondence, spanning from 2010 to 2019, includes a mix of personal and professional communications tied to Patel’s Gmail account, which had been previously exposed in other data breaches. Western cybersecurity researchers identify Handala as one of several personas used by Iranian government cyberintelligence units, which have recently escalated attacks on Western targets. Earlier this year, the group claimed responsibility for hacking Stryker, a U.S. medical devices manufacturer, further demonstrating its focus on high-value entities. The hackers published photographs of Patel alongside the leaked documents, declaring him among their "successfully hacked victims." A U.S. Justice Department official confirmed the breach, stating that the released material appeared authentic. While the full extent of the compromise remains unclear, the incident underscores the persistent threat posed by state-sponsored cyber espionage, particularly from Iranian-linked groups targeting U.S. officials and critical infrastructure.

Ailogo

Stryker Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Stryker

Incidents vs Medical Equipment Manufacturing Industry Average (This Year)

Stryker has 581.82% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Stryker has 417.24% more incidents than the average of all companies with at least one recorded incident.

Incident Types Stryker vs Medical Equipment Manufacturing Industry Avg (This Year)

Stryker reported 6 incidents this year: 5 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — Stryker (X = Date, Y = Severity)

Stryker cyber incidents detection timeline including parent company and subsidiaries

Stryker Company Subsidiaries

SubsidiaryImage

Stryker is a global leader in medical technologies and, together with our customers, we are driven to make healthcare better. We offer innovative products and services in MedSurg, Neurotechnology and Orthopaedics that help improve patient and healthcare outcomes. Alongside its customers around the world, Stryker impacts more than 150 million patients annually. More information is available at stryker.com and careers.stryker.com. Facts: ● 2024 Sales: $22.6 billion ● Industry: Medical Instruments & Supplies ● Employees: 53,000 worldwide ● 40 years of sales growth leading up to 2020 ● 44+ Manufacturing and R&D Locations Worldwide ● $1.5 billion spent on research and development in 2024 ● ~14,200 patents owned globally in 2024 ● Products sold in ~75 countries ● Fortune 500 Company ● 7 consecutive years as one of Fortune's World's Best Workplaces Stryker’s social media community guidelines: https://www.stryker.com/content/m/legal/social-media-community-guidelines/en/index.html Notice Regarding Employee Conduct on Facebook/LinkedIn Meta/LinkedIn does not permit employers to verify or validate “employees” in the (META: “Works at” LinkedIn: “Experience”) section of users’ profiles. Please be aware that the views expressed by individuals on their personal accounts and do not necessarily represent the views of our company. If you encounter any issues with a person claiming to be our employee, we recommend using the “Report Profile” feature. If you’d like to report concerns to our Ethics Hotline, you may do so at: https://app.convercent.com/en-us/LandingPage/b6bb4e84-9fcb-ea11-a974-000d3ab9f296

Loading...
similarCompanies

Stryker Similar Companies

Boston Scientific

Boston Scientific transforms lives through innovative medical technologies that improve the health of patients around the world. As a global medical technology leader for more than 40 years, we advance science for life by providing a broad range of high-performance solutions that address unmet patie

Medline

Medline is the largest provider of medical-surgical products and supply chain solutions serving all points of care. Through its unique offering of world-class products, supply chain resilience and clinical practice expertise, Medline delivers improved clinical, financial and operational outcomes. He

Edwards Lifesciences

Edwards Lifesciences (NYSE: EW), is the leading global structural heart innovation company, driven by a passion to improve patient lives. Through breakthrough technologies, world-class evidence and partnerships with clinicians and healthcare stakeholders, our employees are inspired by our patient-fo

Align Technology

We are dedicated to transforming lives by improving the journey to a healthy, beautiful smile. Discover your straight path to a bright future at Align Technology. As a part of our smart, diverse and fast-moving global team, you'll make an impact on the market leader that's moving an industry forwa

BD is one of the largest global medical technology companies in the world and is advancing the world of health™ by improving medical discovery, diagnostics and the delivery of care. The company supports the heroes on the frontlines of health care by developing innovative technology, services and sol

B. Braun Group

As a leading medical technology company, B. Braun protects and improves the health of people around the world. For more than 185 years, the family-owned company has been accelerating progress in health care with pioneering spirit and groundbreaking contributions. This innovative strength continues t

Baxter International Inc.

For nearly a century, we have delivered on our commitment to saving and sustaining the lives of patients, working alongside clinicians and providers around the world. We believe every person — regardless of who they are or where they are from — deserves a chance to live a healthy life, free from ill

Olympus Corporation

Olympus is passionate about creating customer-driven solutions for the medical industry. For more than 100 years, Olympus has focused on making people’s lives healthier, safer and more fulfilling by helping detect, prevent, and treat disease, furthering scientific research, and ensuring public safet

Henry Schein

Henry Schein, Inc. (Nasdaq: HSIC) is a solutions company for health care professionals powered by a network of people and technology. With more than 25,000 Team Schein Members worldwide, the Company's network of trusted advisors provides more than 1 million customers globally with more than 300 valu

newsone

Stryker CyberSecurity News

March 26, 2026 04:54 PM
Stryker says manufacturing mostly restored after cyberattack

Medical device maker Stryker said on Thursday its operations were steadily improving towards full ​capacity, after a cyberattack caused...

March 26, 2026 02:04 PM
Stryker rules out ransomware, confirms threat actor used non-propagating malicious file

Following its recent cybersecurity incident, medical technology giant Stryker said it found no indication of ransomware or malware.

March 26, 2026 02:24 AM
Cyber Defender: The day convenience became catastrophe

It has been a busy month for those of us defending hospitals against cyber threats. The news cycle is relentless, so you may or may not have...

March 25, 2026 06:59 PM
Additional details on Stryker hack emerge

Major U.S. medical device firm Stryker has discovered the involvement of a malicious file in the recent cyberattack by Iran-linked...

March 25, 2026 02:33 PM
Stryker facing multiple lawsuits over cyberattack

PORTAGE, MI (WTVB) - Stryker Corporation is facing a wave of proposed class-action lawsuits following a massiv...

March 24, 2026 08:54 PM
Several sue Stryker after cyberattack, alleging company failed to protect sensitive data

A cyberattack at Stryker has sparked multiple lawsuits, which include a current employee, alleging the company failed to adequately protect...

March 24, 2026 08:47 PM
Stryker says malware was involved in recent cyberattack as production lines reopen

The medical device firm Stryker said it is ramping production lines back up two weeks after alleged Iranian cyber actors wiped more than...

March 24, 2026 01:06 PM
Stryker Addresses and Contains Recent Cybersecurity Incident

Stryker ( (SYK) ) has provided an announcement. Stryker disclosed that a cybersecurity incident identified and reported to the U.S. SEC on...

March 24, 2026 10:25 AM
Stryker Corporation says cyberattack is now contained

PORTAGE, MI (WKZO AM/FM) - Portage-based Stryker Corporation says the cyberattack that hit them earlier this m...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Stryker CyberSecurity History Information

Official Website of Stryker

The official website of Stryker is http://www.stryker.com.

Stryker’s AI-Generated Cybersecurity Score

According to Rankiteo, Stryker’s AI-generated cybersecurity score is 667, reflecting their Weak security posture.

How many security badges does Stryker’ have ?

According to Rankiteo, Stryker currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Stryker been affected by any supply chain cyber incidents ?

According to Rankiteo, Stryker has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:

  • Oracle (Incident ID: NO-SHOPRELOB1773534483)
  • Microsoft (Incident ID: STR1773354343)
  • Microsoft Security (Incident ID: STR1773240573)
  • Microsoft Security (Incident ID: STR1773260617)
  • Microsoft (Incident ID: STR1773246684)
Does Stryker have SOC 2 Type 1 certification ?

According to Rankiteo, Stryker is not certified under SOC 2 Type 1.

Does Stryker have SOC 2 Type 2 certification ?

According to Rankiteo, Stryker does not hold a SOC 2 Type 2 certification.

Does Stryker comply with GDPR ?

According to Rankiteo, Stryker is not listed as GDPR compliant.

Does Stryker have PCI DSS certification ?

According to Rankiteo, Stryker does not currently maintain PCI DSS compliance.

Does Stryker comply with HIPAA ?

According to Rankiteo, Stryker is not compliant with HIPAA regulations.

Does Stryker have ISO 27001 certification ?

According to Rankiteo,Stryker is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Stryker

Stryker operates primarily in the Medical Equipment Manufacturing industry.

Number of Employees at Stryker

Stryker employs approximately 50,225 people worldwide.

Subsidiaries Owned by Stryker

Stryker presently has no subsidiaries across any sectors.

Stryker’s LinkedIn Followers

Stryker’s official LinkedIn profile has approximately 1,694,532 followers.

NAICS Classification of Stryker

Stryker is classified under the NAICS code 3391, which corresponds to Medical Equipment and Supplies Manufacturing.

Stryker’s Presence on Crunchbase

No, Stryker does not have a profile on Crunchbase.

Stryker’s Presence on LinkedIn

Yes, Stryker maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/stryker.

Cybersecurity Incidents Involving Stryker

As of April 04, 2026, Rankiteo reports that Stryker has experienced 12 cybersecurity incidents.

Number of Peer and Competitor Companies

Stryker has an estimated 5,750 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Stryker ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.

How does Stryker detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with security experts, and and containment measures with employees instructed to avoid connecting to the company’s network via any device, and remediation measures with restoring systems, and communication strategy with staff memo, whatsapp groups for updates, and containment measures with incident believed to be contained, and recovery measures with continuity measures in place to support customers and partners, and containment measures with incident contained, and communication strategy with press release downplaying the breach and denying financial data compromise, and third party assistance with beazley security, third party assistance with halcyon ransomware research center, and law enforcement notified with u.s. justice department, and law enforcement notified with u.s. justice department confirmed the breach, and incident response plan activated with yes, and containment measures with steps taken to mitigate risks from the breach, and communication strategy with fbi issued a public statement..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Stryker Corporation Cybersecurity Incident

Description: The Vermont Office of the Attorney General reported that Stryker Corporation experienced a cybersecurity incident on June 10, 2024. The breach involved unauthorized access to Stryker internal systems between May 14, 2024, and June 10, 2024, affecting an unspecified number of individuals and potentially compromising personal information including names. A notification letter was included with the report.

Date Detected: 2024-06-10

Type: Data Breach

Attack Vector: Unauthorized Access

Incident : Wiper Attack

Title: Stryker Hit by Destructive Cyberattack Linked to Iranian-Backed Group

Description: A global medical technology firm, Stryker, suffered a devastating wiper cyberattack suspected to be orchestrated by Handala Hack, a group with ties to the Iranian regime. The attack targeted the company’s Cork, Ireland headquarters, crippling critical IT systems and manufacturing operations. The attack involved the permanent deletion of data from infected systems, a hallmark of wiper attacks, and disrupted production of medical devices.

Date Detected: Wednesday

Type: Wiper Attack

Threat Actor: Handala Hack

Motivation: Politically motivated (suspected state-backed cyber sabotage)

Incident : Cyberattack

Title: Stryker Hit by Suspected Iran-Linked Cyberattack, Causing Global Outages

Description: Medical technology giant Stryker suffered a global system outage on March 10, 2025, following a suspected cyberattack linked to an Iran-backed hacking group. The incident disrupted operations across the company’s network, with remote devices running Microsoft Windows being wiped and displaying the logo of Handala, a pro-Palestinian hacking group with alleged ties to Iran.

Date Detected: 2025-03-10T00:00:00Z

Date Publicly Disclosed: 2025-03-10

Type: Cyberattack

Attack Vector: Unknown

Threat Actor: Handala (suspected Iran-backed hacking group)

Motivation: Political (pro-Palestinian)

Incident : cyberattack

Title: Stryker Cyberattack Disrupts Global Medical Equipment Operations

Description: U.S.-based medical technology giant Stryker confirmed that a cyberattack disrupted its global networks, impacting operations across its systems. The incident highlights growing cybersecurity threats targeting critical healthcare infrastructure.

Type: cyberattack

Incident : Cyberattack

Title: Stryker Hit by Cyberattack Claimed by Pro-Iran Hacking Group Handala

Description: Medical technology firm Stryker confirmed a cyberattack that disrupted its global Microsoft environment. The pro-Iran hacking group Handala claimed responsibility, alleging data exfiltration and system wipes in retaliation for regional conflict.

Date Detected: Wednesday

Type: Cyberattack

Threat Actor: Handala

Motivation: Retaliation for ongoing regional conflictFebruary 28 airstrike on a girls' elementary school in Minab, Iran

Incident : Cyberattack

Title: Stryker Hit by Global Cyberattack Disrupting Medical Technology Services

Description: Stryker, a leading medical technology provider serving hospitals worldwide, confirmed a global cyberattack that disrupted its operations. The company reported that its Microsoft environment was compromised but found no evidence of ransomware or malware. The incident had been contained.

Date Detected: 2024-03-11

Date Publicly Disclosed: 2024-03-11

Type: Cyberattack

Incident : Data Breach

Title: Alleged Massive Data Breach at Loblaw

Description: A threat actor operating under the handle 'igotafeeling' on the DarkWeb Informer forum has claimed to have breached Loblaw, Canada’s largest food and pharmacy retailer. The actor alleges possession of over 1.8 billion records, including customer data, pharmacy records, payment details, and source code. Loblaw has labeled the incident a 'low-level data breach' and denied evidence of financial or credit card data compromise.

Date Publicly Disclosed: 2024-03-12

Type: Data Breach

Threat Actor: igotafeeling

Motivation: Extortion (response demanded by March 19)

Incident : Data Destruction / Wiper Attack

Title: Iranian Threat Actor Handala Hack Launches Destructive Cyberattacks Across Israel, Albania, and the U.S.

Description: A cyber threat group linked to Iran’s Ministry of Intelligence and Security (MOIS), known as Handala Hack (also tracked as Void Manticore, Red Sandstorm, and Banished Kitten), has executed a series of data-destructive attacks targeting organizations in Israel, Albania, and the United States. The group’s campaigns are designed to permanently erase data, making recovery nearly impossible.

Date Detected: late 2023

Type: Data Destruction / Wiper Attack

Attack Vector: Compromised VPN credentialsRDP exploitationGroup Policy logon scriptsAI-assisted PowerShell scripts

Threat Actor: Handala Hack (Void Manticore, Red Sandstorm, Banished Kitten)

Motivation: Sabotage and disruption

Incident : Ransomware

Title: Iranian-Linked Pay2Key Ransomware Targets U.S. Healthcare Organization

Description: In late February, an unnamed U.S. healthcare organization fell victim to a ransomware attack by Pay2Key, a strain linked to Iranian state-affiliated cyber actors. The incident revealed significant upgrades to the ransomware, making it harder to detect and more destructive. The attack showed no evidence of data exfiltration, a departure from previous Pay2Key operations, and was potentially timed to exploit geopolitical tensions.

Date Detected: 2025-02

Type: Ransomware

Attack Vector: Compromised administrative account

Threat Actor: Pay2Key (Iranian state-affiliated cyber actors)

Motivation: Strategic disruptionGeopolitical tensions

Incident : Cyber Espionage

Title: Iran-Linked Hackers Leak FBI Director Kash Patel’s Personal Emails in Cyber Espionage Campaign

Description: On March 27, 2026, the Iran-backed hacking group Handala Hack Team publicly released a trove of personal emails belonging to FBI Director Kash Patel, marking a high-profile breach in a series of cyber operations attributed to Iranian state-linked actors. The leaked correspondence, spanning from 2010 to 2019, includes a mix of personal and professional communications tied to Patel’s Gmail account, which had been previously exposed in other data breaches. The hackers published photographs of Patel alongside the leaked documents, declaring him among their 'successfully hacked victims.' A U.S. Justice Department official confirmed the breach, stating that the released material appeared authentic.

Date Detected: 2026-03-27

Date Publicly Disclosed: 2026-03-27

Type: Cyber Espionage

Attack Vector: Email Compromise

Vulnerability Exploited: Previously exposed data breach (Gmail account)

Threat Actor: Handala Hack Team (Iran-backed)

Motivation: Cyber Espionage, Intelligence Gathering

Incident : Data Breach

Title: Iranian-Backed Hackers Breach FBI Director’s Personal Email, Leak Private Photos

Description: On March 27, 2026, the Iranian-linked hacktivist group Handala Hack Team claimed responsibility for accessing the personal emails of FBI Director Kash Patel, publishing alleged photos and documents as proof. The leaked images dated between 2010 and 2019 depict Patel in personal settings, including vacations and social gatherings. The U.S. Justice Department confirmed the breach, verifying the authenticity of the materials. Handala framed the attack as retaliation for the ongoing U.S.-Iran conflict and the FBI’s $10 million bounty for information on its members. The group boasted of bypassing the FBI’s security systems, though officials clarified that only Patel’s personal Gmail account, not government systems, was compromised.

Date Detected: 2026-03-27

Date Publicly Disclosed: 2026-03-27

Type: Data Breach

Attack Vector: Personal Email Compromise

Threat Actor: Handala Hack Team

Motivation: Retaliation for U.S.-Iran conflictResponse to FBI's $10 million bounty

Incident : Data Breach

Title: Pro-Iranian Hackers Claim Breach of FBI Director’s Personal Account

Description: A pro-Iranian hacking group, Handala, announced it had compromised an account belonging to FBI Director Kash Patel, releasing decades-old personal photographs, a resume, and other documents online. The FBI confirmed awareness of the incident, stating the exposed data was historical and contained no classified or government information.

Date Publicly Disclosed: 2024-10-11

Type: Data Breach

Threat Actor: Handala

Motivation: Retaliation for alleged U.S. airstrikes linked to Iranian civilian casualties, cyber conflict with Western targets

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised VPN credentials, Compromised administrative account, Previously exposed Gmail account and Personal Gmail account.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach STR200080525

Data Compromised: Names

Incident : Wiper Attack STR1773240573

Data Compromised: Permanent deletion of data from infected systems

Systems Affected: IT systems, manufacturing operations, employee devices (Outlook, Microsoft Teams)

Operational Impact: Disrupted production of medical devices, employees sent home, reliance on WhatsApp for updates

Incident : Cyberattack STR1773246684

Systems Affected: Remote devices running Microsoft Windows (laptops, mobile devices)

Downtime: Global system outage

Operational Impact: Disrupted operations across the company’s network

Brand Reputation Impact: 3% drop in stock price

Incident : cyberattack STR1773260617

Systems Affected: global networks

Operational Impact: delays in production, supply chain interruptions, potential risks to patient care

Incident : Cyberattack STR1773268034

Data Compromised: 50 terabytes

Systems Affected: 200,000 systems, servers, and mobile devices

Operational Impact: Disrupted global Microsoft environment

Incident : Cyberattack STR1773354343

Systems Affected: Microsoft environment

Operational Impact: Disrupted operations

Incident : Data Breach NO-SHOPRELOB1773534483

Data Compromised: Over 1.8 billion records allegedly exposed

Systems Affected: SalesforceShoppers Drug Mart systemsGitLab projectsOracle identity systemsE-commerce platforms

Brand Reputation Impact: Potential significant impact if claims are verified

Identity Theft Risk: High (health card numbers, prescription IDs, PII)

Payment Information Risk: High (full credit card numbers with expiry dates)

Incident : Data Destruction / Wiper Attack STR1773714231

Data Compromised: Permanent data erasure

Systems Affected: Master Boot Records (MBR)User directoriesVirtual machinesEncrypted drives

Operational Impact: Severe disruption across critical sectors

Incident : Ransomware STR1774369485

Operational Impact: Disruption of healthcare services

Incident : Cyber Espionage FEDSTR1774629686

Data Compromised: Personal and professional emails (2010-2019)

Systems Affected: Personal email account (Gmail)

Brand Reputation Impact: High (FBI Director)

Identity Theft Risk: High

Incident : Data Breach CRISTR1774636436

Data Compromised: Personal photos and documents

Systems Affected: Personal Gmail account

Brand Reputation Impact: High (FBI Director's personal data exposed)

Identity Theft Risk: High (personal photos and documents exposed)

Incident : Data Breach STRFBI1774644063

Data Compromised: Personal photographs, resume, and other personal documents

Brand Reputation Impact: Potential reputational harm to FBI Director

Identity Theft Risk: Possible risk due to exposure of personal documents

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , System data (permanently deleted), Critical data, Customer Records (Names, Emails, Phone Numbers, Addresses, Loyalty Ids), Health Card Numbers, Pharmacy Fill Requests (Prescription Numbers, Patient Ids), Payment Details (Full Credit Card Numbers With Expiry Dates, Bins, Last-Four Digits), Source Code (Gitlab Projects), Mfa Device Details And Credentials (Oracle Identity Records), Marketing And Email Records, , Permanently erased data, Emails, Personal Photographs, Personal photos and documents, Personal photographs, resume and personal documents.

Which entities were affected by each incident ?

Incident : Data Breach STR200080525

Entity Name: Stryker Corporation

Entity Type: Corporation

Industry: Medical Devices

Incident : Wiper Attack STR1773240573

Entity Name: Stryker

Entity Type: Medical Technology Firm

Industry: Medical Devices

Location: Cork, Ireland

Size: 5,000 employees (4,000 in Cork)

Incident : Cyberattack STR1773246684

Entity Name: Stryker

Entity Type: Corporation

Industry: Medical Technology

Location: Global (facilities including Carrigtwohill, Ireland)

Incident : cyberattack STR1773260617

Entity Name: Stryker

Entity Type: medical technology company

Industry: healthcare, medical devices

Location: U.S.

Incident : Cyberattack STR1773268034

Entity Name: Stryker

Entity Type: Medical technology firm

Industry: Medical devices and surgical tools

Location: Kalamazoo, Michigan, USA

Incident : Cyberattack STR1773354343

Entity Name: Stryker

Entity Type: Corporation

Industry: Medical Technology

Location: Global

Customers Affected: Hospitals worldwide

Incident : Data Breach NO-SHOPRELOB1773534483

Entity Name: Loblaw Companies Limited

Entity Type: Retailer / Pharmacy

Industry: Retail, Grocery, Pharmacy, Loyalty Programs

Location: Canada

Size: Large (Canada’s largest food and pharmacy retailer)

Customers Affected: Potentially millions (PC Optimum, Shoppers Drug Mart, prescription users)

Incident : Data Destruction / Wiper Attack STR1773714231

Entity Name: Stryker

Entity Type: Medical Technology Firm

Industry: Healthcare/Medical Devices

Location: United States

Incident : Data Destruction / Wiper Attack STR1773714231

Entity Type: Government and Telecom

Industry: Government/Telecommunications

Location: Albania

Incident : Data Destruction / Wiper Attack STR1773714231

Entity Type: Various organizations

Location: Israel

Incident : Ransomware STR1774369485

Entity Name: Unnamed U.S. healthcare organization

Entity Type: Healthcare

Industry: Healthcare

Location: United States

Incident : Cyber Espionage FEDSTR1774629686

Entity Name: Kash Patel (FBI Director)

Entity Type: Individual (Government Official)

Industry: Government/Law Enforcement

Location: United States

Incident : Data Breach CRISTR1774636436

Entity Name: Kash Patel (FBI Director)

Entity Type: Individual

Industry: Government

Location: United States

Incident : Data Breach STRFBI1774644063

Entity Name: Kash Patel (FBI Director)

Entity Type: Individual

Industry: Government

Location: United States

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Wiper Attack STR1773240573

Incident Response Plan Activated: True

Third Party Assistance: Security experts

Containment Measures: Employees instructed to avoid connecting to the company’s network via any device

Remediation Measures: Restoring systems

Communication Strategy: Staff memo, WhatsApp groups for updates

Incident : Cyberattack STR1773268034

Containment Measures: Incident believed to be contained

Recovery Measures: Continuity measures in place to support customers and partners

Incident : Cyberattack STR1773354343

Containment Measures: Incident contained

Incident : Data Breach NO-SHOPRELOB1773534483

Communication Strategy: Press release downplaying the breach and denying financial data compromise

Incident : Ransomware STR1774369485

Third Party Assistance: Beazley Security, Halcyon Ransomware Research Center.

Incident : Cyber Espionage FEDSTR1774629686

Law Enforcement Notified: U.S. Justice Department

Incident : Data Breach CRISTR1774636436

Law Enforcement Notified: U.S. Justice Department confirmed the breach

Incident : Data Breach STRFBI1774644063

Incident Response Plan Activated: Yes

Containment Measures: Steps taken to mitigate risks from the breach

Communication Strategy: FBI issued a public statement

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes.

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Security experts, Beazley Security, Halcyon Ransomware Research Center, .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach STR200080525

Type of Data Compromised: Personal information

Personally Identifiable Information: Names

Incident : Wiper Attack STR1773240573

Type of Data Compromised: System data (permanently deleted)

Incident : Cyberattack STR1773268034

Type of Data Compromised: Critical data

Data Exfiltration: 50 terabytes

Incident : Data Breach NO-SHOPRELOB1773534483

Type of Data Compromised: Customer records (names, emails, phone numbers, addresses, loyalty ids), Health card numbers, Pharmacy fill requests (prescription numbers, patient ids), Payment details (full credit card numbers with expiry dates, bins, last-four digits), Source code (gitlab projects), Mfa device details and credentials (oracle identity records), Marketing and email records

Number of Records Exposed: 1.8 billion (alleged)

Sensitivity of Data: High (PII, financial data, health information, source code)

Data Exfiltration: Alleged (data sold on dark web if claims are true)

Personally Identifiable Information: Yes (names, emails, phone numbers, addresses, health card numbers, prescription IDs)

Incident : Data Destruction / Wiper Attack STR1773714231

Type of Data Compromised: Permanently erased data

Data Encryption: VeraCrypt abuse for drive encryption

Incident : Ransomware STR1774369485

Data Exfiltration: No evidence of data exfiltration

Data Encryption: Yes

Incident : Cyber Espionage FEDSTR1774629686

Type of Data Compromised: Emails, Personal Photographs

Sensitivity of Data: High (Personal and Professional Communications)

Data Exfiltration: Yes

File Types Exposed: EmailsImages

Personally Identifiable Information: Yes

Incident : Data Breach CRISTR1774636436

Type of Data Compromised: Personal photos and documents

Sensitivity of Data: High (personal and potentially sensitive images)

Data Exfiltration: Yes (leaked publicly)

File Types Exposed: ImagesDocuments

Personally Identifiable Information: Yes (personal photos, potential metadata)

Incident : Data Breach STRFBI1774644063

Type of Data Compromised: Personal photographs, resume, personal documents

Sensitivity of Data: Low (historical, no classified or government information)

Data Exfiltration: Yes

File Types Exposed: ImagesDocuments

Personally Identifiable Information: Yes

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restoring systems.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by employees instructed to avoid connecting to the company’s network via any device, incident believed to be contained, incident contained and steps taken to mitigate risks from the breach.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Cyberattack STR1773354343

Data Encryption: No evidence of data encryption

Incident : Data Breach NO-SHOPRELOB1773534483

Data Exfiltration: Alleged

Incident : Data Destruction / Wiper Attack STR1773714231

Data Encryption: VeraCrypt abuse for drive encryption

Incident : Ransomware STR1774369485

Ransomware Strain: Pay2Key

Data Encryption: Yes

Data Exfiltration: No evidence of data exfiltration

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Continuity measures in place to support customers and partners.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Wiper Attack STR1773240573

Regulatory Notifications: National Cyber Security Centre (NCSC) in Dublin

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Ransomware STR1774369485

Lessons Learned: The attack highlights the dual role of state-aligned ransomware groups in both financial extortion and geopolitical disruption. Organizations must account for evolving tactics, including log erasure and timing attacks to exploit chaos.

Incident : Data Breach CRISTR1774636436

Lessons Learned: Highlights risks of high-profile officials using personal emails for professional matters and the need for enhanced personal email security.

What recommendations were made to prevent future incidents ?

Incident : Ransomware STR1774369485

Recommendations: Enhance monitoring for administrative account compromises, Prepare for ransomware attacks with no data exfiltration but destructive encryption, Account for geopolitical risks in cybersecurity planning, Collaborate with third-party threat intelligence providersEnhance monitoring for administrative account compromises, Prepare for ransomware attacks with no data exfiltration but destructive encryption, Account for geopolitical risks in cybersecurity planning, Collaborate with third-party threat intelligence providersEnhance monitoring for administrative account compromises, Prepare for ransomware attacks with no data exfiltration but destructive encryption, Account for geopolitical risks in cybersecurity planning, Collaborate with third-party threat intelligence providersEnhance monitoring for administrative account compromises, Prepare for ransomware attacks with no data exfiltration but destructive encryption, Account for geopolitical risks in cybersecurity planning, Collaborate with third-party threat intelligence providers

Incident : Data Breach CRISTR1774636436

Recommendations: Implement stricter personal email security protocols for government officials, including multi-factor authentication and regular security audits.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are The attack highlights the dual role of state-aligned ransomware groups in both financial extortion and geopolitical disruption. Organizations must account for evolving tactics, including log erasure and timing attacks to exploit chaos.Highlights risks of high-profile officials using personal emails for professional matters and the need for enhanced personal email security.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement stricter personal email security protocols for government officials and including multi-factor authentication and regular security audits..

References

Where can I find more information about each incident ?

Incident : Data Breach STR200080525

Source: Vermont Office of the Attorney General

Incident : Wiper Attack STR1773240573

Source: Israeli media, National Cyber Security Centre (NCSC) Dublin, Stryker staff memo

Incident : Cyberattack STR1773246684

Source: The Wall Street Journal

Date Accessed: 2025-03-10

Incident : Cyberattack STR1773246684

Source: Reuters

Date Accessed: 2025-03-10

Incident : Cyberattack STR1773268034

Source: Cyber incident report

Incident : Cyberattack STR1773354343

Source: American Hospital Association (AHA)

Incident : Data Breach NO-SHOPRELOB1773534483

Source: DarkWeb Informer forum (threat actor 'igotafeeling')

Incident : Data Breach NO-SHOPRELOB1773534483

Source: Loblaw Press Release (March 12)

Incident : Data Destruction / Wiper Attack STR1773714231

Source: Check Point Research

Incident : Ransomware STR1774369485

Source: Beazley Security and Halcyon Ransomware Research Center

Incident : Ransomware STR1774369485

Source: Morphisec

Incident : Ransomware STR1774369485

Source: U.S. intelligence agencies

Incident : Ransomware STR1774369485

Source: 2024 U.S. advisory on Pay2Key

Incident : Cyber Espionage FEDSTR1774629686

Source: Cybersecurity Researchers

Incident : Data Breach CRISTR1774636436

Source: Cyber Incident Report

Date Accessed: 2026-03-27

Incident : Data Breach STRFBI1774644063

Source: FBI Statement

Date Accessed: 2024-10-11

Incident : Data Breach STRFBI1774644063

Source: U.S. Justice Department

Date Accessed: 2024-10-11

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney General, and Source: Israeli media, National Cyber Security Centre (NCSC) Dublin, Stryker staff memo, and Source: The Wall Street JournalDate Accessed: 2025-03-10, and Source: ReutersDate Accessed: 2025-03-10, and Source: Cyber incident report, and Source: American Hospital Association (AHA), and Source: DarkWeb Informer forum (threat actor 'igotafeeling'), and Source: Loblaw Press Release (March 12), and Source: Check Point Research, and Source: Beazley Security and Halcyon Ransomware Research Center, and Source: Morphisec, and Source: U.S. intelligence agencies, and Source: 2024 U.S. advisory on Pay2Key, and Source: Cybersecurity Researchers, and Source: Cyber Incident ReportDate Accessed: 2026-03-27, and Source: FBI StatementDate Accessed: 2024-10-11, and Source: U.S. Justice DepartmentDate Accessed: 2024-10-11.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Wiper Attack STR1773240573

Investigation Status: Ongoing

Incident : Cyberattack STR1773246684

Investigation Status: Ongoing

Incident : Cyberattack STR1773268034

Investigation Status: Ongoing

Incident : Cyberattack STR1773354343

Investigation Status: Ongoing

Incident : Data Breach NO-SHOPRELOB1773534483

Investigation Status: Unverified (allegations under scrutiny)

Incident : Ransomware STR1774369485

Investigation Status: Ongoing

Incident : Cyber Espionage FEDSTR1774629686

Investigation Status: Ongoing

Incident : Data Breach CRISTR1774636436

Investigation Status: Confirmed by U.S. Justice Department

Incident : Data Breach STRFBI1774644063

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Staff memo, WhatsApp groups for updates, Press release downplaying the breach and denying financial data compromise and FBI issued a public statement.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Wiper Attack STR1773240573

Stakeholder Advisories: Sites and personnel remain safe; focus on restoring systems

Incident : Cyberattack STR1773354343

Stakeholder Advisories: Collaboration with hospitals and federal agencies to assess the threat’s scope

Incident : Data Breach NO-SHOPRELOB1773534483

Customer Advisories: Loblaw customers with PC Optimum accounts, Shoppers Drug Mart loyalty cards, or prescription histories advised to monitor for potential fraud

Incident : Ransomware STR1774369485

Stakeholder Advisories: Cynthia Kaiser (Halcyon) warned of unreported Iranian cyberattacks and the mix of ransomware, wiper malware, and critical infrastructure targeting.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Sites and personnel remain safe; focus on restoring systems, Collaboration with hospitals and federal agencies to assess the threat’s scope, Loblaw customers with PC Optimum accounts, Shoppers Drug Mart loyalty cards, or prescription histories advised to monitor for potential fraud, Cynthia Kaiser (Halcyon) warned of unreported Iranian cyberattacks and the mix of ransomware, wiper malware and and critical infrastructure targeting..

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Destruction / Wiper Attack STR1773714231

Entry Point: Compromised VPN credentials

Incident : Ransomware STR1774369485

Entry Point: Compromised administrative account

Reconnaissance Period: Days before ransomware deployment

Incident : Cyber Espionage FEDSTR1774629686

Entry Point: Previously exposed Gmail account

High Value Targets: FBI Director

Data Sold on Dark Web: FBI Director

Incident : Data Breach CRISTR1774636436

Entry Point: Personal Gmail account

High Value Targets: FBI Director

Data Sold on Dark Web: FBI Director

Incident : Data Breach STRFBI1774644063

High Value Targets: FBI Director

Data Sold on Dark Web: FBI Director

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Destruction / Wiper Attack STR1773714231

Root Causes: Compromised Vpn Credentials, Rdp Exploitation, Lack Of Operational Security (Direct Use Of Iranian Ips),

Incident : Ransomware STR1774369485

Root Causes: Compromised Administrative Account, Lack Of Detection For Upgraded Ransomware Strain, Geopolitical Timing To Exploit Chaos,

Corrective Actions: Improve Administrative Account Security, Enhance Detection For Ransomware Upgrades, Monitor For Geopolitically Motivated Attacks,

Incident : Cyber Espionage FEDSTR1774629686

Root Causes: Exploitation of previously breached data

Incident : Data Breach CRISTR1774636436

Root Causes: Lack of robust personal email security for high-profile officials

Corrective Actions: Enhance personal email security measures for government officials

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Security experts, Beazley Security, Halcyon Ransomware Research Center, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Improve Administrative Account Security, Enhance Detection For Ransomware Upgrades, Monitor For Geopolitically Motivated Attacks, , Enhance personal email security measures for government officials.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Handala Hack, Handala (suspected Iran-backed hacking group), Handala, igotafeeling, Handala Hack (Void Manticore, Red Sandstorm, Banished Kitten), Pay2Key (Iranian state-affiliated cyber actors), Handala Hack Team (Iran-backed), Handala Hack Team and Handala.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-06-10.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-10-11.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, , Permanent deletion of data from infected systems, 50 terabytes, Over 1.8 billion records allegedly exposed, Permanent data erasure, Personal and professional emails (2010-2019), Personal photos and documents, Personal photographs, resume and and other personal documents.

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was SalesforceShoppers Drug Mart systemsGitLab projectsOracle identity systemsE-commerce platforms and Master Boot Records (MBR)User directoriesVirtual machinesEncrypted drives and and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Security experts, beazley security, halcyon ransomware research center, .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Employees instructed to avoid connecting to the company’s network via any device, Incident believed to be contained, Incident contained and Steps taken to mitigate risks from the breach.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal photos and documents, Permanent data erasure, Personal photographs, resume, and other personal documents, Over 1.8 billion records allegedly exposed, Permanent deletion of data from infected systems, 50 terabytes, Names and Personal and professional emails (2010-2019).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.8B.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was The attack highlights the dual role of state-aligned ransomware groups in both financial extortion and geopolitical disruption. Organizations must account for evolving tactics, including log erasure and timing attacks to exploit chaos., Highlights risks of high-profile officials using personal emails for professional matters and the need for enhanced personal email security.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Collaborate with third-party threat intelligence providers, Prepare for ransomware attacks with no data exfiltration but destructive encryption, Enhance monitoring for administrative account compromises, Implement stricter personal email security protocols for government officials, including multi-factor authentication and regular security audits. and Account for geopolitical risks in cybersecurity planning.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Check Point Research, Cyber incident report, Cyber Incident Report, Israeli media, National Cyber Security Centre (NCSC) Dublin, Stryker staff memo, Morphisec, FBI Statement, American Hospital Association (AHA), The Wall Street Journal, U.S. Justice Department, Loblaw Press Release (March 12), 2024 U.S. advisory on Pay2Key, Reuters, Cybersecurity Researchers, Vermont Office of the Attorney General, U.S. intelligence agencies, Beazley Security and Halcyon Ransomware Research Center and DarkWeb Informer forum (threat actor 'igotafeeling').

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Sites and personnel remain safe; focus on restoring systems, Collaboration with hospitals and federal agencies to assess the threat’s scope, Cynthia Kaiser (Halcyon) warned of unreported Iranian cyberattacks and the mix of ransomware, wiper malware, and critical infrastructure targeting., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Loblaw customers with PC Optimum accounts, Shoppers Drug Mart loyalty cards and or prescription histories advised to monitor for potential fraud.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Compromised VPN credentials, Personal Gmail account, Previously exposed Gmail account and Compromised administrative account.

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Days before ransomware deployment.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Compromised VPN credentialsRDP exploitationLack of operational security (direct use of Iranian IPs), Compromised administrative accountLack of detection for upgraded ransomware strainGeopolitical timing to exploit chaos, Exploitation of previously breached data, Lack of robust personal email security for high-profile officials.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Improve administrative account securityEnhance detection for ransomware upgradesMonitor for geopolitically motivated attacks, Enhance personal email security measures for government officials.

cve

Latest Global CVEs (Not Company-Specific)

Description

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.

Risk Information
cvss3
Base: 8.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=stryker' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge