| Threat Level | High — Active, Geopolitically Motivated Attack |
| Threat Actor | Handala (assessed Iranian MOIS / Void Manticore) |
| Target Sectors | Healthcare, Medical Technology, Global Supply Chain |
| Attack Type | Destructive Wiper (via Microsoft Intune / MDM Abuse) |
On March 11, 2026, the Iran-linked hacktivist group Handala claimed a devastating wiper attack against Stryker Corporation, one of the world's largest medical device manufacturers. This is not an isolated incident — it is a deliberate geopolitical escalation targeting US companies with perceived ties to Israel. Read the full Stryker Security Advisory Here.
Stryker Corporation — Fortune 500, $25 billion in annual revenue, 56,000 employees, operating in over 60 countries — woke up on March 11, 2026, to find their global IT infrastructure wiped.
The attack began early Wednesday morning. Employees across the United States, Europe, Asia, and other regions suddenly found themselves locked out of laptops, phones, internal systems, and corporate communications. On every affected device running Windows, one thing appeared in place of the Stryker login screen: the logo of Handala, an Iran-linked hacktivist group.
Handala presents itself as a pro-Palestinian hacktivist group that emerged in late 2023, but the Handala persona is the public face of a much older and more sophisticated actor.
Behind the Handala brand, multiple independent security researchers — including Palo Alto Networks Unit 42, Brandefense, and Microsoft — assess with high confidence that Handala is one of several online personas maintained by Void Manticore, an Iranian state-linked threat actor that has been operating since at least 2022. Void Manticore is tracked across the industry under several names:
The group is assessed to operate in alignment with Iran's Ministry of Intelligence and Security (MOIS), acting as a strategic extension of Iranian state interests while maintaining plausible deniability through its hacktivist framing. Their operations are explicitly political: public statements, leak packages, and social media narratives are all designed to align with and amplify Iranian state messaging.
Void Manticore's technical toolkit is layered and evolving:
This is where security teams need to pay close attention. Based on reporting from KrebsOnSecurity, investigators believe the attackers did not deploy traditional wiper malware in the initial phase. Instead, they abused a legitimate Microsoft enterprise tool:
|
Attack Vector: Microsoft Intune Remote Wipe |
|
Attackers obtained administrative credentials for Microsoft Intune — Microsoft's cloud-based mobile device management (MDM) platform. Using Intune's legitimate 'remote wipe' capability, they issued wipe commands against all managed devices in the Stryker tenant. Result: Every laptop, phone, and Windows device enrolled in the Stryker Intune tenant was factory reset simultaneously. No custom malware required for initial deployment. Claimed scope: 200,000+ servers, mobile devices, and systems across 79 countries. |
This attack vector matters because it means traditional endpoint detection tools may not have flagged the initial phase. The wipe was executed through legitimate administrative channels. This is what makes it particularly difficult to detect and defend against — and why access control to MDM admin accounts is now a critical priority.
Read the full Stryker Security Advisory Here.