On March 11, 2026, U.S. medical technology giant Stryker experienced a major cyberattack that disrupted internal systems and reportedly wiped data from thousands of employee devices. The incident claimed by a pro-Iranian hacker group has quickly become one of the most notable cyber incidents targeting the healthcare technology sector this year.
Beyond the geopolitical implications, the attack highlights a critical issue for enterprises worldwide: how corporate device management systems can become a powerful attack surface when compromised.
For organizations relying on mobile device management (MDM) or unified endpoint management (UEM) platforms, the Stryker incident offers several important lessons.
What Happened in the Stryker Cyberattack
On March 11, 2026, Stryker reported a cybersecurity incident affecting its internal Microsoft-based systems. The disruption impacted thousands of employees globally and caused widespread outages across company devices.
Reports indicate that:
- Employees found company laptops and phones disabled or wiped.
- Internal systems connected to Microsoft infrastructure were disrupted.
- Employees were unable to access key applications or corporate networks.
The Iran-linked hacker group Handala claimed responsibility for the attack and said it had wiped more than 200,000 devices and extracted roughly 50 TB of data, although those claims remain unverified.
Stryker stated that the attack did not appear to involve ransomware or malware, and the full scope of the incident is still under investigation.
The Anatomy of the Attack
Here is how the attack chain unfolded against Stryker:
1. Credential Compromise
Attackers obtained high-privilege administrative credentials for Stryker’s Microsoft 365 and Entra ID environment. While the exact initial access vector has not been officially confirmed, Handala’s documented techniques include credential phishing, credential stuffing, and brute-force attacks against legacy authentication protocols.
2. Full Tenant Takeover via Entra ID
With Global Administrator credentials in hand, the attackers had effective control over Stryker’s entire Microsoft 365 tenant. They defaced the Entra login page with the Handala logo and sent emails to company executives claiming ownership of the operation a signature tactic designed to escalate psychological pressure alongside the technical attack.
3. Weaponizing the MDM Console
Through their control of the tenant, attackers accessed the Microsoft Intune management console. Intune’s Remote Wipe feature a standard capability built for lost or stolen device scenarios was used to issue factory reset commands against all enrolled devices simultaneously. No malware was deployed; the attack surface was the administrative console itself.
4. BYOD Included in the Blast Radius
Employees who had enrolled personal devices via the Intune Company Portal were affected equally alongside corporate-owned hardware. Personal data photos, personal app data, banking 2FA, eSIMs was erased along with corporate data. The wipe command executed by the attackers did not distinguish between device ownership types.
5. Parallel Data Exfiltration
Prior to executing the wipe, Handala claimed to have exfiltrated 50 terabytes of data. The destruction appears to have been the final act of an operation that prioritized theft first the wipe functioning as both a cover operation and a message.
Why Employees Were Asked to Unenroll Devices
In the wake of the attack, employees were reportedly instructed to remove enterprise management profiles from their devices, including those associated with Microsoft Intune.
Why would IT teams do this?
When attackers gain control of device management infrastructure, they can potentially:
- Push malicious configurations
- Deploy destructive scripts or wipe commands
- Lock users out of devices
- Exfiltrate corporate data
- Spread lateral attacks across endpoints
Because device management platforms control large fleets of corporate and BYOD devices, they can become a single point of failure if compromised.
The Rise of Management Layer Attacks
Cyber attackers are increasingly shifting their focus from individual devices to centralized control systems. Rather than infecting thousands of endpoints one by one, attackers aim to compromise:
- Identity systems
- Cloud administration consoles
- Endpoint management platforms
- Infrastructure orchestration tools
Once attackers gain privileged access to these systems, they can perform actions that would otherwise require months of lateral movement within a network. In many cases, the damage is not caused by malware running on endpoints, but by legitimate administrative commands executed through trusted management tools.
Lessons for IT and Security Teams
The Stryker incident highlights several important best practices for organizations managing large fleets of endpoints.
1. Secure Your Device Management Infrastructure
Device management platforms should be protected with:
- strict access controls
- multi-factor authentication
- network segmentation
- continuous monitoring
2. Minimize Privileged Access
Limit administrative privileges to only essential users and ensure role-based access controls are enforced.
3. Monitor Endpoint Commands
Security teams should track high-risk commands such as:
- device wipe
- configuration changes
- certificate deployment
Unexpected spikes in these actions may signal compromise.
4. Maintain Emergency Response Plans
Organizations should have playbooks that include:
- rapid device unenrollment
- credential revocation
- endpoint isolation
- alternate access methods
5. Strengthen Endpoint Visibility
Real-time monitoring and automated alerts are essential for identifying suspicious activity before it spreads across devices.
How Hexnode UEM Is Built Around This
The lessons from recent cyber incidents reinforce a critical architectural principle: a UEM platform must be built with layered checks and balances.
At Hexnode, our philosophy is that device management should empower IT at scale without creating a single point of catastrophic failure. Here is how our platform is structured to mitigate high-level administrative risks:
1. Atomic RBAC (Role-Based Access Control)
A compromised admin password should never equate to a total network wipe. Hexnode utilizes Atomic RBAC, allowing organizations to define access at a highly granular level. It works on three pillars:
Action-Based Granularity: You can strictly limit who has the permission to execute critical commands. A Tier-1 helpdesk technician might have permission to view a device, but the “Device Wipe” capability is strictly blocked.
Scope-Based Boundaries: Admins are locked into a specific jurisdiction (e.g., an admin for the Germany office is programmatically blocked from even seeing devices in the Americas).
Step-Up Authentication for Critical Actions: For high-risk, critical actions like executing a device wipe Hexnode forces the administrator to re-authenticate with 2FA. Even if an active session is hijacked, the attacker cannot execute destructive commands without the secondary physical token.
2. Selective Wipe and Containerization for BYOD
One of the most concerning aspects of the Stryker attack was the wiping of employees’ personal devices. Hexnode prevents this through strict BYOD containerization. If a wipe command needs to be executed on a BYOD device, Hexnode allows administrators to perform a Selective Wipe (or Corporate Wipe). This command only destroys the encrypted corporate workspace, leaving the employee’s personal photos, texts, and private apps completely untouched.
3. “Technician Shadow” and Audit Integrity
When malicious actions occur, visibility is your first line of defense. Hexnode maintains a forensic record of all administrative interactions, known as the Technician Shadow. Every command sent, policy changed, or device wiped is tracked back to a specific technician account with a precise timestamp. This provides the immediate visibility needed to identify compromised accounts before widespread damage occurs.
4. Continuous Zero Trust Enforcement
Hexnode acts as the endpoint enforcer for your Zero Trust architecture. Operating on the core principle of “never trust, always verify,” Hexnode ensures that access is not a one-time event based solely on a password. Instead, device posture and health are continuously verified. Even if a threat actor successfully compromises administrative credentials, Zero Trust principles ensure that the compromised identity cannot freely navigate the network or execute mass commands without continuous validation.
5. Attribute-Based Access Control (ABAC)
To operationalize this Zero Trust approach, Hexnode utilizes Attribute-Based Access Control (ABAC). Rather than just looking at a user’s static role, ABAC evaluates a dynamic combination of user attributes, device compliance states, and network conditions before granting access. If an attacker gains access to credentials but is attempting to execute commands from an unregistered device or an unapproved network location, the system acts as a strict logic gate to instantly block the intrusion.
The Takeaway
The Stryker cyberattack is a harsh reminder that our security tools are only as effective as the safeguards protecting them. It is time for organizations to audit their UEM configurations, tighten administrative access, and ensure that the platform protecting their network doesn’t become the ultimate vulnerability.
Strengthen Your Endpoint Security with Hexnode
Explore how Hexnode UEM combines powerful device management with built-in security controls for modern enterprises.
Request a Demo