DeFi Daily News
Friday, March 20, 2026
Advertisement
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos
No Result
View All Result
DeFi Daily News
No Result
View All Result
Home DeFi Metaverse

rewrite this title Stryker Cyberattackers Used Microsoft Intune to Wipe Thousands of Devices – UC Today

Kristian McCann by Kristian McCann
March 17, 2026
in Metaverse
0 0
0
rewrite this title Stryker Cyberattackers Used Microsoft Intune to Wipe Thousands of Devices – UC Today
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on Telegram
Listen to this article


rewrite this content using a minimum of 1000 words and keep HTML tags

The reported cyberattack against Stryker last week is believed to have used Microsoft Intune to remotely wipe thousands of corporate devices, a source told BleepingComputer.

Claimed by hacktivist group Handala, the attackers said they wiped more than 200,000 servers, mobile devices, and other systems, forcing the company to shut down offices across 79 countries. The hacktivists also claimed they exfiltrated about 50 TB of corporate data from the company’s infrastructure.

Stryker, a multinational medical device and equipment manufacturer, said investigators did not find any indication that data was exfiltrated. It also emphasized that the incident was not a ransomware attack and that the threat actor did not deploy any malware on its systems.

How the Attack Played Out

Cybersecurity Dive reported that Halcyon researchers found the Stryker attack impacted all phones and workstations with an Intune Base64 string. Intune is normally used to push software or manage devices through Base64 encoding, according to the researchers.

The attackers reportedly used encoded commands to trigger remote wipes on all devices tied to the company’s Intune environment.

The commands executed during the attack appear to have deleted critical data from phones and workstations. Analysts stressed that Intune itself was not breached; rather, the attackers appeared to have obtained administrative access to the platform, allowing them to use its built-in capabilities for destructive purposes.

High-level privileges, such as Intune administrator or global administrator accounts, would have been necessary to execute the wipes. Researchers say this points to credential theft or privilege escalation as a likely step in the attack chain.

Stryker is working with external forensic experts, and the Cybersecurity and Infrastructure Security Agency is assisting with investigations to learn more about the attack.

What Intune Users Should Do

For organizations using Intune or similar endpoint management tools, the Stryker incident is a reminder of the risks tied to administrative access.

Security experts recommend enforcing strict multi-factor authentication for all administrative accounts to reduce the likelihood of account takeovers. Dual-approval systems for destructive actions, such as remote wipes, can also prevent a single compromised account from executing mass deletions.

Palo Alto Networks Unit 42 did not comment on the Stryker attack but noted in a blog last week that reports from Israel’s National Cyber Directorate highlight a pattern of destructive “wiper” attacks targeting corporate networks. In those incidents, attackers gained initial access using stolen credentials and leveraged existing enterprise tools to expand control and cause damage.

Organizations should also closely monitor administrative activity and audit command usage in real time. Platforms like Intune are powerful for managing devices at scale, but they require robust safeguards and constant oversight to prevent misuse.

Lessons Learned and Forward-Looking Measures

The Stryker attack underscores the double-edged nature of centralized device management tools. While Intune and similar platforms are critical for controlling large device fleets, they can become liabilities if administrative access is compromised.

Security leaders are being urged to reassess endpoint management strategies. Protecting administrative credentials, enforcing multi-factor authentication, monitoring critical commands, and implementing dual-approval safeguards are now considered standard best practices. The Stryker case illustrates that even trusted enterprise tools can be turned against organizations. Vigilance, proactive monitoring, and layered security are essential in today’s threat landscape.

As companies increasingly rely on unified endpoint management, the incident highlights the need for ongoing scrutiny and continuous improvement of security policies to prevent attackers from weaponizing enterprise software. This ensures IT operations remain both efficient and safe.

and include conclusion section that’s entertaining to read. do not include the title. Add a hyperlink to this website http://defi-daily.com and label it “DeFi Daily News” for more trending news articles like this



Source link

Tags: CyberattackersDevicesIntuneMicrosoftrewriteStrykerThousandstitleTodayWipe
ShareTweetShare
Previous Post

rewrite this title Melody Wright’s Honest Take On the “Worse Than 2008” Crash Claim

Next Post

rewrite this title How Brinks Secured Its Global Communications with a 60-Day Webex Calling Migration – UC Today

Next Post
rewrite this title How Brinks Secured Its Global Communications with a 60-Day Webex Calling Migration – UC Today

rewrite this title How Brinks Secured Its Global Communications with a 60-Day Webex Calling Migration - UC Today

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
  • Trending
  • Comments
  • Latest
rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

rewrite this title Critics Mock Anthropic’s Claims Chinese AI Labs Are Stealing Its Data – Decrypt

February 23, 2026
rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

rewrite this title and make it good for SEO Kite (KITE) Will Be Listed on Binance HODLer Airdrops!

November 1, 2025
rewrite this title and make it good for SEODelhi woman’s ‘Hire My Dad’ LinkedIn post wins hearts, goes viral

rewrite this title and make it good for SEODelhi woman’s ‘Hire My Dad’ LinkedIn post wins hearts, goes viral

January 11, 2025
Wintermute Integrates Over 350 Cryptocurrency Pairs with Traditional Finance through oneZero Collaboration | Coin Media

Wintermute Integrates Over 350 Cryptocurrency Pairs with Traditional Finance through oneZero Collaboration | Coin Media

July 16, 2024
IRS Workers Ow  Million in Unsettled Taxes

IRS Workers Ow $50 Million in Unsettled Taxes

August 13, 2024
The Pat McAfee Show Live | Wednesday November 6th 2024

The Pat McAfee Show Live | Wednesday November 6th 2024

November 6, 2024
rewrite this title AFC West free agency: Best, worst signing, one more FA to target

rewrite this title AFC West free agency: Best, worst signing, one more FA to target

March 19, 2026
rewrite this title Urgent Health Warning Issued for Popular Beaches Amid Punishing Heat Wave

rewrite this title Urgent Health Warning Issued for Popular Beaches Amid Punishing Heat Wave

March 19, 2026
rewrite this title Best Crypto Presale to Buy in 2026: the SEC Ends Its Turf War, and Pepeto Gives Early Buyers the Entry That Delivers The Biggest Returns

rewrite this title Best Crypto Presale to Buy in 2026: the SEC Ends Its Turf War, and Pepeto Gives Early Buyers the Entry That Delivers The Biggest Returns

March 19, 2026
Joe Rogan Experience #2470 – Pierre Poilievre

Joe Rogan Experience #2470 – Pierre Poilievre

March 19, 2026
rewrite this title Playnance’s G Coin goes live on MEXC as staking momentum builds

rewrite this title Playnance’s G Coin goes live on MEXC as staking momentum builds

March 19, 2026
rewrite this title How Gradient Labs is Thinking About the Shift to Agentic Banking – Finovate

rewrite this title How Gradient Labs is Thinking About the Shift to Agentic Banking – Finovate

March 19, 2026
DeFi Daily

Stay updated with DeFi Daily, your trusted source for the latest news, insights, and analysis in finance and cryptocurrency. Explore breaking news, expert analysis, market data, and educational resources to navigate the world of decentralized finance.

  • About Us
  • Blogs
  • DeFi-IRA | Learn More.
  • Advertise with Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • DeFi-IRA
  • DeFi
    • NFT
    • Metaverse
    • Web 3
  • Finance
    • Business Finance
    • Personal Finance
  • Markets
    • Crypto Market
    • Stock Market
    • Analysis
  • Other News
    • World & US
    • Politics
    • Entertainment
    • Tech
    • Sports
    • Health
  • Videos

Copyright © 2024 Defi Daily.
Defi Daily is not responsible for the content of external sites.