Iranian-linked hacktivist group Handala claims responsibility for network disruption at Stryker, marking potential first destructive cyberattack tied to current US-Iran conflict
An Iranian-linked cyber group has claimed responsibility for a major network disruption at Stryker, a prominent US medical technology company, in what cybersecurity experts are calling a significant escalation in cyber warfare tied to the ongoing US-Iran conflict.
The attack, which occurred on Wednesday, March 11, 2026, reportedly affected Stryker's global Microsoft environment, causing widespread system outages. While the company stated there was no evidence of ransomware or malware deployment, initial reports from Irish news outlets suggested that employee devices, including personal phones, were wiped during the incident.
Handala's Claims and Motivations
Handala, a hacktivist group believed to be a front for Iran's Ministry of Intelligence and Security (MOIS), took credit for the attack through a lengthy post on its now-deleted Telegram channel and on X (formerly Twitter). The group claimed to have wiped more than 200,000 systems and servers and stolen 50 terabytes of "critical data."
The cyber attack was described as "retaliation for the brutal attack on the Minab school and in response to ongoing cyber assaults against the infrastructure of the Axis of Resistance." This reference appears to be connected to a US military strike that reportedly killed at least 175 people, mostly children, in what may have been a mistaken targeting of an Iranian elementary school in Minab.
Expert Analysis and Industry Impact
Cybersecurity experts are treating this incident with particular concern due to its targeting of healthcare infrastructure. "If accurate, Handala's alleged disruptive attack on Stryker marks a significant escalation - this is the first time this Iranian-backed threat actor has disruptively targeted a major US enterprise," said Sergey Shykevich, threat intelligence group manager at Check Point Research.
Shykevich emphasized the alarming nature of targeting a medical device company: "The fact that they've set their sights on a major medical device company is particularly alarming. Critical healthcare infrastructure represents a high-value, high-impact target: disruption doesn't just mean data loss, it can mean patient safety. This should serve as a wake-up call for the entire medtech sector to urgently reassess their threat landscape - nation-state actors are no longer someone else's problem."
Verifone Incident
In a related development, Handala also claimed to have breached payment device manufacturer Verifone. The group released screenshots that appeared to show the company's internal systems with a Handala Hack logo overlay. However, Verifone has refuted these claims, stating through a spokesperson that they have found "no evidence of any incident related to this claim and has no service disruption to our clients."
Context of US-Iran Cyber Conflict
This incident represents what appears to be the first destructive cyberattack linked directly to the current US-Iran conflict to hit a major American company. The attack comes amid what experts describe as an "out-loud cyberwar" between the United States and Iran, marking a significant shift in the nature of international cyber conflict.
Iran has increasingly leveraged cyber operations as a key component of its national security strategy, with cybercrime serving not just as a cover for government operations but as a central element of their approach to asymmetric warfare. The targeting of critical infrastructure and major enterprises signals a potential new phase in state-sponsored cyber operations.
Industry Response and Future Implications
The medical technology sector is now facing urgent pressure to reassess its cybersecurity posture. The attack on Stryker demonstrates that healthcare companies, which often manage sensitive patient data and critical medical devices, are becoming prime targets for nation-state actors.
As investigations continue, the incident serves as a stark reminder that cyber warfare is no longer a theoretical concern but an active and evolving threat. Companies across all sectors, particularly those in critical infrastructure and healthcare, must now consider the possibility of state-sponsored attacks as part of their standard risk assessment and security planning.
For more information on cybersecurity threats and best practices, visit the National Cyber Security Centre or the US Cybersecurity and Infrastructure Security Agency.

Comments
Please log in or register to join the discussion