The recent cyberattack on medical technology company Stryker by pro-Iran hackers has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to advise companies to enhance the security of systems managing employee devices. In a concerning incident, the hackers gained access to Stryker’s network and remotely wiped thousands of phones, tablets, and computers using Microsoft Intune, the system the company employs for remote device management.
CISA emphasized the importance of restricting user account permissions within systems like Microsoft Intune to prevent unauthorized actions like device wiping. This incident serves as a reminder of the vulnerabilities in remote device management systems and the potential impact of cyberattacks on critical operations.
Stryker, a provider of medical devices for hospitals, confirmed the cyberattack and the disruption to its network. While no malware or ransomware was deployed, the hackers leveraged their access to delete data from employee devices, affecting supply and shipping systems.
As Stryker works on recovering from the attack, the incident underscores the necessity for companies to prioritize cybersecurity measures to safeguard against similar threats. The proactive stance advocated by CISA aims to mitigate risks and protect organizations from malicious actors targeting vulnerable systems.
Source: TechCrunch