Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Scheduled Pinned Locked Moved Uncategorized
strykerhandalaintunewipercybersecurity
38 Posts 28 Posters 93 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

    Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

    A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

    From the story:

    "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

    "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

    Link Preview Image
    Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

    favicon

    (krebsonsecurity.com)

    #stryker #handala #intune #wiper #cybersecurity

    Link Preview Image
    hasani@my-spaces.socialH This user is from outside of this forum
    hasani@my-spaces.socialH This user is from outside of this forum
    hasani@my-spaces.social
    wrote last edited by
    #3

    @briankrebs And that is why you don’t tie personal devices to corporate systems allowing them to remote wipe your devices

    geniodiabolico@wandering.shopG 1 Reply Last reply
    0
    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

      Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

      A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

      From the story:

      "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

      "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

      Link Preview Image
      Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

      favicon

      (krebsonsecurity.com)

      #stryker #handala #intune #wiper #cybersecurity

      Link Preview Image
      tomjennings@tldr.nettime.orgT This user is from outside of this forum
      tomjennings@tldr.nettime.orgT This user is from outside of this forum
      tomjennings@tldr.nettime.org
      wrote last edited by
      #4

      @briankrebs

      What's this "new Epstein" thing?

      beisbolcards@mastodon.worldB 1 Reply Last reply
      0
      • em0nm4stodon@infosec.exchangeE em0nm4stodon@infosec.exchange shared this topic
      • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

        Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

        A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

        From the story:

        "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

        "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

        Link Preview Image
        Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

        favicon

        (krebsonsecurity.com)

        #stryker #handala #intune #wiper #cybersecurity

        Link Preview Image
        lumiworx@mastodon.socialL This user is from outside of this forum
        lumiworx@mastodon.socialL This user is from outside of this forum
        lumiworx@mastodon.social
        wrote last edited by
        #5

        @briankrebs

        "... they were told to uninstall Intune urgently."

        That knda sounds like opening the barn door to let the horses out, hours after a fleet of fire engines leaves the farm.

        1 Reply Last reply
        0
        • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

          Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

          A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

          From the story:

          "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

          "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

          Link Preview Image
          Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

          favicon

          (krebsonsecurity.com)

          #stryker #handala #intune #wiper #cybersecurity

          Link Preview Image
          dalias@hachyderm.ioD This user is from outside of this forum
          dalias@hachyderm.ioD This user is from outside of this forum
          dalias@hachyderm.io
          wrote last edited by
          #6

          @briankrebs LMAO MDM = FAFO

          dusk@todon.euD trkzn@mastodon.socialT 2 Replies Last reply
          0
          • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

            Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

            A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

            From the story:

            "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

            "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

            Link Preview Image
            Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

            favicon

            (krebsonsecurity.com)

            #stryker #handala #intune #wiper #cybersecurity

            Link Preview Image
            cafechatnoir@mastodon.socialC This user is from outside of this forum
            cafechatnoir@mastodon.socialC This user is from outside of this forum
            cafechatnoir@mastodon.social
            wrote last edited by
            #7

            @briankrebs

            This is arguably quite bad, but damn, why not wipe out the student loan servicers....

            1 Reply Last reply
            0
            • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

              Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

              A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

              From the story:

              "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

              "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

              Link Preview Image
              Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

              favicon

              (krebsonsecurity.com)

              #stryker #handala #intune #wiper #cybersecurity

              Link Preview Image
              elmar_iachi@chaos.socialE This user is from outside of this forum
              elmar_iachi@chaos.socialE This user is from outside of this forum
              elmar_iachi@chaos.social
              wrote last edited by
              #8

              @briankrebs Intune, also known as: Palpatine as a Service.

              Link Preview Image
              briankrebs@infosec.exchangeB 1 Reply Last reply
              0
              • elmar_iachi@chaos.socialE elmar_iachi@chaos.social

                @briankrebs Intune, also known as: Palpatine as a Service.

                Link Preview Image
                briankrebs@infosec.exchangeB This user is from outside of this forum
                briankrebs@infosec.exchangeB This user is from outside of this forum
                briankrebs@infosec.exchange
                wrote last edited by
                #9

                @Elmar_Iachi hahahahahah. thanks for the laugh. i needed that.

                1 Reply Last reply
                0
                • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                  Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                  A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                  From the story:

                  "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                  "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                  Link Preview Image
                  Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                  favicon

                  (krebsonsecurity.com)

                  #stryker #handala #intune #wiper #cybersecurity

                  Link Preview Image
                  fringedcrow@infosec.exchangeF This user is from outside of this forum
                  fringedcrow@infosec.exchangeF This user is from outside of this forum
                  fringedcrow@infosec.exchange
                  wrote last edited by
                  #10

                  @briankrebs apparently, they're claiming Verifone now as well.

                  Link Preview Image
                  oldoldcojote@climatejustice.socialO osceosso@defcon.socialO 2 Replies Last reply
                  0
                  • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                    Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                    A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                    From the story:

                    "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                    "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                    Link Preview Image
                    Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                    favicon

                    (krebsonsecurity.com)

                    #stryker #handala #intune #wiper #cybersecurity

                    Link Preview Image
                    f4grx@chaos.socialF This user is from outside of this forum
                    f4grx@chaos.socialF This user is from outside of this forum
                    f4grx@chaos.social
                    wrote last edited by
                    #11

                    @briankrebs the cure to NAS!

                    1 Reply Last reply
                    0
                    • R relay@relay.publicsquare.global shared this topic
                    • notasnek@infosec.exchangeN notasnek@infosec.exchange

                      @briankrebs luckily everything was perfected backed up.

                      trkzn@mastodon.socialT This user is from outside of this forum
                      trkzn@mastodon.socialT This user is from outside of this forum
                      trkzn@mastodon.social
                      wrote last edited by
                      #12

                      @notasnek @briankrebs Do we know if they have compromised the entire MS365 tenant ? If so OneDrive backups are probably gone as well.

                      1 Reply Last reply
                      0
                      • dalias@hachyderm.ioD dalias@hachyderm.io

                        @briankrebs LMAO MDM = FAFO

                        dusk@todon.euD This user is from outside of this forum
                        dusk@todon.euD This user is from outside of this forum
                        dusk@todon.eu
                        wrote last edited by
                        #13

                        @briankrebs

                        @dalias Curious if you could share a TL;DR of what an IT admin might consider as an alternative to MDM? Just manage remote machines manually?

                        dalias@hachyderm.ioD 1 Reply Last reply
                        0
                        • dalias@hachyderm.ioD dalias@hachyderm.io

                          @briankrebs LMAO MDM = FAFO

                          trkzn@mastodon.socialT This user is from outside of this forum
                          trkzn@mastodon.socialT This user is from outside of this forum
                          trkzn@mastodon.social
                          wrote last edited by
                          #14

                          @dalias @briankrebs In the company I used to work for, we used Intune (a little) because it was already included in what we payed to MS, so might as well use it right ? In light of this, I'm thinking having your MDM solution this tightly integrated to the rest of your ecosystem (and particularily to your backup) is a disaster waiting to happen.
                          But is there an MDM solution that doesn't suck ?

                          dalias@hachyderm.ioD 1 Reply Last reply
                          0
                          • dusk@todon.euD dusk@todon.eu

                            @briankrebs

                            @dalias Curious if you could share a TL;DR of what an IT admin might consider as an alternative to MDM? Just manage remote machines manually?

                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.io
                            wrote last edited by
                            #15

                            @dusk @briankrebs Well one level of MDM that's always inherently malicious is BYOD: taking backdoor control of people's personal devices so you can store sensitive work-related data on them. This is just completely unethical and should not even be on the table.

                            I'm not sure if that was involved here, but I thought I'd put it out there first.

                            dalias@hachyderm.ioD 1 Reply Last reply
                            0
                            • dalias@hachyderm.ioD dalias@hachyderm.io

                              @dusk @briankrebs Well one level of MDM that's always inherently malicious is BYOD: taking backdoor control of people's personal devices so you can store sensitive work-related data on them. This is just completely unethical and should not even be on the table.

                              I'm not sure if that was involved here, but I thought I'd put it out there first.

                              dalias@hachyderm.ioD This user is from outside of this forum
                              dalias@hachyderm.ioD This user is from outside of this forum
                              dalias@hachyderm.io
                              wrote last edited by
                              #16

                              @dusk @briankrebs As for company-owned devices, provision them centrally but don't leave backdoor access. Use encryption at rest to protect against theft rather than relying on ability to wipe after-the-fact (which won't work anyway if the thief is competent and wants the data). Expect devices to be returned upon leaving the company or for service/overhaul, or if you want to do it remotely, set it up so the user has to initiate the listening process to give you control rather than having an ambient backdoor.

                              dusk@todon.euD 1 Reply Last reply
                              0
                              • trkzn@mastodon.socialT trkzn@mastodon.social

                                @dalias @briankrebs In the company I used to work for, we used Intune (a little) because it was already included in what we payed to MS, so might as well use it right ? In light of this, I'm thinking having your MDM solution this tightly integrated to the rest of your ecosystem (and particularily to your backup) is a disaster waiting to happen.
                                But is there an MDM solution that doesn't suck ?

                                dalias@hachyderm.ioD This user is from outside of this forum
                                dalias@hachyderm.ioD This user is from outside of this forum
                                dalias@hachyderm.io
                                wrote last edited by
                                #17

                                @trkzn @briankrebs There probably isn't, because the folks who design MDM and the folks who buy MDM have really bad ideas about how it should work based on power trip fantasies not real world threat analysis and making fair and resilient power relationships.

                                1 Reply Last reply
                                0
                                • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                                  Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                                  A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                                  From the story:

                                  "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                                  "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                                  Link Preview Image
                                  Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                                  favicon

                                  (krebsonsecurity.com)

                                  #stryker #handala #intune #wiper #cybersecurity

                                  Link Preview Image
                                  B This user is from outside of this forum
                                  B This user is from outside of this forum
                                  buthowhighishigh@mastodon.social
                                  wrote last edited by
                                  #18

                                  @briankrebs man it would be “so horrible” if someone somehow wiped out debt like that, so so so horrible, I could barely imagine it, and if anyone needs me I’ll be struggling to imagine it for the rest of the day

                                  1 Reply Last reply
                                  0
                                  • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                                    Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                                    A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                                    From the story:

                                    "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                                    "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                                    Link Preview Image
                                    Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                                    favicon

                                    (krebsonsecurity.com)

                                    #stryker #handala #intune #wiper #cybersecurity

                                    Link Preview Image
                                    hiphopheaven@mastodon.socialH This user is from outside of this forum
                                    hiphopheaven@mastodon.socialH This user is from outside of this forum
                                    hiphopheaven@mastodon.social
                                    wrote last edited by
                                    #19

                                    @briankrebs the usa and iarael killed internstional laws

                                    1 Reply Last reply
                                    0
                                    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                                      Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                                      A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                                      From the story:

                                      "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                                      "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                                      Link Preview Image
                                      Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                                      favicon

                                      (krebsonsecurity.com)

                                      #stryker #handala #intune #wiper #cybersecurity

                                      Link Preview Image
                                      compfu@mograph.socialC This user is from outside of this forum
                                      compfu@mograph.socialC This user is from outside of this forum
                                      compfu@mograph.social
                                      wrote last edited by
                                      #20

                                      @briankrebs Medical companies should not be called like a weapon system or some sci-fi shit.

                                      a_minion@mastodon.socialA 1 Reply Last reply
                                      0
                                      • dalias@hachyderm.ioD dalias@hachyderm.io

                                        @dusk @briankrebs As for company-owned devices, provision them centrally but don't leave backdoor access. Use encryption at rest to protect against theft rather than relying on ability to wipe after-the-fact (which won't work anyway if the thief is competent and wants the data). Expect devices to be returned upon leaving the company or for service/overhaul, or if you want to do it remotely, set it up so the user has to initiate the listening process to give you control rather than having an ambient backdoor.

                                        dusk@todon.euD This user is from outside of this forum
                                        dusk@todon.euD This user is from outside of this forum
                                        dusk@todon.eu
                                        wrote last edited by
                                        #21

                                        @dalias @briankrebs

                                        Brilliant, thx!!

                                        1 Reply Last reply
                                        0
                                        • compfu@mograph.socialC compfu@mograph.social

                                          @briankrebs Medical companies should not be called like a weapon system or some sci-fi shit.

                                          a_minion@mastodon.socialA This user is from outside of this forum
                                          a_minion@mastodon.socialA This user is from outside of this forum
                                          a_minion@mastodon.social
                                          wrote last edited by
                                          #22

                                          @compfu @briankrebs I wondered just how long it was going to take after Hegseth said all those restrictive rules of war were nul & void. 'We don't want restrictions of any kind'.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups