Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

Scheduled Pinned Locked Moved Uncategorized
strykerhandalaintunewipercybersecurity
38 Posts 28 Posters 93 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

    Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

    A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

    From the story:

    "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

    "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

    Link Preview Image
    Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

    favicon

    (krebsonsecurity.com)

    #stryker #handala #intune #wiper #cybersecurity

    Link Preview Image
    csgraves@turtleisland.socialC This user is from outside of this forum
    csgraves@turtleisland.socialC This user is from outside of this forum
    csgraves@turtleisland.social
    wrote last edited by
    #27

    @briankrebs this is fun, and hilarious!

    1 Reply Last reply
    0
    • a_minion@mastodon.socialA This user is from outside of this forum
      a_minion@mastodon.socialA This user is from outside of this forum
      a_minion@mastodon.social
      wrote last edited by
      #28

      @hotelzululima @compfu @briankrebs

      It gets a bit more interesting. We (US) supported Geneva Convention and were given even stricter rules than stated. N Vietnam was not. As a result we were at a disadvantage, If both nations are signed on and are honest some of the horrors we saw in Vietnam won't happen. Most important is "If a soldier is out of combat he must be taken care of." Not killed like the folks on the "drug boat" were. All in that line are guilty of a war crime. Thanks Hegseth.

      1 Reply Last reply
      0
      • fringedcrow@infosec.exchangeF fringedcrow@infosec.exchange

        @briankrebs apparently, they're claiming Verifone now as well.

        Link Preview Image
        oldoldcojote@climatejustice.socialO This user is from outside of this forum
        oldoldcojote@climatejustice.socialO This user is from outside of this forum
        oldoldcojote@climatejustice.social
        wrote last edited by
        #29

        @Fringedcrow @briankrebs

        Link Preview Image
        Stryker cyberattack: Iranian group claims responsibility - 'Erased 200,000 systems, extracted 50 terabytes of data' | Today News

        In a statement, Handala referred to the US missile attack on a girls' school in Minab city of Iran, which killed dozens, as one of the reasons for the hacking.

        favicon

        mint (www.livemint.com)

        1 Reply Last reply
        0
        • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

          Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

          A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

          From the story:

          "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

          "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

          Link Preview Image
          Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

          favicon

          (krebsonsecurity.com)

          #stryker #handala #intune #wiper #cybersecurity

          Link Preview Image
          tycoontom@infosec.exchangeT This user is from outside of this forum
          tycoontom@infosec.exchangeT This user is from outside of this forum
          tycoontom@infosec.exchange
          wrote last edited by
          #30

          @briankrebs The hacker's ripped out Stryker's🏥 appendix.

          1 Reply Last reply
          0
          • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

            Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

            A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

            From the story:

            "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

            "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

            Link Preview Image
            Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

            favicon

            (krebsonsecurity.com)

            #stryker #handala #intune #wiper #cybersecurity

            Link Preview Image
            thenovemberman@bookstodon.comT This user is from outside of this forum
            thenovemberman@bookstodon.comT This user is from outside of this forum
            thenovemberman@bookstodon.com
            wrote last edited by
            #31

            @briankrebs #Microslop strikes again! 😅 #HackMicrosoft

            1 Reply Last reply
            0
            • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

              Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

              A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

              From the story:

              "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

              "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

              Link Preview Image
              Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

              favicon

              (krebsonsecurity.com)

              #stryker #handala #intune #wiper #cybersecurity

              Link Preview Image
              S This user is from outside of this forum
              S This user is from outside of this forum
              spacelifeform@infosec.exchange
              wrote last edited by
              #32

              @briankrebs

              Windows. No surprise.

              1 Reply Last reply
              0
              • beisbolcards@mastodon.worldB beisbolcards@mastodon.world

                @tomjennings @briankrebs

                Also curious as to why Stryker in particular.

                alexandermars@mastodon.socialA This user is from outside of this forum
                alexandermars@mastodon.socialA This user is from outside of this forum
                alexandermars@mastodon.social
                wrote last edited by
                #33

                @beisbolcards @tomjennings @briankrebs

                When my daughter was born, just about every product I came in contact with at the hospital had a Stryker logo on it, not hyperbole. I believe they might be the largest medical supplier in the US(edit: they're number 6, I looked it up). If this is a worst case scenario and it takes 6 months to fulfill orders, it may have much broader consequences on the general public than just being an epic data wipe.

                1 Reply Last reply
                0
                • geniodiabolico@wandering.shopG geniodiabolico@wandering.shop

                  @hasani @briankrebs

                  Work: If you don't accept these terms that allow us to wipe your device, you won't be able to access Exchange via mobile.
                  Me: Win-win, mother fuckers!

                  alexandermars@mastodon.socialA This user is from outside of this forum
                  alexandermars@mastodon.socialA This user is from outside of this forum
                  alexandermars@mastodon.social
                  wrote last edited by
                  #34

                  @geniodiabolico holy shit, never install corporate spyware from your employer on a personal device. If your employer won't provide a device then use a cheap second device.

                  geniodiabolico@wandering.shopG 1 Reply Last reply
                  0
                  • alexandermars@mastodon.socialA alexandermars@mastodon.social

                    @geniodiabolico holy shit, never install corporate spyware from your employer on a personal device. If your employer won't provide a device then use a cheap second device.

                    geniodiabolico@wandering.shopG This user is from outside of this forum
                    geniodiabolico@wandering.shopG This user is from outside of this forum
                    geniodiabolico@wandering.shop
                    wrote last edited by
                    #35

                    @AlexanderMars That was literally the point of my post.

                    1 Reply Last reply
                    0
                    • fringedcrow@infosec.exchangeF fringedcrow@infosec.exchange

                      @briankrebs apparently, they're claiming Verifone now as well.

                      Link Preview Image
                      osceosso@defcon.socialO This user is from outside of this forum
                      osceosso@defcon.socialO This user is from outside of this forum
                      osceosso@defcon.social
                      wrote last edited by
                      #36

                      @Fringedcrow @briankrebs Neat graphics, this may be sophisticated, I don’t know, but until the full Trumpstein photos and videos and files are exposed on a Times Square billboard I’ll still yawn.

                      1 Reply Last reply
                      0
                      • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                        Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                        A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                        From the story:

                        "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                        "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                        Link Preview Image
                        Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                        favicon

                        (krebsonsecurity.com)

                        #stryker #handala #intune #wiper #cybersecurity

                        Link Preview Image
                        androcat@toot.catA This user is from outside of this forum
                        androcat@toot.catA This user is from outside of this forum
                        androcat@toot.cat
                        wrote last edited by
                        #37

                        @briankrebs Intune the attack vector, nice.

                        1 Reply Last reply
                        0
                        • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                          Breaking, new, by me: Iran-backed Hackers Claim Wiper Attack on Medtech Firm Stryker

                          A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker's main U.S. headquarters says the company is currently experiencing a building emergency.

                          From the story:

                          "Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices."

                          "Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently."

                          Link Preview Image
                          Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

                          favicon

                          (krebsonsecurity.com)

                          #stryker #handala #intune #wiper #cybersecurity

                          Link Preview Image
                          briankrebs@infosec.exchangeB This user is from outside of this forum
                          briankrebs@infosec.exchangeB This user is from outside of this forum
                          briankrebs@infosec.exchange
                          wrote last edited by
                          #38

                          Added this as an update to the story on the wiper attack on medtech giant Stryker, which doesn't just sell medical devices: A number of hospitals have opted to disconnect from Stryker's online services to minimize risk from the attack, including LifeNet, a service used by countless hospitals to send EKGs etc. from emergency responders to the emergency room in advance of the patient arriving (to speed up treatment, minimize heart tissue damage, etc). Some states, e.g., Maryland, actually require the transmission of this information, and are asking providers who have disconnected from LifeNet to start using the phone to describe the results of EKGs recorded by emergency personnel in the field.

                          Link Preview Image
                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups