Tuesday, March 17, 2026
No Result
View All Result
Bitcoin News Update
Advertisement
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Ethereum
    • Altcoin
    • Crypto Exchanges
  • Blockchain
  • NFT
  • Web3
  • DeFi
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Ethereum
    • Altcoin
    • Crypto Exchanges
  • Blockchain
  • NFT
  • Web3
  • DeFi
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
Marketcap
Bitcoin News Update
No Result
View All Result

Microsoft Intune Used to Wipe 10k Plus Devices in Stryker Attack

by Bitcoin News Update
March 17, 2026
in Metaverse
Reading Time: 3 mins read
0 0
0
Home Metaverse
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


The reported cyberattack against Stryker last week is believed to have used Microsoft Intune to remotely wipe thousands of corporate devices, a source told BleepingComputer.

Claimed by hacktivist group Handala, the attackers said they wiped more than 200,000 servers, mobile devices, and other systems, forcing the company to shut down offices across 79 countries. The hacktivists also claimed they exfiltrated about 50 TB of corporate data from the company’s infrastructure.

Stryker, a multinational medical device and equipment manufacturer, said investigators did not find any indication that data was exfiltrated. It also emphasized that the incident was not a ransomware attack and that the threat actor did not deploy any malware on its systems.

How the Attack Played Out

Cybersecurity Dive reported that Halcyon researchers found the Stryker attack impacted all phones and workstations with an Intune Base64 string. Intune is normally used to push software or manage devices through Base64 encoding, according to the researchers.

The attackers reportedly used encoded commands to trigger remote wipes on all devices tied to the company’s Intune environment.

The commands executed during the attack appear to have deleted critical data from phones and workstations. Analysts stressed that Intune itself was not breached; rather, the attackers appeared to have obtained administrative access to the platform, allowing them to use its built-in capabilities for destructive purposes.

High-level privileges, such as Intune administrator or global administrator accounts, would have been necessary to execute the wipes. Researchers say this points to credential theft or privilege escalation as a likely step in the attack chain.

Stryker is working with external forensic experts, and the Cybersecurity and Infrastructure Security Agency is assisting with investigations to learn more about the attack.

What Intune Users Should Do

For organizations using Intune or similar endpoint management tools, the Stryker incident is a reminder of the risks tied to administrative access.

Security experts recommend enforcing strict multi-factor authentication for all administrative accounts to reduce the likelihood of account takeovers. Dual-approval systems for destructive actions, such as remote wipes, can also prevent a single compromised account from executing mass deletions.

Palo Alto Networks Unit 42 did not comment on the Stryker attack but noted in a blog last week that reports from Israel’s National Cyber Directorate highlight a pattern of destructive “wiper” attacks targeting corporate networks. In those incidents, attackers gained initial access using stolen credentials and leveraged existing enterprise tools to expand control and cause damage.

Organizations should also closely monitor administrative activity and audit command usage in real time. Platforms like Intune are powerful for managing devices at scale, but they require robust safeguards and constant oversight to prevent misuse.

Lessons Learned and Forward-Looking Measures

The Stryker attack underscores the double-edged nature of centralized device management tools. While Intune and similar platforms are critical for controlling large device fleets, they can become liabilities if administrative access is compromised.

Security leaders are being urged to reassess endpoint management strategies. Protecting administrative credentials, enforcing multi-factor authentication, monitoring critical commands, and implementing dual-approval safeguards are now considered standard best practices. The Stryker case illustrates that even trusted enterprise tools can be turned against organizations. Vigilance, proactive monitoring, and layered security are essential in today’s threat landscape.

As companies increasingly rely on unified endpoint management, the incident highlights the need for ongoing scrutiny and continuous improvement of security policies to prevent attackers from weaponizing enterprise software. This ensures IT operations remain both efficient and safe.



Source link

Tags: 10kAsset ManagementAttackCall RecordingCommunication Compliance​DevicesEndpoint SecurityIntuneMicrosoftSecurity and ComplianceStrykerWipe
Previous Post

Former LA Deputy Sentenced to 5 Years in ‘Crypto Godfather’ Extortion Case

Next Post

Crypto May No Longer Be Treated Like Penny Stocks Under SEC Plan

Related Posts

Bitget Expands Spot Market With Ondo Tokenized Securities, Integrating US Equities, ETFs, And Commodities
Metaverse

Bitget Expands Spot Market With Ondo Tokenized Securities, Integrating US Equities, ETFs, And Commodities

March 17, 2026
Beyond the Hype: RingCentral’s AI Strategy with Carson Hostetter
Metaverse

Beyond the Hype: RingCentral’s AI Strategy with Carson Hostetter

March 17, 2026
Zero Downtime: Inside Brinks’ 60-Day Webex Calling Migration
Metaverse

Zero Downtime: Inside Brinks’ 60-Day Webex Calling Migration

March 17, 2026
Why Zuckerberg’s Vision Stumbled and What Comes Next
Metaverse

Why Zuckerberg’s Vision Stumbled and What Comes Next

March 17, 2026
AOHi Starship 240W Review: The Ultimate Sci-Fi Power Bank
Metaverse

AOHi Starship 240W Review: The Ultimate Sci-Fi Power Bank

March 17, 2026
Complete Guide to HR Tech Europe 2026 Amsterdam
Metaverse

Complete Guide to HR Tech Europe 2026 Amsterdam

March 16, 2026
Next Post
Crypto May No Longer Be Treated Like Penny Stocks Under SEC Plan

Crypto May No Longer Be Treated Like Penny Stocks Under SEC Plan

Analyst Says Hyperliquid Isn’t A Buy Right Now: Here’s Why

Analyst Says Hyperliquid Isn’t A Buy Right Now: Here’s Why

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

World markets by TradingView
Facebook Twitter Instagram Youtube RSS
Bitcoin News Update

Your trusted source for breaking Bitcoin news and live crypto prices. Bitcoin News Updates keeps you informed and ahead of the market curve.

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Web3

LATEST UPDATES

  • What Is a Web3 Wallet? The Complete Guide for Beginners
  • Strategy (MSTR) Is About To Own More Bitcoin Than BlackRock
  • Beyond the Hype: RingCentral’s AI Strategy with Carson Hostetter

Copyright © 2026 Bitcoin News Update.
Bitcoin News Update is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • bitcoinBitcoin(BTC)$74,552.000.49%
  • ethereumEthereum(ETH)$2,338.750.43%
  • tetherTether(USDT)$1.000.01%
  • rippleXRP(XRP)$1.530.49%
  • binancecoinBNB(BNB)$672.97-0.92%
  • usd-coinUSDC(USDC)$1.00-0.01%
  • solanaSolana(SOL)$94.580.13%
  • tronTRON(TRX)$0.3054932.88%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.36%
  • dogecoinDogecoin(DOGE)$0.100631-1.04%
No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Ethereum
    • Altcoin
    • Crypto Exchanges
  • Blockchain
  • NFT
  • Web3
  • DeFi
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert

Copyright © 2026 Bitcoin News Update.
Bitcoin News Update is not responsible for the content of external sites.