No Malware Needed: Stryker Attackers Weaponized Intune
Iran-linked hackers wiped tens of thousands of Stryker devices using Microsoft Intune's remote wipe feature. Here's what security teams should learn.
The Stryker attack is rewriting assumptions about destructive cyber operations. Iranian-linked hacktivists didn't drop wiper malware on endpoints or exploit zero-days. They logged into Microsoft Intune with stolen credentials and clicked a button. That single action erased tens of thousands of devices across 79 countries.
TL;DR
- What happened: Attackers used legitimate Intune remote wipe commands—no malware deployed
- Scale: Tens of thousands of devices wiped; Stryker confirms restoration underway
- Technique shift: Living-off-the-land now extends to cloud management consoles
- Action required: Treat MDM admin accounts as Tier Zero assets; implement multi-admin approval
When Device Management Becomes a Weapon
As we reported last week, the Handala hacktivist group claimed responsibility for wiping over 200,000 Stryker devices on March 11. Stryker has now confirmed "tens of thousands" of devices were affected—short of Handala's boasted numbers, but still catastrophic.
What makes this attack notable isn't the scale. It's the method.
Traditional wiper attacks require deploying malware to target systems. NotPetya spread through software updates. Shamoon required initial access and custom destructive code. HermeticWiper needed signed drivers. Each demanded significant operational tradecraft.
The Stryker attackers skipped all that. According to reports from Krebs on Security, investigators determined the perpetrators compromised administrative credentials for Stryker's Microsoft Entra ID environment, accessed the Intune console, and issued mass remote wipe commands. The platform did exactly what it was designed to do—it just followed orders from the wrong people.
The Investigation's Surprising Finding
Handala claimed to have exfiltrated 50 terabytes of data before wiping devices. Investigators found no evidence supporting that claim. This pattern—dramatic claims without corroborating evidence—appears common among hacktivist personas that security researchers link to Iranian state operations.
Stryker emphasized that the incident "was not a ransomware attack" and that "the threat actor did not deploy any malware on its systems." Medical devices remain safe to use. But digital ordering systems stayed offline as of this week, forcing hospitals to place orders manually through sales representatives.
MDM Platforms: The New Single Point of Failure
Every organization running Microsoft Intune, VMware Workspace ONE, Jamf, or similar platforms should be asking uncomfortable questions right now.
MDM and UEM solutions exist to secure device fleets. They're designed to push configurations, enforce policies, and yes—remotely wipe lost or stolen devices. That capability becomes an extinction-level threat when adversaries gain administrative access.
Consider what an attacker with MDM admin credentials can do:
- Mass wipe every enrolled device simultaneously
- Push malicious configurations that disable security controls
- Deploy malware through legitimate software distribution channels
- Exfiltrate inventory data revealing every device, user, and application in the organization
Microsoft offers built-in protections that many organizations haven't enabled. Multi-admin approval for device actions requires a second administrator to approve destructive commands before they execute. Privileged Identity Management can enforce just-in-time access, ensuring admin credentials only activate for bounded time windows with explicit approval.
Protecting Your Cloud Management Infrastructure
The Stryker attack surfaces lessons that apply far beyond Intune:
Treat MDM admins as Tier Zero. These accounts control more devices than your domain controllers. Require phishing-resistant MFA—FIDO2 security keys or Windows Hello for Business—that can't be intercepted through adversary-in-the-middle attacks.
Implement just-in-time privileges. Standing access to destructive capabilities is standing risk. Microsoft Entra Privileged Identity Management eliminates persistent admin access by requiring explicit activation with time limits.
Enable multi-admin approval. No single person should be able to wipe your entire device fleet. Require a second administrator to approve bulk device actions.
Separate backup infrastructure. If attackers compromise your primary tenant, they shouldn't automatically gain access to configuration backups. Export Intune configurations via Microsoft Graph API and store them in a separate tenant or offline location.
Test recovery procedures. Can you rebuild your MDM environment and re-enroll devices if the platform becomes compromised? Organizations that haven't tested this scenario will discover the answer during an incident.
Broader Implications
The Stryker attack fits an emerging pattern where threat actors abuse legitimate administrative capabilities rather than deploying traditional malware. This "living off the land" approach, long common for on-premises attacks, is now extending to cloud management platforms.
Microsoft's own fraud disruption operations show the other side of this coin—the company recently took down infrastructure supporting financial fraud schemes by working with hosting providers. Both defenders and attackers are learning that cloud management capabilities represent critical control points.
For security teams, the message is clear: your device management platform isn't just an IT tool. It's a weapon. Make sure you're the only one holding it.
Related Articles
Handala Wipes 200,000 Stryker Devices Using Microsoft Intune
Iranian-linked hacktivists claim devastating attack on medical device maker Stryker, weaponizing Intune's remote wipe capability to erase systems in 79 countries.
Mar 12, 2026MacSync Stealer Spreads via Fake AI Tool Installers in ClickFix Wave
Three ClickFix campaigns target macOS users with MacSync infostealer disguised as ChatGPT and AI coding tools. Latest variant adds in-memory execution to evade detection.
Mar 17, 2026250+ WordPress Sites Compromised to Deliver Infostealers via ClickFix
Global campaign hijacks WordPress sites in 12 countries to serve fake Cloudflare CAPTCHAs that deploy Vidar, VodkaStealer, and other credential theft malware.
Mar 16, 2026AuraStealer Spreads via TikTok ClickFix Scams, Targets 110+ Browsers
Russian-linked AuraStealer infostealer uses TikTok videos and 48 C2 domains to steal credentials. ABE bypass defeats Chrome's cookie encryption.
Mar 16, 2026