Medical technology giant Stryker suffered a severe and destructive cyberattack on March 11, 2026. Attackers, suspected to be pro-Iranian hackers, gained access to a privileged administrative account and used it to abuse the company's Microsoft Intune platform. Instead of stealing data, the attackers issued legitimate remote wipe commands to tens of thousands of corporate devices. This simple but devastating action caused massive operational disruption, impacting inventory delivery and forcing the rescheduling of surgical procedures. The incident highlights a critical threat vector: the weaponization of legitimate IT and device management tools. It underscores the urgent need for organizations to treat MDM platforms as Tier 0 assets, requiring the highest levels of security, governance, and monitoring.
T1078 - Valid Accounts).T1485 - Data Destruction) causing mass device wipes, leading to significant business and operational disruption, including delays in patient surgeries.This attack's brilliance lies in its simplicity. It did not require a zero-day exploit or complex malware. The attack chain was likely as follows:
This is a classic example of Living Off the Land, where attackers use the target's own tools against them. Because the commands were issued by a legitimate administrative account and used standard platform features, they would not be flagged as malicious by traditional security tools.
Microsoft Entra ID Sign-in Logs and Intune Audit Logs.M1026 - Privileged Account Management.Enforcing phishing-resistant MFA on all administrative accounts would have made it significantly harder for the attacker to gain access, even with a stolen password.
Mapped D3FEND Techniques:
Implementing least privilege and granular RBAC within Intune would have limited the compromised account's ability to perform a mass wipe.
The Stryker attack was predicated on the compromise of a single administrative account. The most effective countermeasure is to enforce phishing-resistant Multi-Factor Authentication (MFA) on all accounts with administrative privileges in Microsoft Intune and Microsoft Entra ID. This is not just any MFA; it should be based on FIDO2/WebAuthn standards (e.g., YubiKeys, Windows Hello for Business). This prevents attackers from succeeding even if they steal a password through phishing or other means. Furthermore, Conditional Access policies should be configured to require MFA for all administrative sessions, and to block logins from non-compliant devices or risky locations. This simple, foundational control would have likely prevented the entire incident by stopping the attacker at the front door.
To detect the abuse of legitimate functions, as seen in the Stryker attack, organizations must implement Authorization Event Thresholding. This involves monitoring the Intune and Entra ID audit logs and creating specific rules to alert on high-risk, low-frequency events. For this scenario, a rule should be created to trigger a high-priority alert if any single administrator account issues a 'Wipe' command for more than a small, predefined number of devices (e.g., >5) within a short time window (e.g., 10 minutes). This is an anomalous event that warrants immediate investigation. This technique moves beyond simply logging events and creates an active defense that can detect an attacker who is 'living off the land' by abusing the platform's own destructive capabilities. The security operations team can then quickly intervene, revoke the session, and disable the account before catastrophic damage is done.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats