Key Takeaways
- Iranian-backed cyber group Handala took credit for launching a cyberattack against Stryker on March 11, 2026
- The medical device company experienced widespread network disruptions affecting multiple systems and business platforms
- Hackers alleged they erased data on over 200,000 devices and stole 50TB of information, framing it as revenge for the Minab school bombing in Iran
- The company stated no ransomware or malicious software was found and considers the breach contained
- Shares of SYK declined 3.6% Wednesday after the attack became public
Michigan-headquartered medical technology company Stryker suffered a devastating cyberattack on March 11 that crippled significant portions of its worldwide infrastructure and triggered a 3.6% stock decline.
In an SEC filing, the corporation disclosed that the breach disabled access to numerous information technology systems and critical business platforms. The company has not provided an estimated recovery timeline.
Employees and external contractors shared on social platforms that an Iranian hacker group’s logo was displayed across company login screens. Phone calls to the company’s Portage, Michigan offices were answered with an automated message indicating a “building emergency” was underway.
According to Stryker’s statement, investigators detected no ransomware or malicious code and the company maintains the situation has been isolated. However, the disruption’s scope was significant enough to impact its Cork, Ireland manufacturing site — home to over 4,000 workers — along with operations in Limerick and Belfast.
The Iran-affiliated collective Handala announced via Telegram and X that it orchestrated the assault. The organization characterized the attack as payback for the bombing of the Minab girls’ school in southern Iran, where Iranian authorities report approximately 150 students were killed during the initial day of coordinated U.S.-Israeli military strikes against Iran starting February 28. Reuters has been unable to independently confirm this casualty count.
Handala asserted it destroyed data on more than 200,000 systems, servers and mobile endpoints while exfiltrating 50TB of corporate information. The group further claimed Stryker locations across 79 nations were compelled to cease operations. These particular allegations remain unverified by Stryker.
Attack Timeline and Impact
The Wall Street Journal documented that system failures commenced shortly after midnight Eastern Time Wednesday, cascading worldwide thereafter. Remote Windows-based equipment — including laptops and smartphones linked to Stryker’s infrastructure — had their data completely erased.
Cynthia Kaiser, formerly a senior FBI cyber specialist and currently with Halcyon, stated: “This is exactly the type of attack we have been worried about: Iranian proxies using destructive cyber attacks like data deletion against U.S. companies to retaliate.”
Handala maintains an established history of cyber operations. Check Point, an Israeli cybersecurity company, released research Tuesday connecting the organization to numerous hack-and-leak campaigns and destructive operations featuring data annihilation.
Gil Messing, Check Point’s Chief of Staff, identified the group as operating under Iran’s Ministry of Intelligence and labeled them “the most notorious group affiliated with the Iranian regime.” He characterized the public claim of responsibility as indicating “a new phase in Iran’s motivations.”
Government Response and Verifone Claims
White House representatives indicated the Trump administration is “proactively monitoring potential cyber threats” while maintaining coordination with critical infrastructure entities and law enforcement organizations. Neither the FBI nor CISA provided comments when contacted.
After targeting Stryker, Handala announced a subsequent attack against Verifone, an Israeli financial technology firm. Verifone rejected these allegations, confirming its investigation uncovered no signs of unauthorized access and client services remained unaffected.
Ken Sheehan, director of operations at Smarttech247, observed that phishing continues to be Handala’s primary attack vector and recommended organizations enhance cybersecurity training initiatives.
Stryker maintains a workforce of approximately 56,000 employees operating across 61 nations and generated over $25 billion in revenue during the previous year.





