Cyberattack
Search documents
Stryker Cyberattack Highlights Criminal Focus on Enterprise Systems
PYMNTS.com· 2026-03-23 21:59
Cyberattackers, increasingly state-linked criminal groups, are not merely extracting information. They are orchestrating multifaceted campaigns designed to disrupt operations, extract leverage, and erode competitive advantage.By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions .Complete the form to unlock this article and enjoy unlimited free a ...
X @BSCN
BSCN· 2026-03-18 07:41
🚨JUST IN: CRYPTO PAYMENTS FIRM BITREFILL HIT BY MAJOR LAZARUS-SUSPECTED CYBERATTACKCrypto payments firm, Bitrefill, has disclosed a security breach impacting its systems and wallets.The attack shows similarities to past Lazarus-linked operations.The attack began through a compromised employee laptop. Hackers gained access using stolen legacy credentials. This allowed entry into production systems and sensitive data. Parts of the database and crypto wallets were accessed.On-chain tracing flagged suspicious w ...
X @Wu Blockchain
Wu Blockchain· 2026-03-18 05:48
Crypto payments platform Bitrefill disclosed that it suffered a cyberattack on March 1, 2026, suspected to be linked to the North Korean Lazarus Group / Bluenoroff. The breach originated from a compromised employee device and leaked credentials, allowing attackers to access parts of its database and hot wallets and transfer funds. About 18,500 order records were accessed, involving email addresses and crypto addresses. Bitrefill stated that it does not store full KYC data, operations have largely resumed, a ...
X @Cointelegraph
Cointelegraph· 2026-03-18 01:00
🚨 NEW: Bitrefill reveals it was hit by a cyberattack on March 1 linked to Lazarus Group, with attackers draining crypto wallets and accessing 18,500 purchase records. https://t.co/jEsXyJrR3S ...
Stryker says cyberattack on its network contained
Reuters· 2026-03-17 11:40
Core Viewpoint - Stryker has contained a cyberattack that disrupted its operations, focusing on restoring systems that support customer orders and shipping [1][2]. Group 1: Cyberattack Details - The cyberattack occurred on March 11 and affected Stryker's order processing, manufacturing, and shipments [2]. - The attack was claimed by an Iran-linked hacking group named Handala, citing retaliation for a strike on a girls' school in Iran [2]. - Devices impacted included cellphones, laptops, and other remote devices running Microsoft's Windows operating system [3]. Group 2: Operational Impact - Stryker reported that no patient-related services or connected medical products were affected by the cyberattack [3]. - The company has not disclosed the financial impact of the attack [3]. Group 3: Response and Coordination - Stryker is coordinating with relevant authorities and external cybersecurity experts as part of its investigation into the incident [4]. - The company employs 56,000 staff and operates in 61 countries, indicating a significant global presence [4].
The Stryker Attack: Enterprise Resiliency Plans Can’t Ignore UEM
Forrester· 2026-03-13 14:18
On March 11, media reports indicated that an Iranian-linked hacktivist organization, Handala, claimed to have successfully attacked Stryker Corporation, a Fortune 500 medical device manufacturer. The group also claims to have wiped 200,000 systems and stolen 50 terabytes of data. Unnamed employees on social media said there were widespread network outages and that any user who had Microsoft Office on their personal phones had their devices wiped. In addition, Stryker released a message publicly to customers ...
One Reddit Post Sent Stryker Down 9% But the Fundamentals Tell a Different Story
247Wallst· 2026-03-13 08:32
Core Viewpoint - Stryker's stock experienced a 9.46% decline due to a viral Reddit post about a cyberattack, but the company's strong fundamentals indicate resilience and growth potential [1] Financial Performance - Stryker reported $25 billion in annual revenue, achieving an 11.4% growth in Q4 2025 [1] - The company beat earnings estimates in all four quarters of 2025 and expanded adjusted operating margins by at least 100 basis points for the second consecutive year [1] - Free cash flow increased to $4.28 billion, reflecting a 23% year-over-year growth [1] Market Sentiment - The bearish sentiment on Reddit was driven by a single post regarding a cyberattack, which is not indicative of Stryker's overall business health [1] - Analyst consensus remains positive, with a price target of $424.89 compared to the current price of $337, supported by 22 buy or strong buy ratings and no sell ratings [1] - Engagement on Reddit regarding Stryker is classified as "low," indicating minimal retail investor interest [1] Future Outlook - CEO Kevin Lobo expressed confidence in entering 2026 with "significant momentum," projecting organic growth of 8% to 9.5% and adjusted EPS of $14.90 to $15.10 for the full year [1] - The Mako robotic surgery platform set installation records in Q4, and the Inari Medical acquisition contributed to a 58.1% year-over-year growth in the Vascular segment [1]
Stryker flags disruption to orders, manufacturing a day after cyberattack
Reuters· 2026-03-12 21:59
Core Viewpoint - Stryker Corporation is experiencing significant disruptions to its business operations due to a cyberattack that affected its computer systems, impacting order processing, manufacturing, and shipping capabilities [1]. Group 1: Cyberattack Details - The cyberattack was claimed by an Iranian-linked hacking group named Handala, which stated the attack was in retaliation for a strike on a girls' school in Iran, resulting in an estimated 150 student fatalities according to Iranian officials [1]. - Stryker first reported the disruption on March 11, indicating a global impact on its Microsoft environment [1]. Group 2: Business Impact - The attack has led to widespread operational disruptions, but Stryker confirmed that patient-related services and connected medical products remain unaffected [1]. - The full scale and financial impact of the cyberattack are still under investigation by the company [1]. Group 3: Company Overview - Stryker employs approximately 56,000 individuals and operates in 61 countries worldwide [1].
Tech Stocks Under Pressure As Iran War Drags On | Bloomberg Tech 3/12/2026
Bloomberg Technology· 2026-03-12 20:39
>> "BLOOMBERG TECH" IS LIVE FROM COAST TO COAST. WITH CAROLINE HYDE IN NEW YORK AND ED LUDLOW. ED: NEW DETAILS EMERGE ON APPLE’S ENTRY INTO THE FOLDABLE PHONE CATEGORY. CAROLINE: WE TURN OUR ATTENTION TO GLOBAL ANGST TO A CONFLICT IN THE MIDDLE EAST AND, OF COURSE, THE MARKET RAMIFICATIONS. WE UNDERSTAND FROM BLOOMBERG REPORTING THIS HAS COST MORE THAN 1 BILLION IN THE FIRST WEEK OF THE CONFLICT, BUT THE HUMAN COST, PRICELESS. WE CURRENTLY SEE AT THE MOMENT, THE NASDAQ OFF BY 1.5%. HIGHER STOCKS DRIVE LOWER ...
Cyberattack hits Stryker; pro-Iran group claims credit
BusinessLine· 2026-03-12 10:09
Core Insights - A cyberattack against Stryker Corp has severely disrupted the company's global operations, marking a significant incident in the context of US-Iran tensions [1][6] - The attack has led to many employees being unable to work, with reports of data loss on devices and a significant impact on the company's network [2][8] Company Operations - Stryker manufactures a diverse range of medical devices, focusing on orthopedics, surgical tools, neurotechnology, and spinal products, with a presence in over 61 countries [5] - The company generates approximately $25 billion in annual revenue and has a market valuation of around $131 billion [6] Cyberattack Details - The attack was claimed by the pro-Iranian group Handala, which described it as retaliation for US actions against Iran, and threatened further cyber warfare [6][10] - The incident resulted in the wiping of over 200,000 systems and the extraction of 50 terabytes of data, although these claims have not been independently verified [9] Employee Impact - Many Stryker employees were sent home and advised against connecting to company networks, with reports indicating that up to 95% of devices in some offices were wiped [2][8] - The company has stated that it is working to understand the impact of the attack and has business continuity measures in place to support customers [4]