<div></div>
<div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{39}” paraid=”1570770248″><span xml:lang=”EN-US” data-contrast=”auto”>More than a week after the blistering March 11 cyberattack on Stryker, the Michigan-based medtech company continues to restore systems to resume normal operations.</span><span data-ccp-props=”{}”> </span></p>
</div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{79}” paraid=”51152698″><span xml:lang=”EN-US” data-contrast=”auto”>The attack, claimed by Iran-linked threat actor Handala, affected the company’s ordering, processing, shipping and manufacturing. In a post on X, Handala asserted that it wiped data from 200,000 systems, servers, laptops and mobile devices, stealing 50 TB of data and forcing offices in 79 countries to close. The post claimed, “All the acquired data is now in the hands of the free people of the world, ready to be used for the true advancement of humanity.”</span><span data-ccp-props=”{"134233117":false,"134233118":false,"201341983":0,"335551550":1,"335551620":1,"335559685":0,"335559737":0,"335559738":0,"335559739":200,"335559740":276}”> </span></p>
</div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{209}” paraid=”1201340965″><span xml:lang=”EN-US” data-contrast=”auto”>Representatives for Stryker maintained that no malware or ransomware was involved, and that the incident was contained to the company’s internal Microsoft environment. Security experts have since raised concerns about endpoint management tools such as Microsoft Intune, which was used during the attack.</span> <br><span xml:lang=”EN-US” data-contrast=”auto”></span> <br><span xml:lang=”EN-US” data-contrast=”auto”>This week’s news is proof that any organization is at risk of cyberattacks and emphasizes the need for security teams to focus not only on prevention, but also on proactive disaster recovery (DR) efforts that, in a worst-case scenario, can swiftly restore systems and help ensure business continuity.</span><span data-ccp-props=”{"134233117":false,"134233118":false,"201341983":0,"335551550":1,"335551620":1,"335559685":0,"335559737":0,"335559738":0,"335559739":200,"335559740":276}”> </span></p>
</div>
</div>
<div></div>
<div>
<div>
<h2 paraeid=”{c86edaee-b04d-4263-8d60-884c46a305f2}{122}” paraid=”1770663069″ aria-level=”2″ role=”heading”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-parastyle=”heading 2″>Stryker</span><span data-ccp-parastyle=”heading 2″>'</span><span data-ccp-parastyle=”heading 2″>s manufacturing, shipping disrupted after </span><span data-ccp-parastyle=”heading 2″>cyberattack</span></span><span data-ccp-props=”{"134245418":true,"134245529":true,"335559738":200,"335559739":0}”> </span></h2>
</div>
<div>
<p paraeid=”{c86edaee-b04d-4263-8d60-884c46a305f2}{137}” paraid=”1410636751″><span xml:lang=”EN-US” data-contrast=”auto”>The cyberattack on Stryker disrupted the company’s manufacturing and shipping operations, raising concerns about the ripple effects of such incidents on </span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searcherp/feature/5-supply-chain-cybersecurity-risks-and-best-practices”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-charstyle=”Hyperlink”>supply chains</span></span></a><span xml:lang=”EN-US” data-contrast=”auto”>. The disruption underscores the vulnerability of critical operational systems to cyberthreats and the growing risks f
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: