News brief: Stryker recovering after large-scale cyberattack

<div></div>
<div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{39}” paraid=”1570770248″><span xml:lang=”EN-US” data-contrast=”auto”>More than a week after the blistering&nbsp;March 11&nbsp;cyberattack&nbsp;on Stryker,&nbsp;the&nbsp;Michigan-based&nbsp;medtech&nbsp;company continues&nbsp;to restore systems&nbsp;to&nbsp;resume&nbsp;normal operations.</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{79}” paraid=”51152698″><span xml:lang=”EN-US” data-contrast=”auto”>The attack,&nbsp;claimed by Iran-linked threat actor&nbsp;Handala,&nbsp;affected&nbsp;the company’s&nbsp;ordering, processing,&nbsp;shipping&nbsp;and&nbsp;manufacturing.&nbsp;In a post on X,&nbsp;Handala&nbsp;asserted&nbsp;that it&nbsp;wiped&nbsp;data&nbsp;from&nbsp;200,000&nbsp;systems,&nbsp;servers,&nbsp;laptops&nbsp;and mobile devices, stealing&nbsp;50&nbsp;TB&nbsp;of data&nbsp;and forcing offices&nbsp;in 79 countries to close.&nbsp;The post&nbsp;claimed, “All the acquired data is now in the hands of the free people of the world, ready to be used for the true advancement of humanity.”</span><span data-ccp-props=”{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}”>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{82bb4c45-7afe-4e77-8131-35bf588a6ef6}{209}” paraid=”1201340965″><span xml:lang=”EN-US” data-contrast=”auto”>Representatives for Stryker&nbsp;maintained&nbsp;that&nbsp;no&nbsp;malware&nbsp;or&nbsp;ransomware&nbsp;was involved,&nbsp;and&nbsp;that&nbsp;the incident was contained&nbsp;to&nbsp;the company’s&nbsp;internal Microsoft environment.&nbsp;Security&nbsp;experts&nbsp;have&nbsp;since&nbsp;raised concerns&nbsp;about&nbsp;endpoint management&nbsp;tools such&nbsp;as&nbsp;Microsoft Intune,&nbsp;which&nbsp;was&nbsp;used during the&nbsp;attack.</span>&nbsp;<br><span xml:lang=”EN-US” data-contrast=”auto”></span>&nbsp;<br><span xml:lang=”EN-US” data-contrast=”auto”>This week’s news is proof that any organization is at risk of cyberattacks and emphasizes the need for security teams to focus not only on prevention, but also on proactive disaster recovery (DR) efforts that, in a worst-case scenario, can swiftly restore systems and help ensure business continuity.</span><span data-ccp-props=”{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}”>&nbsp;</span></p>
</div>
</div>
<div></div>
<div>
<div>
<h2 paraeid=”{c86edaee-b04d-4263-8d60-884c46a305f2}{122}” paraid=”1770663069″ aria-level=”2″ role=”heading”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-parastyle=”heading 2″>Stryker</span><span data-ccp-parastyle=”heading 2″>'</span><span data-ccp-parastyle=”heading 2″>s manufacturing, shipping disrupted after&nbsp;</span><span data-ccp-parastyle=”heading 2″>cyberattack</span></span><span data-ccp-props=”{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:200,&quot;335559739&quot;:0}”>&nbsp;</span></h2>
</div>
<div>
<p paraeid=”{c86edaee-b04d-4263-8d60-884c46a305f2}{137}” paraid=”1410636751″><span xml:lang=”EN-US” data-contrast=”auto”>The&nbsp;cyberattack on Stryker disrupted the&nbsp;company’s manufacturing and shipping operations, raising concerns about the ripple effects of such incidents on&nbsp;</span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searcherp/feature/5-supply-chain-cybersecurity-risks-and-best-practices”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-charstyle=”Hyperlink”>supply chains</span></span></a><span xml:lang=”EN-US” data-contrast=”auto”>.&nbsp;The disruption underscores the vulnerability of critical operational systems to cyberthreats&nbsp;and&nbsp;the growing risks f

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: