CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Microsoft Intune administrative control weaknesses exploited in Stryker breach leading to mass device wipes

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A pro-Palestinian hacktivist group named Handala (also tracked as Handala Hack Team, Hatef, or Hamsa) compromised Microsoft Intune administrative controls at Stryker Corporation, a U.S.-based medical technology firm, on March 11, 2026. The attackers created a new Global Administrator account after breaching an existing administrator credential, stole approximately 50 terabytes of data, and executed device wipes across nearly 80,000 systems via Intune’s built-in wipe command. The incident follows Microsoft’s hardening guidance for Intune published days after the breach, which CISA subsequently mandated for all U.S. organizations to mitigate similar risks. The attack highlights the risks of excessive administrative privileges and insufficient privileged access hygiene in cloud-based endpoint management platforms.

Timeline

  1. 19.03.2026 13:02 1 articles · 2h ago

    Stryker breach via Microsoft Intune leads to mass device wipes and prompts CISA hardening advisory

    On March 11, 2026, Handala compromised Stryker Corporation’s Microsoft Intune environment, creating a Global Administrator account after breaching an existing admin credential. The attackers exfiltrated approximately 50 terabytes of data and executed a mass device wipe affecting nearly 80,000 systems. Microsoft issued hardening guidance for Intune days after the incident, and CISA responded with an advisory requiring U.S. organizations to implement least-privilege access, MFA, privileged access hygiene, and multi-admin approval for sensitive actions such as device wipes and RBAC changes.

    Show sources

Information Snippets