BreachesHIGH

Stryker Cyberattack - Digital Ordering Systems Still Down

TRThe Record
🎯

Basically, a cyberattack wiped Stryker's devices, but their hospital tools are still safe.

Quick Summary

Stryker's electronic ordering systems remain offline after a cyberattack. Thousands of devices were wiped, but hospital tools are safe for use. The incident highlights cybersecurity risks in healthcare.

What Happened

A cyberattack has severely impacted Stryker, a major medical device company. Electronic ordering systems have been down for over a week, causing significant disruptions. The attack is believed to have wiped thousands of devices clean of all information. This incident has led to factory closures and operational challenges across multiple countries.

Stryker has reassured customers that their connected digital products are safe for use. The company has implemented manual ordering methods to ensure that supplies continue to reach healthcare facilities. They are working diligently to restore their electronic systems, although no timeline has been provided for full recovery.

Who's Affected

The attack has affected Stryker's internal operations, impacting their ability to process orders electronically. Hospitals relying on Stryker's products for surgical procedures and emergency medical equipment are also indirectly affected. However, Stryker has confirmed that their hospital tools, such as connected beds and surgical visualization platforms, remain operational and safe.

The company’s focus is on restoring systems that handle ordering, shipping, and customer support, which are critical for maintaining supply chains in healthcare settings. The disruption has raised concerns among healthcare providers about the reliability of their supply chain during this period.

What Data Was Exposed

While the details of the attack are still unfolding, it is reported that the cyberattack involved the compromise of high-level administrative accounts. This allowed attackers to exploit Microsoft Intune, a device management tool used by Stryker, to wipe devices clean. Cisco Talos, a cybersecurity firm, indicated that this technique, known as living-off-the-land (LOTL), enabled the attackers to cause widespread destruction without traditional malware.

Stryker has stated that no ransomware or malware was involved in this incident. The attackers, identified as the Iranian-aligned group Handala, claimed responsibility, stating their motives were linked to Stryker's contracts with the U.S. Defense Department. The full extent of the data loss and the impact on company operations is still being assessed.

What You Should Do

For healthcare facilities using Stryker products, it is crucial to stay informed about the status of electronic ordering systems. Stryker is coordinating directly with customers to manage orders manually during this downtime. It is advisable for healthcare providers to establish contingency plans for supply chain disruptions.

Additionally, organizations should review their cybersecurity protocols, especially regarding device management systems like Microsoft Intune. Ensuring that administrative access is tightly controlled can help prevent similar incidents in the future. Regular training and awareness programs for employees about cybersecurity threats are also essential to safeguard sensitive information and maintain operational integrity.

🔒 Pro insight: Analysis pending for this article.

Original article from

The Record

Read Full Article

Related Pings

HIGHBreaches

Telus Digital Hack - ShinyHunters Claims Responsibility

Telus Digital has confirmed a data breach, with ShinyHunters claiming responsibility. Major businesses relying on their services may be at risk, facing potential data exposure and reputational damage. The investigation is ongoing, leaving many questions unanswered.

Cybersecurity Dive·
HIGHBreaches

Oracle EBS Hack - Corporate Giants Silent on Impact

A recent hacking campaign against Oracle EBS has left four major companies silent. Broadcom, Bechtel, Estée Lauder, and Abbott Technologies have not confirmed their status. This silence raises concerns about potential data breaches and impacts on stakeholders. Companies typically acknowledge such incidents, making their lack of response alarming.

SecurityWeek·
HIGHBreaches

Data Breach - Intuitive Surgical Cyberattack Exposed Data

Intuitive Surgical faced a cyberattack that compromised sensitive employee and customer data. This breach raises serious concerns about data security. Affected individuals should remain vigilant.

Cybersecurity Dive·
HIGHBreaches

Data Breach - UK's Corporate Registry Flaw Exposed Records

A serious security flaw in the UK's corporate registry exposed sensitive data of company directors. This breach raises concerns about data protection and trust in government services. Companies House has taken action to address the issue and is investigating potential misuse.

The Register Security·
HIGHBreaches

Companies House Breach - Web Glitch Exposes Corporate Data

A serious flaw in the Companies House website has exposed sensitive corporate data, putting millions at risk. This breach allows fraudsters to access personal information, raising significant security concerns. Companies must now verify their registration data to ensure no unauthorized changes have occurred.

Infosecurity Magazine·
HIGHBreaches

Telus Data Breach - ShinyHunters May Have Stolen Data

Telus has confirmed a major cyberattack, possibly losing a petabyte of data to hackers. This breach poses serious risks to customers and partners. Immediate action is crucial to protect sensitive information.

The Register Security·