Stryker Was Wiped Through Its Own Infrastructure
This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).
On March 11, 2026, an Iran-linked group used Stryker's own Microsoft Intune admin console to remotely wipe tens of thousands of devices across 79 countries using a single compromised credential — no malware, no exploit. The attack succeeded because Stryker's infrastructure could not distinguish a legitimate admin session from
Table of contents
How Smallstep Eliminates This Attack PathDeployment SummaryWhat This Does Not FixWhat HappenedThe Operational ImpactThe Architectural FlawWhy MFA and Conditional Access Did Not Stop ThisWhere This Exists in Your Environment TodayThe Nation-State RealityWhy Customers Choose Smallstep for This Exact ProblemSort: