Newly uncovered evidence suggests that the recent cyberattack targeting US medical technology giant Stryker involved compromised credentials obtained via infostealer malware.
The attack on Stryker, a major manufacturer of surgical equipment and orthopedic implants for hospitals worldwide, came to light on March 11, with the Iran-linked hacker group Handala immediately taking credit.
Handala, which is believed to be an anti-Israel hacktivist persona under the control of Iran’s Ministry of Intelligence and Security (MOIS), claimed to have wiped more than 200,000 devices, forcing Stryker to shut down offices in dozens of countries. The hackers also claimed to have stolen a significant amount of data.
While some early reports indicated that the hackers used wiper malware in the attack — Handala has been known to use such malware — Stryker said it found no evidence of malware being deployed on its systems.
According to some reports, the attackers wiped systems by abusing Stryker’s Microsoft Intune instance, which is used to remotely manage desktop and mobile endpoints and applications within the organization.
Bleeping Computer reported earlier this week that the attackers compromised an Intune administrator account and created a new global admin account, which they used to wipe managed devices.
Alon Gal, CTO of threat intelligence firm Hudson Rock, has now found evidence that the compromised credentials may have been obtained by information-stealer malware.
An analysis of infostealer malware logs, which contain information stolen by such malware, revealed that credentials for Stryker administrator accounts were harvested, alongside dozens of other Microsoft service credentials and mobile device management (MDM) credentials associated with the medtech company.
“Handala really aren’t sophisticated and likely just used infostealer logs for the Stryker breach,” Gal explained in a LinkedIn post.
“Most of these creds are months if not years old, which would have given Stryker more than enough time to reset and avoid a breach,” he added.
Stryker said the cybersecurity incident only impacted its Windows environment, but admitted that it has caused disruptions to order processing, manufacturing, and shipping.
In its latest update, shared on March 15, the company said it has been restoring impacted systems, with a focus on those supporting customers, ordering, and shipping.
Stryker said all its products are safe to use, and the presence of its sales representatives in hospitals and facilities does not pose a risk.
Nextgov/FCW reported that the cybersecurity agency CISA and the FBI have engaged with Stryker executives amid the investigation into the incident.
While pro-Iran hackers have ramped up attacks against Israel, the US, and other allies after the war began, this appears to be the most significant attack against the United States.
Handala has been highly active since the start of the conflict, particularly against Israel, claiming to have hacked a wide range of organizations. However, its claims are often difficult to fully verify.
Forbes reported on Tuesday that two leaders of Iranian cyber operations have been killed in the recent airstrikes. One of them is Mohammad Mehdi Farhadi Ramin, charged by the US in 2020 for his role in state-sponsored hacking, and Yahya Hosseiny Panjaki, who oversaw the MOIS unit that controlled hacker groups such as Handala.
Related: Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War
Related: Threat Actor Targeting VPN Users in New Credential Theft Campaign
Related: ForceMemo: Python Repositories Compromised in GlassWorm Aftermath
