Medical technology giant Stryker Corporation suffered a major cyberattack on March 11, 2026, that crippled its global IT systems, wiped data from thousands of employee devices and idled tens of thousands of workers worldwide, according to company statements, employee reports and cybersecurity analysts.

Stryker Corporation
Stryker Corporation

The breach, which began overnight and affected operations across the United States, Europe and Asia, has been linked to the pro-Palestinian hacktivist group Handala, widely believed to have ties to Iran. Handala claimed responsibility on social media, describing the incident as retaliation for a recent U.S. military strike on a school in Minab, Iran, that reportedly killed around 160 people amid escalating U.S.-Iran tensions.

Stryker, headquartered in Portage, Michigan, and a leading manufacturer of medical devices including orthopedic implants, surgical equipment and hospital beds, employs approximately 56,000 people globally. The company has a significant presence in Ireland, where its Cork headquarters and facilities employ up to 5,000 workers, making the Emerald Isle one of its largest operational bases outside the U.S.

Buy New iPhone 17e Today Here

Buy New MacBook Air Today Here

Buy MacBook Neo Here Today

A Stryker spokesperson confirmed the incident in a statement to customers and media: "We are currently experiencing a global network disruption affecting the Windows environment." The company emphasized it had "no indication of ransomware or malware" in initial assessments but acknowledged the widespread outage. Stryker said it was working urgently to restore systems, with assistance from external cybersecurity experts including Microsoft engineers.

Reports from affected employees and sources familiar with the matter indicate the attack deployed destructive "wiper" malware. Unlike traditional ransomware, which encrypts files and demands payment for decryption, wiper malware permanently erases data, rendering it irrecoverable. Devices connected to Stryker's network—including laptops, cellphones and other Windows-based systems managed through Microsoft Intune—were reportedly wiped remotely. Login screens on compromised systems displayed the Handala logo, a symbol associated with the group.

The Wall Street Journal first reported the suspected Iran-linked nature of the attack, citing people familiar with the situation. Shares of Stryker (NYSE: SYK) fell about 3% to 3.4% in trading following the news, reflecting investor concerns over potential long-term impacts on operations and reputation.

Handala's claim posted on X (formerly Twitter) boasted of wiping over 200,000 systems, servers and mobile devices while extracting 50 terabytes of critical data. The group framed the operation as part of broader retaliation against perceived aggressions by the U.S. and its allies in the ongoing Middle East conflict, including cyber operations targeting the "Axis of Resistance."

Cybersecurity experts noted that while Handala has conducted previous disruptive attacks, often aligned with Iranian geopolitical interests, attribution remains challenging in the fluid world of state-sponsored and hacktivist operations. The use of wiper malware marks a particularly aggressive tactic, more commonly associated with nation-state actors seeking destruction rather than financial gain.

This incident comes amid heightened U.S.-Iran cyber tensions. Recent military actions, including joint U.S.-Israeli strikes inside Iran, have raised fears of retaliatory cyberattacks on American infrastructure and companies. Stryker's selection as a target may stem from its global footprint, its role in healthcare—a critical sector—and any perceived ties to Israel through business dealings or supply chains.

The attack disrupted normal business functions, forcing employees to stay offline and halting access to internal software, email and communications tools. In Ireland, where Stryker's Cork operations focus on manufacturing and research, thousands of workers were unable to perform duties, prompting local media to describe the incident as crippling one of the country's key multinational employers.

No immediate evidence suggests patient data or medical devices themselves were directly compromised, as the attack targeted corporate IT networks rather than product systems. Stryker maintains separate security protocols for connected medical devices, and the company has a history of issuing advisories for vulnerabilities in products like its Vocera communication systems and hospital beds.

Stryker reported the breach to Ireland's National Cyber Security Centre and is cooperating with authorities. The company has not disclosed the full scope of data loss or any potential exposure of sensitive information, though a separate data breach notification filed in late 2024—unrelated to this incident—involved unauthorized access between May and June of that year.

Analysts warn that recovery from a wiper attack could take weeks or months, as wiped systems require rebuilding from backups or clean installations. The incident highlights vulnerabilities in global supply chains and corporate networks, particularly for companies in strategic sectors like healthcare.

As investigations continue, the Stryker cyberattack serves as a stark reminder of the intersection between geopolitical conflict and cyberspace. With U.S.-Iran hostilities showing no signs of abating, experts anticipate further escalation in the digital domain.

Stryker officials have urged patience as restoration efforts proceed, assuring stakeholders that patient care and product supply remain priorities. The company has not released a timeline for full recovery.

Disclosure: This post contains affiliate links. We may receive a commission for purchases made through these links at no additional cost to you.