On the morning of March 11, he left one of the major health sector companies with major interruptions: thousands of cloud-managed equipment were remotely deleted and, according to statements from the group that claimed the attack, terabytes of information were removed. What differentiates this incident from other malware attacks is that the aggressors did not need to deploy a worm or a ansomware on each machine; they took advantage of the administrative capabilities of a cloud endpoint management tool to run a massive erasing.
The tool in question is Microsoft Intune, a service that many organizations use to control and protect corporate devices. Intune includes legitimate and powerful functions, such as the possibility of remote removal of data from a computer to protect assets when a device is lost or stolen. But that same capacity can become a vector of damage if an attacker achieves administrative privileges. On what has happened in Stryker, specialized means have been reported; an analysis of the chronology and techniques used can be found at BleepingComputer.

Following the incident, the United States Infrastructure and Cybersecurity Agency issued a notice urging organizations of all kinds to strengthen their endpoints management systems. In this statement the agency recommends measures of hardening that go beyond a single product: it is about applying administrative safety principles to reduce the attack surface and contain the impact if an account is compromised. The CISA text is available at public alert.
Microsoft, for its part, published specific guidance to protect Intune environments and better control who can make critical actions from the cloud. Its recommendations underline the need to move from relying on "reliable" managers to designing a safe administration from the beginning: to minimize privileges, to verify identity with modern controls and to require approvals for sensitive operations. Microsoft's official guidelines for strengthening Intune can be found on its technical blog at Tech Community, and the documentation on the remote deletion function is in the Intune documentation in Microsoft Learn.
What practical lessons does this incident leave? First, role and permit management must follow the principle of less privilege: not all managers need global access. Implementing role-based access controls and avoiding accounts with excessive permits reduces an attacker's ability to cause mass damage only with a compromised account. Secondly, the protection of privileged accounts must be much more demanding: multifactor authentication, conditional access policies that evaluate the login context and temporary privileged access mechanisms (just-in- time) are layers that complicate the work of those who try to raise or usurp privileges.
It is also crucial to establish administrative barriers for operations that may have the greatest impact: erasing actions, changes in role policies or global updates should be subject to double approval mechanisms or control flows involving several responsible actors. In parallel, telemetry, audit records and real-time alerts allow for early detection of side movements or creation of suspicious accounts; without adequate telemetry, an intruder can create an administrator and act without being seen.
The actor who claimed the intrusion, known as Handala or with other aliases, is described by analysts as a hacktivist group with links to Iranian state structures and with a history of using draft malware in previous campaigns. Research and context reports on this group and its recent operations can be found in the analysis of Palo Alto Networks Unit 42 his report on Iranian attacks in 2026. The pattern that Handala shows - exfiltration followed by disfiguration or data erasing - is especially dangerous for critical organizations where the availability and integrity of information are vital.

Beyond the adversary's technique and tactics, there is an organizational dimension that deserves attention: recovery tests and contingency plans. Having a system that allows remote deletion does not replace robust support policies, network segmentation and verifiable recovery procedures. Test commitment scenarios, regularly review permissions and have protected break-glass accounts are practices that help to recover operations at lower cost when something fails.
The message of authorities and manufacturers is clear and urgent: powerful tools in legitimate hands facilitate management, but in the hands of a privileged attacker can create a massive cessation of operations. For this reason, in addition to implementing the recommendations published by Microsoft and CISA, it is appropriate for security teams to review their configurations, audit recent accesses and raise additional controls for critical actions. Cloud security is both technical and process; the combination of both is the one that actually reduces the risk.
If your organization uses Intune or any endpoints management platform, it is recommended to review the above-mentioned guides, verify roles and authentication, and coordinate with the area of risk and continuity to ensure that there is recovery capacity. To consult the official sources will give you a solid reference to prioritize measures: Microsoft guide, CISA alert and the technical reports on the actor behind the attack as the Unit 42 are good starting points to understand the scope and apply effective defenses.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...