Back to Intelligence

Anatomy of the Stryker Attack: Defending Against Nation-State Wiper Malware

SA
Security Arsenal Team
March 11, 2026
5 min read

Anatomy of the Stryker Attack: Defending Against Nation-State Wiper Malware

In a stark reminder of the geopolitical risks facing the healthcare sector, global medical technology giant Stryker has reportedly fallen victim to a destructive cyberattack claimed by an Iran-backed hacktivist group. While many cyberattacks focus on financial extortion through ransomware, this incident highlights a more dangerous trend: state-sponsored actors aiming purely to disrupt critical infrastructure and degrade operational capabilities.

Reports indicate significant operational fallout, including the closure of major facilities in Ireland—a hub employing over 5,000 people—and a "building emergency" declared at the company's U.S. headquarters in Michigan. For security professionals, the attack on Stryker is not an isolated event but a signal flare. MedTech organizations are high-value targets where data availability is quite literally a matter of life and death.

The Nature of the Threat: Wipers vs. Ransomware

To understand the gravity of the situation, we must distinguish between the two primary types of destructive malware:

  • Ransomware: Encrypts data and holds it for ransom. The business model is financial; if you pay, you might get your data back.
  • Wiper Malware: Destroys data permanently. It overwrites files or corrupts the Master Boot Record (MBR) to render systems inoperable. There is no decryption key because the objective is disruption, not profit.

The group claiming responsibility for the Stryker incident appears to lean heavily toward the latter. This aligns with the Tactics, Techniques, and Procedures (TTPs) of nation-state actors who use "cyber deniability" to wage asymmetric warfare. By targeting a medical device manufacturer, they threaten supply chains for hospitals and surgical centers worldwide.

Technical Analysis: How Wipers Operate

Wiper malware often masquerades as legitimate software or ransomware to delay detection. Once inside the network, actors typically use "Living off the Land" (LotL) techniques—utilizing built-in administrative tools—to carry out destruction. This avoids triggering signature-based antivirus defenses that might flag custom malware executables.

Common attack vectors in these scenarios include:

  1. Initial Access: Phishing campaigns containing malicious attachments or exploitation of unpatched external-facing services (e.g., VPN vulnerabilities).
  2. Lateral Movement: Dumping credentials or exploiting vulnerabilities to move from the initial endpoint to domain controllers.
  3. Destruction Phase: Using signed binaries like diskpart or wbadmin to delete shadow copies and format drives.

Detection and Threat Hunting

Detecting a wiper attack requires speed. Since the goal is destruction, the malware acts fast. Security teams must monitor for the mass execution of administrative cleanup commands.

KQL Queries (Microsoft Sentinel/Defender)

Hunt for suspicious usage of disk management or backup deletion commands. A sudden spike in these processes across multiple endpoints is a primary indicator of a wiper.

Script / Code
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("diskpart.exe", "vssadmin.exe", "wbadmin.exe", "bcdedit.exe")
| where ProcessCommandLine contains "delete" 
   or ProcessCommandLine contains "format" 
   or ProcessCommandLine contains "shadowcopy"
| project Timestamp, DeviceName, InitiatingProcessAccountName, FileName, ProcessCommandLine
| order by Timestamp desc

Additionally, monitor for the creation of new scheduled tasks that might be used to execute the wipe at a specific time.

Script / Code
DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey contains @"\Microsoft\Windows\CurrentVersion\Run" 
   or RegistryKey contains @"\Task Cache\Tasks"
| where RegistryValueData contains ".exe" and RegistryValueData !contains "Program Files"
| project Timestamp, DeviceName, RegistryKey, RegistryValueData

PowerShell Hunting Script

You can use this PowerShell snippet to audit local systems for suspicious process execution patterns that match common wiper TTPs. This should be run in a constrained mode or via an orchestration tool like SaltStack or SCCM.

Script / Code
# Check for recent execution of destructive commands within the last 24 hours
$DestructiveProcesses = @("diskpart", "vssadmin", "wbadmin", "format", "cipher")
$StartTime = (Get-Date).AddHours(-24)

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4688; StartTime=$StartTime} -ErrorAction SilentlyContinue | 
ForEach-Object {
    $EventXml = [xml]$_.ToXml()
    $ProcessName = $EventXml.Event.EventData.Data[5].'#text'
    $CommandLine = $EventXml.Event.EventData.Data[8].'#text'
    
    foreach ($Proc in $DestructiveProcesses) {
        if ($ProcessName -like "*$Proc*" -or $CommandLine -like "*$Proc*") {
            Write-Host "ALERT: Suspicious process detected on $($_.MachineName)"
            Write-Host "Process: $ProcessName"
            Write-Host "Command: $CommandLine"
            Write-Host "Time: $($_.TimeCreated)"
        }
    }
}

Mitigation Strategies

Given the speed of wiper attacks, prevention is superior to detection. However, resilience is the ultimate goal.

  1. Immutable Backups: Implement offline or immutable backups (WORM storage). If a wiper encrypts or deletes production data, an immutable backup ensures you can restore without paying a ransom or losing data permanently.

  2. Disable Unnecessary Administrative Tools: Use Application Control (AppLocker) or Windows Defender Application Control (WDAC) to block specific binaries like diskpart.exe or cipher.exe for standard users. Only allow execution from signed directories or for specific admin accounts.

  3. Network Segmentation: Ensure your OT (Operational Technology) and manufacturing floors are logically separated from the IT network. A wiper starting in the HR department should not be able to reach the production line controlling medical device assembly.

  4. Phishing Resistance: Since initial access often comes via email, implement robust email filtering and conduct regular security awareness training specifically focused on identifying state-sponsored social engineering.

Conclusion

The alleged attack on Stryker by Iran-linked actors serves as a wake-up call for the healthcare and MedTech sectors. We are no longer just defending against opportunistic cybercriminals; we are in the crosshairs of nation-state threats. By understanding the TTPs of wiper malware and implementing strict detection logic and recovery protocols, organizations can safeguard their operations against even the most aggressive adversaries.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarewiper-malwarehealthcare-securityaptnation-statestryker

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.