Back to Intelligence

Defending Against Destructive Wiper Attacks: Lessons from the Stryker Incident

SA
Security Arsenal Team
March 22, 2026
6 min read

Introduction

The recent cyberattack on Stryker, a leading global medical technology company, highlights a chilling evolution in threat actor motivations. Unlike traditional financially motivated ransomware, a hacktivist group linked to Iran's intelligence agencies has claimed responsibility for a destructive "wiper" attack. This incident, which forced the company to send 5,000 workers home and declare a building emergency at its U.S. headquarters, underscores a critical reality for defenders: state-sponsored actors are increasingly targeting critical infrastructure and healthcare not for profit, but for disruption.

For IT and security teams, this serves as a stark reminder that availability is just as critical as confidentiality. When attackers aim to destroy data rather than exfiltrate it, traditional backup strategies alone may not suffice. This post analyzes the mechanics of such attacks and provides actionable defensive measures to protect your organization.

Technical Analysis

The Threat Vector: The attack on Stryker involves "wiper" malware. Unlike ransomware, which encrypts data and demands a payment for the decryption key, wiper malware is designed to permanently destroy data and render systems inoperable. This is often achieved by overwriting the Master Boot Record (MBR), deleting files, or corrupting the file system structures. In many cases, wipers are disguised as ransomware to confuse incident responders and delay recovery efforts.

The Actor: The attribution to an Iran-backed hacktivist group aligns with the trend of "pseudo-ransomware" or politically motivated destruction. These groups often leverage common vulnerabilities to gain initial access before deploying custom wiper tools. The attack targeted Stryker's operational base in Ireland—their largest hub outside the U.S.—suggesting a deliberate focus on disrupting business continuity on a global scale.

Severity & Impact: The severity of a waper attack is catastrophic. In a healthcare context, the unavailability of systems supporting medical technology or patient records can directly impact patient safety. The "building emergency" reported by Stryker suggests the attack may have extended beyond IT systems to affect building management systems (BMS) or physical safety controls, demonstrating the convergence of IT and OT security risks.

Defensive Monitoring

Detecting a wiper attack early is difficult because the malware often acts immediately upon execution. However, there are precursors and indicators of compromise (IoCs) that security teams can monitor. Wipers almost always attempt to delete backup snapshots (Volume Shadow Copies) and clear event logs to hide their tracks.

Microsoft Sentinel / Defender KQL Queries

Use the following KQL queries to detect common waper behaviors, such as the deletion of shadow copies or the use of disk wiping utilities.

Script / Code
// Detection: Potential Wiper Activity (Shadow Copy Deletion)
DeviceProcessEvents  
| where Timestamp > ago(24h)  
| where ProcessCommandLine has "vssadmin" and (ProcessCommandLine has "delete shadows" or ProcessCommandLine has "resize shadowstorage")  
| project DeviceName, InitiatingProcessAccountName, ProcessCommandLine, Timestamp  
| order by Timestamp desc


// Detection: Clearing Event Logs (Common in Wipers to hide forensics)
DeviceProcessEvents  
| where Timestamp > ago(24h)  
| where ProcessCommandLine has "wevtutil" and ProcessCommandLine has "cl"  
| project DeviceName, InitiatingProcessAccountName, ProcessCommandLine, Timestamp  
| order by Timestamp desc


// Detection: Suspicious File Deletion Patterns (Mass file deletion)
DeviceFileEvents  
| where Timestamp > ago(1h)  
| where ActionType == "FileDeleted"  
| summarize count() by DeviceName, bin(Timestamp, 5m)  
| where count_ > 100  
| join kind=inner (DeviceFileEvents | where ActionType == "FileDeleted") on DeviceName  
| project Timestamp, DeviceName, FileName, InitiatingProcessAccountName


**PowerShell Verification Script**

Run this script on critical servers to verify that Volume Shadow Copy Service (VSS) is operational and that no recent mass deletions have occurred.

Script / Code
# Check VSS Health and Recent Wiper Indicators
Write-Host "Checking VSS Writer Status..." -ForegroundColor Cyan
$vssWriters = vssadmin list writers
if ($vssWriters -match "State:.*Error") {
    Write-Host "WARNING: VSS Writers are in an error state." -ForegroundColor Red
} else {
    Write-Host "VSS Writers appear healthy." -ForegroundColor Green
}

Write-Host "\nChecking for recently deleted Shadow Copies..." -ForegroundColor Cyan
$shadows = vssadmin list shadows
if ($shadows -eq "No shadow copies found.") {
    Write-Host "WARNING: No shadow copies exist on this system." -ForegroundColor Yellow
} else {
    Write-Host "Shadow copies found." -ForegroundColor Green
}

Write-Host "\nChecking for suspicious process terminations (common in wipers)..." -ForegroundColor Cyan
$events = Get-WinLog -LogName Security -FilterXPath "*[System[(EventID=4663 or EventID=4660)]]" -MaxEvents 50 -ErrorAction SilentlyContinue
if ($events) {
    Write-Host "Recent object deletion events found in Security Log." -ForegroundColor Yellow
} else {
    Write-Host "No critical object deletion events found recently." -ForegroundColor Green
}

Remediation

Defending against waper attacks requires a shift in mindset from "prevention and recovery" to "resilience and continuity." If an attacker intends to destroy data, your primary goal is to ensure they cannot destroy your only copy of the data.

1. Implement Immutable Backups: The most effective defense against wapers is an immutable backup strategy. Ensure you have offline backups (tape or air-gapped disk) that cannot be accessed or modified by compromised systems. Cloud backups should utilize object lock (WORM - Write Once Read Many) functionality to prevent data deletion for a set retention period.

2. Enforce Network Segmentation: Limit the ability of malware to spread laterally. Critical medical and operational systems should be isolated from administrative networks and the public internet. Ensure that protocols like SMB and RDP are not accessible from the internet.

3. Harden Endpoints and Disable Unused Utilities: Wipers often leverage native administrative tools like vssadmin, diskpart, and wmic. Restrict access to these tools via Group Policy or Application Control solutions (such as AppLocker) so that only authorized admin accounts can execute them.

4. Develop a "No-Trust" Recovery Plan: Assume that the attacker may have compromised your recovery tools. Your Incident Response (IR) plan should include procedures for rebuilding systems from known-good "gold" images on clean hardware rather than attempting to "clean" infected machines. Verify the integrity of backups before restoring them to ensure the attacker did not plant a dormant time bomb.

5. Continuously Test Tabletop Exercises: Given the physical disruption seen at Stryker (building emergency), your IR plan must include communication protocols for physical safety and workforce management, not just IT recovery. Conduct regular drills that simulate a complete operational blackout.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwarewiper-attackshealthcare-securitythreat-intelligenceincident-responsedata-protection

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.