Iran-Backed #Hackers Claim #WiperAttack on #Medtech Firm #Stryker

A #hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global #medical technology company based in #Michigan. News reports out of #Ireland , Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today.
#iran #security #privacy

https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

Breaking Down the Role of Cyber Operations Taken in the Iran Crisis

The report analyzes the cyber aspects of the ongoing conflict between Iran, the US, and Israel. It details a massive cyberattack launched by the US and Israel against Iran, causing widespread internet disruptions and infrastructure failures. The report also covers the activation and retooling of Iranian APT groups for retaliatory operations, targeting critical infrastructure in the US, Israel, and allied countries. Key actors include MuddyWater, Charming Kitten, OilRig, and Elfin. The analysis covers tactics, techniques, and procedures used by these groups, as well as their strategic objectives. The report also discusses the involvement of hacktivist proxies and the victimology of the attacks, affecting multiple countries and industries.

Pulse ID: 69a8500da3cf3bc380d12303
Pulse Link: https://otx.alienvault.com/pulse/69a8500da3cf3bc380d12303
Pulse Author: AlienVault
Created: 2026-03-04 15:30:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberAttack #CyberSecurity #ELF #Hacktivist #ICS #InfoSec #Iran #Israel #MuddyWater #OTX #OilRig #OpenThreatExchange #RAT #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran

A significant joint offensive by the US and Israel has triggered a multi-vector retaliatory campaign from Iran, leading to an escalation in cyberattacks. Iran's limited internet connectivity is likely hindering state-aligned threat actors' ability to coordinate sophisticated attacks. Hacktivist groups are targeting perceived adversaries, while other nation-state actors may exploit the situation. Observed activities include phishing campaigns, DDoS attacks, data exfiltration, and wiper attacks. Multiple Iranian state-aligned personas and collectives have claimed responsibility for various disruptive operations. Pro-Russian hacktivist groups have also been active, targeting Israeli systems and infrastructure. The situation remains fluid, and organizations are advised to implement multi-layered defenses and focus on foundational security hygiene.

Pulse ID: 69a68230a0f1fa4ed0ab3ac6
Pulse Link: https://otx.alienvault.com/pulse/69a68230a0f1fa4ed0ab3ac6
Pulse Author: AlienVault
Created: 2026-03-03 06:39:44

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberAttack #CyberAttacks #CyberSecurity #DDoS #DoS #Hacktivist #InfoSec #Iran #Israel #OTX #OpenThreatExchange #Phishing #RAT #RCE #Russia #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Most hacktivist groups operate in bursts. We identified NoName057(16) as an outlier: 470+ days of continuous operations. This is persistence, not activism - it's operational doctrine. #ThreatIntel #Hacktivist #DDoS
I want to kind of alternate between events in hacker history and significant people, can’t promise it will be an exact one for one but that’s sort of the idea here. After Joseph Popp I think it will either be the second patriotic Chinese #hacktivist cyberwar or another #blog on the India Pakistan #hacker conflict.
98.8% DDoS attack dominance. We tracked near-total tactical consistency via Telegram coordination - every attack announced, claimed, and documented publicly by NoName057(16). #ThreatIntel #DDoS #Hacktivist
More than half-a-million people who bought access to #phonesurveillance and #socialmediasnooping apps had their email address and partial payment card numbers published online. The #hacktivist released the data from stalkerware apps that let abusers secretly monitor victims' phones, highlighting the #privacyrisks of commercial #surveillancesoftware. https://techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/?eicker.news #tech #media #news
Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than half-a-million people who bought access to phone surveillance and social media snooping apps had their email address and partial payment card numbers published online.

TechCrunch
Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than half-a-million people who bought access to phone surveillance and social media snooping apps had their email address and partial payment card numbers published online.

TechCrunch