... and the #Handala #hacktivist #group remain highly active. Handala recently conducted a destructive attack on the medical giant #Stryker, remotely wiping 80,000 devices using Microsoft's cloud management services. #Digital #Vertigo: Experts note a rise in "epistemic vertigo," ...

Seqrite: Advisory: Middle East Conflict & Cyber Escalation

Iran’s cyber ecosystem operates through a layered structure that combines state-directed APT groups (IRGC-linked and MOIS-linked); semi-official contractors and front entities; hacktivist personas and collectives operated by intelligence services; and ideologically aligned foreign collectives operating in parallel. The Stryker Corporation attack on March 11, 2026 marked a significant escalation: a destructive wiper operation against the US, executed without malware by abusing legitimate MDM infrastructure representing a qualitative shift in Iranian operational capability and willingness to target Western corporate infrastructure.

Pulse ID: 69d3cb85f3db16d53c999e18
Pulse Link: https://otx.alienvault.com/pulse/69d3cb85f3db16d53c999e18
Pulse Author: AlienVault
Created: 2026-04-06 15:04:37

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Hacktivist #IRGC #InfoSec #Iran #Malware #MiddleEast #OTX #OpenThreatExchange #RAT #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Iran-Backed #Hackers Claim #WiperAttack on #Medtech Firm #Stryker

A #hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global #medical technology company based in #Michigan. News reports out of #Ireland , Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today.
#iran #security #privacy

https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/

Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security

Most hacktivist groups operate in bursts. We identified NoName057(16) as an outlier: 470+ days of continuous operations. This is persistence, not activism - it's operational doctrine. #ThreatIntel #Hacktivist #DDoS
I want to kind of alternate between events in hacker history and significant people, can’t promise it will be an exact one for one but that’s sort of the idea here. After Joseph Popp I think it will either be the second patriotic Chinese #hacktivist cyberwar or another #blog on the India Pakistan #hacker conflict.
98.8% DDoS attack dominance. We tracked near-total tactical consistency via Telegram coordination - every attack announced, claimed, and documented publicly by NoName057(16). #ThreatIntel #DDoS #Hacktivist
More than half-a-million people who bought access to #phonesurveillance and #socialmediasnooping apps had their email address and partial payment card numbers published online. The #hacktivist released the data from stalkerware apps that let abusers secretly monitor victims' phones, highlighting the #privacyrisks of commercial #surveillancesoftware. https://techcrunch.com/2026/02/09/hacktivist-scrapes-over-500000-stalkerware-customers-payment-records/?eicker.news #tech #media #news
Exclusive: Hacktivist scrapes over 500,000 stalkerware customers' payment records

More than half-a-million people who bought access to phone surveillance and social media snooping apps had their email address and partial payment card numbers published online.

TechCrunch