Stock Markets March 11, 2026

Iran-linked Group Claims Responsibility for Cyberattack That Disrupted Stryker Systems

Michigan-based medical device maker reports system outages after group identifying as Handala says it targeted the company in retaliation for strikes in Iran

By Nina Shah SYK
Iran-linked Group Claims Responsibility for Cyberattack That Disrupted Stryker Systems
SYK

An Iranian-linked hacking persona called Handala said it was behind a disruptive cyberattack that affected Stryker, a U.S.-based medical device and services company. Stryker reported interruptions and restricted access to some systems in an SEC filing, and staff reported that the group’s logo appeared on login pages. The company says there is no indication of ransomware or malware and that the incident is contained, while investigations and responses by federal agencies are ongoing or pending comment.

Key Points

  • An Iran-linked persona identifying as Handala claimed responsibility for a cyberattack that disrupted Stryker’s systems; the group said the action was in response to a strike on a school in Minab and other ongoing cyber assaults.
  • Stryker reported to the SEC that the attack caused disruptions and limited access to some systems; the company noted that a timeline for full restoration is not yet known and said it had no indication of ransomware or malware and believes the incident is contained.
  • Market and security repercussions include a 3.6% drop in Stryker shares and concerns about destructive cyberattacks affecting healthcare operations and broader critical infrastructure.

An Iran-linked hacking persona publicly claimed responsibility on Wednesday for a cyber operation that caused disruptions at Stryker, a Michigan-headquartered medical device and services company, according to messages posted to the group’s Telegram channel.

Stryker, which employs about 56,000 people and operates in 61 countries, disclosed in a filing with the Securities and Exchange Commission that the intrusion led to disruptions and limited access to certain systems. The company said in the filing that it does not yet know when full restoration of affected systems will be completed.

Employees and contractors posted to social media that a logo associated with an Iran-linked hacking group had appeared on some Stryker login pages; those social media posts have not been independently verified. When reached for comment, a Stryker spokesperson said: "We have no indication of ransomware or malware and believe the incident is contained," and declined to comment on attribution.

Calls to Stryker’s global headquarters in Portage, Michigan, were answered with a recorded message stating the company was "currently experiencing a building emergency." On the market, Stryker shares closed down 3.6% on Wednesday.


Security researchers and industry observers have voiced broader concerns about potential retaliatory cyber operations tied to geopolitical escalations. There are rising fears that Iran, which possesses sophisticated cyber capabilities, could target U.S. or Israeli entities following airstrikes directed at Iran.

"This is exactly the type of attack we have been worried about: Iranian proxies using destructive cyber attacks like data deletion against U.S. companies to retaliate," said Cynthia Kaiser, senior vice president of Halcyon’s Ransomware Research Center and a former senior FBI cyber official.

The persona that claimed responsibility, using the name Handala, has previously asserted responsibility for multiple attacks on targets in Israel and elsewhere. In its Telegram post regarding the Stryker incident, Handala said the operation was in response to a strike on a girls’ school in Minab in southern Iran "and ongoing cyber assaults." The group did not reply to a request for comment sent to one of its messaging accounts.

Iran’s ambassador to the United Nations in Geneva, Ali Bahreini, told U.N. officials that the Minab girls’ school was hit on the first day of U.S.-Israeli attacks on Iran and that an estimated 150 students were killed. That casualty figure has not been independently verified.


Reports indicate that outages on Stryker’s network began shortly after midnight on Wednesday on the U.S. East Coast, according to the Wall Street Journal, which cited people familiar with the matter. Employees discovered that remote devices using Microsoft Windows - including mobile phones and laptops configured to connect to Stryker’s technology systems - had been wiped.

A White House official was quoted saying: "(The) Trump administration is always proactively monitoring potential cyber threats and driving a response with our world-class critical infrastructure, regulator agencies and law enforcement entities." The Federal Bureau of Investigation and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency did not respond to requests for comment.

Cybersecurity firm Check Point reported that Handala has been linked to multiple hack-and-leak operations and disruptive attacks, including incidents in which data was destroyed. In a statement, Check Point’s Chief of Staff Gil Messing said the group is "the most notorious group affiliated with the Iranian regime" and that his firm has tracked the persona for years, concluding that the group operates under Iran’s Ministry of Intelligence. Messing added that the group’s public claim of responsibility and apparent acceptance of government linkage suggest a shift in the group’s motivations.


In addition to operational developments, readers were directed to a market-oriented assessment of Stryker’s stock. An AI-driven service, ProPicks, was described as evaluating Stryker’s ticker SYK among thousands of companies monthly using more than 100 financial metrics. The service was presented as an automated tool that generates stock ideas by assessing fundamentals, momentum, and valuation, and it cited past performance examples for other stocks. The service offered readers the option to check whether SYK appears in its strategies or whether alternative opportunities exist in the same sector.

Investigations into the incident and its full scope remain ongoing. Stryker’s SEC filing confirms disruption to systems and limited access, but the company and federal agencies have not yet provided a public, comprehensive timeline for remediation or detailed findings on the method of intrusion.

Given the information available, assessments of the incident’s ultimate operational and financial impact on Stryker will depend on further disclosures from the company and statements from investigative authorities.

Risks

  • Operational risk to healthcare services and supply chains stemming from prolonged system outages at a major medical device provider - this may affect hospital procurement and device servicing.
  • Geopolitical and escalation risk that retaliatory cyber operations tied to state-affiliated groups could target additional U.S. or allied corporate and infrastructure entities, increasing sector-wide cyber exposure.
  • Uncertainty around attribution and remediation timelines - with the company citing limited access to systems and investigators still assessing scope, there is a risk of further undisclosed impacts to business operations or client services.

More from Stock Markets

Atlassian to Trim About 10% of Staff to Fund AI and Enterprise Sales Push Mar 11, 2026 Metals Acquisition Corp. II Prices $200 Million IPO, Units to Begin Trading on NYSE Mar 11, 2026 Atlassian to Cut About 10% of Staff as It Reorients Toward AI and Enterprise Sales Mar 11, 2026 PayPay Prices U.S. IPO at $16 a Share, Below Initial Range, Valuing Company at $10.7 Billion Mar 11, 2026 Banks Prepare $7.15 Billion Debt Package to Fund Sealed Air Buyout; Deal Could Hit Market Next Week Mar 11, 2026