In March 2026, attackers wiped thousands of corporate devices inside Stryker's Microsoft environment — not with malware, but using legitimate administrative tools. The medical technology giant's operations were disrupted globally, forcing thousands of employees offline within hours.
Early reports indicate the attack was carried out by a group claiming affiliation with a pro-Iranian hacking collective. The attackers allegedly wiped large numbers of corporate devices and caused widespread disruption across Stryker's Microsoft-based infrastructure.
While investigations are still ongoing, the incident provides a clear example of how modern enterprise environments can be disrupted when identity and device management systems are compromised.
Understanding how attacks like this happen is important for any organisation relying on Microsoft 365, Entra ID, or Intune — regardless of size. According to Microsoft, identity-based attacks now represent the majority of enterprise breaches. The Stryker incident is a high-profile example of exactly that pattern.
⚠️
Why identity is now the primary target. If attackers gain control of Microsoft Entra ID, Intune, or Microsoft 365 administrative roles, they effectively control the organisation. Traditional perimeter defences provide no protection against this. Identity protection and privileged access controls are now critical security requirements — not optional extras.
Technical detail
How Intune makes mass destruction possible
In environments using Microsoft Intune, an administrator can issue a remote wipe command to any managed endpoint through the Intune portal or via the Microsoft Graph API. If an attacker gains access to an Intune Administrator or Global Administrator account — through phishing, token theft, or credential reuse — a single command can remove corporate data from thousands of devices within minutes. No malware required. No network access needed. Just a legitimate admin action executed at scale.
This is precisely why privileged role assignments in Microsoft 365 are now a primary attack target. The blast radius of a single compromised admin account has never been larger.
Attack flow
Phishing / credential theft
→
Entra ID compromise
→
Admin role obtained
→
Intune device control
→
Mass endpoint wipe
Could this happen to you?
Could the Stryker attack happen in Microsoft 365 environments?
Many organisations assume these incidents only affect large enterprises. In reality, smaller companies often have fewer protections in place — and are actively targeted because of it. The Microsoft 365 administrative features that allowed attackers to wipe Stryker's devices are present in every M365 tenant, regardless of company size.
- Too many Global Administrators — each one is a potential entry point
- Permanent privileged roles instead of just-in-time access via PIM
- Missing or weak Conditional Access policies
- Legacy authentication protocols still enabled
- No monitoring or alerting on administrative actions
- Unused or unreviewed admin accounts still active
These gaps can allow an attacker to take full control of an environment within minutes of compromising a single account.