Stryker Corporation, a leading American medical technology firm, has confirmed a major disruption to its global operations following a targeted 'wiper' cyberattack allegedly carried out by Iranian-linked hackers.
Wiper Malware Disruption
A destructive wiper malware attack deleted files across Stryker's global systems, halting manufacturing and order processing on March 12, 2026.
Iranian Retaliation Claim
Hackers linked to Iran claimed responsibility, citing retaliation for an incident at a school in Minab as the motive for targeting the medical giant.
Containment and Recovery
By March 13, the company declared the attack fully contained, with staff at major sites like Cork, Ireland, returning to restore IT infrastructure.
Stryker Corporation confirmed a major disruption to its global manufacturing and order processing operations on March 12, 2026, following a targeted cyberattack. The American medical technology giant, which produces surgical equipment and neurotechnology devices, faced a wiper attack that reportedly resulted in the deletion of all company files. Iranian-linked hackers claimed responsibility for the breach, which also targeted the US payment processor Verifone. The disruption significantly affected Stryker's ability to fulfill orders for lifesaving medical devices across its international network. Reports from March 12 indicated that the hackers acted in retaliation for an incident involving a school in Minab, Iran.
The hackers specifically identified the attack as a response to events at a school in Minab, though specific details regarding that incident were not immediately elaborated upon by the company. The use of destructive malware distinguishes this incident from typical ransomware, as the primary goal appeared to be data destruction rather than financial extortion. Stryker officials acknowledged the disruption to their IT systems but did not initially provide a timeline for full restoration. The attack highlights the increasing vulnerability of critical medical infrastructure to state-affiliated cyber operations.
By March 13, 2026, Stryker representatives stated that the cyberattack was fully contained and that recovery efforts were underway. In Cork, Ireland, where the company maintains a significant presence, staff members returned to their sites to begin the process of repairing and restoring infected computers. Skeleton crews had previously been deployed on March 12 to manage the immediate IT crisis while manufacturing remained largely suspended. The company is now working to assess the full extent of the data loss and the long-term impact on its supply chain. Stryker Corporation, headquartered in Portage, Michigan, is a leader in the medical technology industry, with neurotechnology and surgery products accounting for approximately 60% of its 2024 revenues. The company has faced previous challenges in securing its vast digital infrastructure against global threats. Cyberattacks on medical suppliers have become a growing concern for international security agencies due to the potential for direct impact on patient care. This incident follows a pattern of increased cyber activity attributed to Iranian-linked groups targeting Western infrastructure.
Stryker Cyberattack Timeline 2026: — ; — ; — ; —