What happened?
“On March 11, 2026, Stryker Corporation (“we” or the “Company”) identified a cybersecurity incident affecting certain information technology systems of the Company that has resulted in a global disruption to the Company’s Microsoft environment.”
With these 34 (and a few other) words, the huge US medical equipment manufacturer Stryker confirmed to the New York Stock Exchange on 11 March 2026 that it had fallen victim to a serious cyber-attack. The responsibility was later claimed by the pro-Iranian hacking group, Handala.
While the attack does not appear to have touched patient facing services, by market close on 13 March, $8.6bn had been wiped off Stryker’s market capitalisations (around 6.3%) as investors took fright. Stryker themselves said the breach would likely have a material financial impact on the company. As far as we know, the company carried no cyber insurance.
Gallagher Re has issued a report into the breach, which is instructive:
Astaara’s view: why shipowners and operators should care
Handala is a known Iranian proxy. They are out for revenge.
Good cyber hygiene is more than just about external perimeter security and the deployment of technology:
Credentials offering permanent privileged access-all-areas are the loaded weapon under the pillow of cyber security – lethal.
Do not over-centralise. This was a major single point of failure. Do not use one product to do another’s job: ID management is not the same as a PAM tool:
– An ID solution is about who you are;
– A PAM tool is about what you do. Least privilege applies more strongly the more senior the role.
Segregate and segment your networks, physically where possible, to ensure your most critical data and systems cannot be accessed by a single log-in or unauthenticated user.
Please get in contact with us should you wish to discuss this or any cyber related or insurance issue.
