No Result
View All Result
  • Login
Saturday, May 2, 2026
FeeOnlyNews.com
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading
No Result
View All Result
FeeOnlyNews.com
No Result
View All Result
Home Market Analysis

Enterprise Resiliency Plans Can’t Ignore UEM

by FeeOnlyNews.com
2 months ago
in Market Analysis
Reading Time: 6 mins read
A A
0
Enterprise Resiliency Plans Can’t Ignore UEM
Share on FacebookShare on TwitterShare on LInkedIn


On March 11, media reports indicated that an Iranian-linked hacktivist organization, Handala, claimed to have successfully attacked Stryker Corporation, a Fortune 500 medical device manufacturer. The group also claims to have wiped 200,000 systems and stolen 50 terabytes of data. Unnamed employees on social media said there were widespread network outages and that any user who had Microsoft Office on their personal phones had their devices wiped. In addition, Stryker released a message publicly to customers stating that the attack affected its Microsoft environment. Based on statements from the group claiming responsibility, this cyberattack is a response to the ongoing conflict between the US and Iran and is part of the escalating digital warfare that’s taking place as part of the broader conflict.

So far, Stryker hasn’t released any details about the attack publicly. Reports, however, indicate that this may be wiper malware. Wiper malware can masquerade as ransomware but destroy the victim’s data instead of encrypting it, making recovery more challenging.

Analysis so far also points to the attackers gaining access to Stryker’s mobile device management (MDM) and unified endpoint management (UEM) platform, then being able to extract information and force a system-level wipe and reset on any managed devices. This allegedly impacted personal users who were using their own devices that were registered with the MDM/UEM platform, Microsoft Intune. Please note that this does not necessarily signal a vulnerability with Intune itself. It’s far more likely that the attackers leveraged Intune in a living off the land-style attack, where the attacker uses native tools and processes within the environment to either collect or create an administrative login or is able to exploit those native tools to take administrative-level actions.

Why It Matters

MDM/UEM platform compromises are rare but not new. A recent attack on the European Commission this past January led to an attacker extracting personal information such as names and phone numbers. Malicious actors attacked a multinational conglomerate in 2020, using the MDM to deploy the Cerberus banking trojan. This attack looks different, as the malicious actors had more than data-level access to the platform or app deployment capabilities and were able to utilize administrator-level controls, such as sending wipe commands to managed devices.

Management platforms like MDM/UEM are “keys to the kingdom” systems, as they’re used across enterprises to manage, secure, and monitor the endpoints where users work. While commonly used for desktops and mobile devices, more systems like wearables and browsers are being covered by these platforms. MDM/UEMs allow for centralized control of not just the endpoints but can also bring in app delivery, configure privileged access, deliver certificates, or even get down to BIOS-level controls. A compromise of these platforms has extensive ramifications, as attackers can extract data and wipe devices but can also deploy scripts, relax permissions, and establish command-and-control (C&C) points within the infrastructure. These C&C points are less likely to be detected as malicious, as they’re deployed through normal management channels. From there, attackers could gain access to other corporate data than what is stored locally on the users’ endpoints.

Many enterprises use bring-your-own-device (BYOD) programs. BYOD devices are usually controlled by the MDM/UEM platform, which would give the attacker access to control that endpoint. This could allow them the same level of control as they have on corporate devices, giving them access to personal information as well as corporate info. This makes access to these devices a valuable commodity for malicious actors to sell on hacker marketplaces or to extort individuals.

A common part of the agreement for users enrolling in their company’s BYOD program is that the business retains the right to control, lock, and partially or fully wipe the device in the event of a security incident. This can mean employees can lose access to their personal files on the device and are responsible for regular backups of those files.

The wiping of devices, either corporate- or employee-owned, also highlights a current challenge in enterprises today where data management and security leaders want all business data to be centralized so that it’s easier to control and protect. Yet a lot of data winds up on users’ devices and may never make it to centralized storage. When one system fails, discovering what data was lost and the impact to the business is a challenge, but when 200,000 are wiped, this discovery takes much longer, and it may be some time before the business learns what was truly lost.

What To Do

Based on the claims of the attackers taking responsibility for the cyberattack and their stated reason, the attack appears to be geopolitically motivated. Stryker is a uniquely valuable target for a pro-Iran attacker: It is a publicly traded US company with large contracts with the US military for medical devices, and it has at least one company based in Israel, OrthoSpace Ltd., under its umbrella.

Know The Threat Environment And Prepare

While Stryker may not have been an overt target for a pro-Iran hacker group a month ago, the geopolitical situation is extremely chaotic this year, and the situation has fundamentally changed. The US has been very public about its intent to use cyberattacks more in offensive operations, even outlining this goal in its 2026 cyber strategy for America. To prepare for this, organizations must hold regular (at least once a quarter or more often, depending on resources) geopolitical risk conversations that involve the security team so that they can keep up to date on the latest geopolitical changes and the new attacker groups that may be more inclined to target them.

Companies that think they aren’t likely targets should assess traits such as their country of origin, location of operations, relationship with groups and governments around the world, and the latest threat intelligence about groups that might target them. Examine the tactics, techniques, and procedures of these groups to identify and close potential security posture gaps.

Examine Potential Attack Vectors

While the impacted devices appear restricted to those under MDM/UEM management, it’s imperative that all systems within the enterprise are scanned to look for tools that the threat actors can use to gain access to other data, as well as access to other systems such as those within the operational technology/industrial control system networks where Stryker develops and manufactures its devices.

Understand Your Impact

Stryker has not yet publicly shared any details beyond its Microsoft systems being disrupted. The best course of action is to contact your Stryker account team to find out what details they have available now and learn what their course of action is to communicate with you on the state of things. According to Stryker, its “connected products are not impacted and are fully safe to use.” Pay attention as the company learns more about the nature of the attack.

Users impacted by attacks impacting personal devices such as via the Stryker incident need to know what data may have been extracted. Watch for notices from your employer for more details on what data the attackers accessed. If the threat actor extracted data from BYOD devices, this could mean that anything from personal photos to bank statements on your device were extracted. Also, because of the level of control that MDM/UEM platforms have on managed endpoints, it’s possible that website access tokens and digital certificates could also have been extracted but not the credentials themselves. As a precaution, while the investigation is ongoing, change your passwords for applications and websites you may have been using from your BYO device.

Incidents like this one show the inherent risk of allowing work software on personal devices. It’s worth strongly considering if you would be better off using work-provisioned devices or separate devices solely dedicated to work instead of mixing personal and corporate. This is also an opportunity for risk reduction for the business — BYOD devices are inherently more risky.

Key Takeaways From The Incident

Incidents like this expose attacker techniques and illustrate how attackers may target others, highlighting gaps in many enterprise data resilience strategies. Some actions for all enterprises to take include:

Reviewing access controls to our management platforms like MDM/UEM.
Restricting access to enterprise management systems using phishing-resistant multifactor authentication to ensure that compromised credentials alone don’t allow access.
Configuring destructive actions, such as wiping, to utilize functions such as multi admin approval, which ensures that a single compromised admin account cannot take these actions alone.

The expectation that the only useful infrastructure and data for an organization lives in a data center or cloud environment falls apart in a world where employees are working remotely or where embedded devices and terminals are running full operating systems vulnerable to widespread attacks. Enterprises should make sure that if an attacker is able to compromise a control plane like Intune or execute a malware attack with something like wiper, they can recover those devices quickly or at least get employees and customers access to their data.

We’re closely watching this incident and will continue to share our insight as details emerge and we get definitive answers on what data may have been lost and other particulars that exposed how this attack took place.

Connect With Us

Forrester clients with questions related to this can connect with us through an inquiry or guidance session.



Source link

Tags: EnterpriseIgnoreplansResiliencyUEM
ShareTweetShare
Previous Post

Mortgage Rates Today, Friday, March 13: Kind of a Big Jump

Next Post

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Related Posts

Lead Distribution Automation Software: The 2026 Guide to Indirect Sales Efficiency

Lead Distribution Automation Software: The 2026 Guide to Indirect Sales Efficiency

by FeeOnlyNews.com
May 1, 2026
0

If 80% of automation users are generating more leads, why are so many manufacturers still watching high-value opportunities wither away...

SUSECON 2026: From Open Infrastructure To Operational Sovereignty

SUSECON 2026: From Open Infrastructure To Operational Sovereignty

by FeeOnlyNews.com
May 1, 2026
0

SUSECON 2026 in Prague marked a clear advance on the platform pillars SUSE introduced a year earlier in Orlando —...

3 Software Stocks to Buy on the Dip With Accelerating AI-Driven Earnings Growth

3 Software Stocks to Buy on the Dip With Accelerating AI-Driven Earnings Growth

by FeeOnlyNews.com
May 1, 2026
0

Salesforce, Adobe, and HubSpot have all suffered bruising year-to-date stock price declines. Despite the drawdown, each offers double-digit revenue growth,...

How to Distribute Leads to Partners Fairly: The Definitive Guide to Channel Equity

How to Distribute Leads to Partners Fairly: The Definitive Guide to Channel Equity

by FeeOnlyNews.com
April 30, 2026
0

What if the primary driver of your 25% partner attrition rate isn’t your product’s performance, but a perceived lack of...

Building The Human Foundation Of The AI-Powered Enterprise

Building The Human Foundation Of The AI-Powered Enterprise

by FeeOnlyNews.com
April 30, 2026
0

We’ve all done it: We’ve had to repeatedly prove that we are human to access digital services. I’ve personally failed...

9 High Cash Flow Stocks Likely to Outperform If Rates Stay Higher for Longer

9 High Cash Flow Stocks Likely to Outperform If Rates Stay Higher for Longer

by FeeOnlyNews.com
April 30, 2026
0

The Fed has made it clear that rate cuts are not coming anytime soon. Some companies, however, can actually hold...

Next Post
Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

AI isn’t reducing workloads for employees, it’s straining them—time spent on emailing has doubled, while deep-focus work has fallen by 9%

AI isn’t reducing workloads for employees, it’s straining them—time spent on emailing has doubled, while deep-focus work has fallen by 9%

  • Trending
  • Comments
  • Latest
The 27 Largest US Funding Rounds of March 2024 – AlleyWatch

The 27 Largest US Funding Rounds of March 2024 – AlleyWatch

April 17, 2026
Wells Fargo Transfer Partners: What to Know

Wells Fargo Transfer Partners: What to Know

April 16, 2026
Week 14: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 14: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

April 6, 2026
The 16 Largest Global Startup Funding Rounds of March 2026 – AlleyWatch

The 16 Largest Global Startup Funding Rounds of March 2026 – AlleyWatch

April 21, 2026
LPL’s Mariner Advisor Network deal fuels already hot year for RIA M&A

LPL’s Mariner Advisor Network deal fuels already hot year for RIA M&A

April 16, 2026
Royal Caribbean, Bank of America Launching New Credit Cards

Royal Caribbean, Bank of America Launching New Credit Cards

March 31, 2026
Madhusudan Kela’s portfolio: 5 stocks rally up to 135%; 4 new Q4 bets revealed – Uneven Gains

Madhusudan Kela’s portfolio: 5 stocks rally up to 135%; 4 new Q4 bets revealed – Uneven Gains

0
6 months out, control of the Senate is 50-50, traders on Kalshi say

6 months out, control of the Senate is 50-50, traders on Kalshi say

0
Warren Buffett says ‘we’ve never had people in a more gambling mood than now’

Warren Buffett says ‘we’ve never had people in a more gambling mood than now’

0
Canada wants to ban crypto ATMs as fraud fears turn Bitcoin access into a political target

Canada wants to ban crypto ATMs as fraud fears turn Bitcoin access into a political target

0
Top 5 Most Lucrative Online Businesses To Start In 2025

Top 5 Most Lucrative Online Businesses To Start In 2025

0
Links 5/2/2026 | naked capitalism

Links 5/2/2026 | naked capitalism

0
Warren Buffett says ‘we’ve never had people in a more gambling mood than now’

Warren Buffett says ‘we’ve never had people in a more gambling mood than now’

May 2, 2026
Visteon’s Chief People Officer Sold Over 4,000 Company Shares. Here’s What That Means for Investors.

Visteon’s Chief People Officer Sold Over 4,000 Company Shares. Here’s What That Means for Investors.

May 2, 2026
0 Oil Shock: 3 Ways This Week’s Price Spike Could Hit Your Retirement Budget Fast

$100 Oil Shock: 3 Ways This Week’s Price Spike Could Hit Your Retirement Budget Fast

May 2, 2026
Canada wants to ban crypto ATMs as fraud fears turn Bitcoin access into a political target

Canada wants to ban crypto ATMs as fraud fears turn Bitcoin access into a political target

May 2, 2026
Turning 0K Into M in 5 Years: Why This Real Estate Promise Is a Red Flag

Turning $250K Into $1M in 5 Years: Why This Real Estate Promise Is a Red Flag

May 2, 2026
Jensen Huang says some CEOs have a ‘God complex’ when it comes to AI apocalypse warnings

Jensen Huang says some CEOs have a ‘God complex’ when it comes to AI apocalypse warnings

May 2, 2026
FeeOnlyNews.com

Get the latest news and follow the coverage of Business & Financial News, Stock Market Updates, Analysis, and more from the trusted sources.

CATEGORIES

  • Business
  • Cryptocurrency
  • Economy
  • Financial Planning
  • Investing
  • Market Analysis
  • Markets
  • Money
  • Personal Finance
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Warren Buffett says ‘we’ve never had people in a more gambling mood than now’
  • Visteon’s Chief People Officer Sold Over 4,000 Company Shares. Here’s What That Means for Investors.
  • $100 Oil Shock: 3 Ways This Week’s Price Spike Could Hit Your Retirement Budget Fast
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclaimers
  • About Us
  • Contact Us

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Business
  • Financial Planning
  • Personal Finance
  • Investing
  • Money
  • Economy
  • Markets
  • Stocks
  • Trading

Copyright © 2022-2024 All Rights Reserved
See articles for original source and related links to external sites.