The Stryker story now has a full picture — and it is worse than initially reported. As Stryker announced full operational restoration on April 2, new forensic details emerged: Handala stole 50 terabytes of data before wiping nearly 80,000 devices across the company’s global network. The attackers compromised a Windows domain administrator account, created a new Global Administrator account, and used Microsoft Intune — the company’s own device management tool — to remotely wipe employee laptops, phones, and servers. In some departments, up to 95% of devices were erased before defenders could react. Investigators also discovered a malicious file the attackers used to hide their activity inside the network. Employee lawsuits have been filed alleging Social Security numbers and financial data may be exposed. The FBI seized two Handala websites and CISA released joint guidance with Microsoft on hardening Intune and Windows domains.
CareCloud, a healthcare technology company that stores electronic health records for medical practices, filed an SEC disclosure on March 31 confirming unauthorized access to one of its patient records environments on March 16. Hackers had access for over 8 hours. Whether patient data was exfiltrated is still unknown. Separately, Nacogdoches Memorial Hospital in Texas began notifying 257,073 individuals about a January breach where hackers had network access for two weeks before detection. And the Medusa ransomware gang — believed to operate out of Russia — claimed responsibility for the devastating attack on the University of Mississippi Medical Center that shut down the state’s only Level I trauma center and only children’s hospital for nine days.
Cross-sector: the North Korean Axios npm supply chain attack (detailed in the Defense brief) affects any healthcare organization running JavaScript-based applications — patient portals, telehealth platforms, internal dashboards, EHR integrations. An estimated 600,000 installs occurred during the 3-hour exposure window. Healthcare IT teams must audit their npm dependencies immediately.
The bottom line: Stryker’s recovery proves that even a Fortune 500 company with resources takes three weeks to come back from a destructive attack. Most healthcare organizations don’t have Stryker’s resources. The question is no longer whether you will be attacked — 93% of healthcare organizations already have been — but whether you can survive three weeks without your systems. If the answer is no, your preparedness gap is the threat.