Pro-Iran hackers claim cyberattack on major US medical device maker

Pro-Iran hackers claim cyberattack on major US medical device maker

A cyberattack claimed by pro-Iran hackers has caused a "global network disruption" to a major US medical device maker, according to acompany statement.

CNN The logo of Stryker medical technology is seen on their plant in Carrigtwohill, County Cork, Ireland, on March 28, 2025. - Clodagh Kilcoyne/Reuters/File

Michigan-based Stryker "is experiencing a global network disruption to our Microsoft environment as a result of a cyberattack," the company said in a statement to CNN. "We have no indication of ransomware or malware and believe the incident is contained. Our teams are working rapidly to understand the impact of the attack on our systems. Stryker has business continuity measures in place to continue to support our customers and partners."

Stryker makes a range of hospital equipment, from defibrillators to ambulance cots. The company's computers in Ireland were also hit by the cyberattack,accordingto local media reports. Stryker say it serves more than 150 million patients through its health equipment and services.

It was unclear what immediate impacts, if any, the hack had on Stryker's provision of medical equipment to US hospitals. Cybersecurity executives across the health sector told CNN on Wednesday they were on alert for any impacts.

One piece of Stryker equipment apparently disrupted by the cyberattack was an IT system called Lifenet, which emergency responders use to communicate patient data to hospitals.

Maryland's Institute for Emergency Medical Services (EMS) Systems, which oversees the state's emergency medical services, told hospitals in the state Wednesday that it had received multiple reports that Stryker's Lifenet electrocardiogram transmission system was "non-functional in most parts of the state."

"Until the transmission capability has been restored, EMS clinicians should initiate radio consultation with the receiving hospital," read the notice from the Maryland emergency services agency, which CNN obtained.

"A message was sent in abundance of caution until the situation can be resolved," Todd Abramowitz, a spokesperson for the agency, told CNN in an email when asked for comment. "No effect on patient care, paramedics convey their interpretation verbally as they do all the time, routinely."

The cyberattack appears to be one of the first notable pro-Iranian hacks against US infrastructure since the US and Israel began bombing Iran last month. US intelligence officials havewarnedabout the possibility of Tehran-linked hackers retaliating for the US and Israeli bombing of Iran that began last month.

In a social media post on Wednesday, the hacking group that claimed responsibility said the Stryker hack was retaliation for a missile strike on an elementary school in Iran, which Iranian state media has claimed killed at least 168 children. The Pentagon is investigating that incident.

Federal agencies like the Department of Health and Human Services on Wednesday were trying to get a sense of any potential impacts the hack could have on patient care, sources familiar with the response told CNN.

Advertisement

A Wednesday evening call held by the Healthcare and Public Health Sector Coordinating Council, an industry group that works with the government to bolster security in the sector, was brief and yielded little new information about the Stryker hack, a source on the call told CNN.

Hospitals are trying to determine whether they should disconnect Stryker equipment from hospitals systems.

"Stryker needs to quickly become more forthcoming as hospitals are faced with dilemma of whether to cut off Stryker or not," a cybersecurity executive in the health care sector told CNN. "Stryker publicly claims situation is 'contained.' What does that mean?"

The Wall Street Journalreportedearlier on the pro-Iran hack. Stryker's shares fell more than 3% following that report.

Iran-linked hackers had been largely quiet in terms of attacks on US organizations since the war began last month.

Email security firm ProofpointsaidWednesday that its tracking of known Iranian groups had turned up only one hacking campaign — an attempt to hack a US think tank employee — since the war began.

"Too much of cybersecurity is focused on lower consequence breaches from financially motivated enemies, while we're increasing our exposures to nation states and other enemies who seek to disrupt and destroy," Joshua Corman, a cybersecurity expert who has focused on the health sector for years, told CNN. "China, Iran, Russia, etc. all have the means, motive, and opportunity to deal us devastating disruptions."

Despite the US and Israel's bombardment of Iranian government facilities, Wednesday's hack showed that Tehran still has hackers capable of inflicting damage, cybersecurity analysts said.

"Cyber operations don't require much infrastructure," said Alex Rose, global head of government partnerships at cybersecurity firm Sophos. "A laptop and an internet connection can be enough to reach out and wreak havoc."

This story has been updated with additional reporting.

For more CNN news and newsletters create an account atCNN.com

 

PYN MAG © 2015 | Distributed By My Blogger Themes | Designed By Templateism.com