The Stryker Cyberattack: What Medical Offices and Surgical Centers Need to Do Right Now

Iran-linked hackers wiped 200,000 systems at Stryker Corporation, disrupting medical device manufacturing worldwide. If your practice uses Stryker products, here's what you need to do right now to protect your operations.
Category: Cyber Hub Date: March 11, 2026 Author: Tammy Anthony Baker, CISSP

If your practice uses Stryker surgical equipment, implants, or supplies, today's news should have your full attention.

On Wednesday, Iran-linked hackers launched a devastating wiper attack against Stryker Corporation, one of the world's largest medical technology manufacturers. The attack wiped approximately 200,000 systems, shut down global operations across 61 countries, and left 56,000 employees unable to work. Stryker's stock dropped nearly 5% on the news.

This wasn't ransomware. This was a wiper — malware designed to destroy data, not hold it hostage. There's no negotiation. No decryption key. Just destruction.

The suspected group, Handala, is an Iranian-backed hacking collective believed to be retaliating for recent U.S. and Israeli military strikes. Attribution is still under investigation, but Stryker has confirmed the scope of the disruption is global.

Why This Matters for Your Practice

Stryker reported $25 billion in revenue last year. They make surgical instruments, orthopedic implants, hospital beds, endoscopy systems, neurovascular devices, and more. If your office or surgical center depends on Stryker products, you need to think about three things right now:

1. If You Have Stryker-Connected Devices, Contact Your Cyber Insurance Carrier Today

Any Stryker medical device in your environment that connects to a network is potentially impacted. We don't yet know the full scope of what was compromised — just that 200,000 systems were wiped. Until Stryker provides detailed guidance on which products and firmware versions are affected, treat any connected Stryker device as a potential risk.

Put your cyber insurance carrier on notice. You don't need to file a claim today, but you need documentation that you were aware of a potential exposure and took proactive steps. If something goes wrong weeks from now and you didn't notify your carrier, that's a coverage problem.

Call your carrier or broker. Send an email with today's date confirming you're aware of the Stryker incident and are monitoring for impact to your environment. Keep a copy.

2. If You Use Stryker Supplies, Start Identifying Alternates Now

This attack crippled Stryker's global operations. Manufacturing, logistics, order systems — all of it is affected. We don't know how long recovery will take. Wiper attacks are far more damaging than ransomware because the data isn't encrypted — it's gone. Rebuilding 200,000 systems from backups (assuming the backups survived) takes weeks, not days.

If your practice depends on Stryker for surgical supplies, implants, instruments, or disposables, don't wait for a backorder notice. Start talking to your supply chain contacts today about alternate vendors. Companies like Zimmer Biomet, Medtronic, Smith+Nephew, and DePuy Synthes (Johnson & Johnson) may be able to fill gaps depending on your specialty.

The worst time to find a backup supplier is when you're canceling surgeries.

3. Ask the Hard Question: Could This Happen to Us?

A nation-state hacker group just took down a $25 billion company with 56,000 employees and a substantial IT budget. If Stryker can get hit, so can your 20-person orthopedic practice or ambulatory surgery center.

The difference is that Stryker will survive this. They have the resources to rebuild. Most small medical offices don't have that luxury.

Here's what every small practice should be doing right now — not next quarter, not next budget cycle, right now:

Verify your backups actually work. When was the last time someone tested a restore? If the answer is "never" or "I'm not sure," that's your top priority.

Know your attack surface. Every connected medical device, every remote access tool, every user with administrative privileges — those are entry points. Do you know what's on your network?

Have an incident response plan. Not a binder on a shelf. An actual plan that your staff has practiced. Who do you call first? What gets disconnected? How do you keep seeing patients if your systems go down?

Enable MFA everywhere. Multi-factor authentication on email, on your EHR, on your VPN, on everything that supports it. This single control blocks the majority of credential-based attacks.

Talk to your IT provider. If they can't tell you what your current security posture looks like, that's a problem. If you don't have one, that's a bigger problem.

The Bigger Picture

The Stryker attack signals something we've been warning about: healthcare supply chain attacks aren't theoretical anymore. When a major medical device manufacturer goes down, every hospital and clinic that depends on their products feels the impact.

This isn't just about Stryker's IT team fixing their servers. It's about whether your surgical center can get the implants it needs next week. It's about whether the firmware on that connected Stryker device in your OR has been compromised. It's about the downstream risk that travels through every link in the healthcare supply chain.

The organizations that prepared for this kind of scenario — the ones with incident response plans, tested backups, cyber insurance, and diversified supply chains — will weather this. The ones that didn't will scramble.

Don't be the one scrambling.

What You Can Do Today

  • Contact your cyber insurance carrier and put them on notice about the Stryker incident
  • Inventory any Stryker-connected devices in your environment
  • Identify alternative suppliers for critical Stryker products
  • Test your backups — actually restore something and verify it works
  • Review your incident response plan (or create one if you don't have it)
  • Schedule a security assessment with a qualified IT provider

If you're a medical practice or surgical center and you're not sure where to start, that's exactly what we help with. NOIT Group works with healthcare organizations across Louisiana to build the kind of security posture that lets you focus on patients instead of panicking over headlines.

Reach out to us at noitgroup.com or call for a free consultation. Don't wait for the next headline to be about your practice.

Tammy Anthony Baker is a CISSP-certified cybersecurity professional and founder of NOIT Group, a managed service provider serving small and midsized businesses in Louisiana

Keep in the Loop

Like our Blog?
Subscribe now to stay informed.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.