Handala Hack, an Iranian-aligned group linked by Palo Alto Networks' Unit 42 threat intelligence team to Iran's Ministry of Intelligence and Security (VEVAK), claimed Thursday that it conducted a destructive wiper attack on Stryker Corporation, a US medical technology company whose surgical equipment, implants, and operating-room systems are used in hospitals across 79 countries. The group claims to have erased data from 200,000 systems and extracted 50 terabytes of data. Stryker disclosed a "global disruption to the company's Microsoft environment" in an SEC filing. Login screens across the company displayed the Handala logo.
The stated motive was retaliation for the strike on the Shajareh Tayyebeh girls' school in Minab, which killed between 165 and 180 people — mostly primary-school girls, along with teachers and parents. Three independent satellite imagery analyses concluded the strike was a US weapon fired at a misidentified target , and a preliminary US military investigation confirmed the intended target was a nearby naval facility . By selecting a medical technology company, Handala Hack drew a deliberate equivalence: American weapons struck a school full of children; Iranian cyber weapons would disrupt the medical supply chain that serves American hospitals.
Iran's prior major cyber operations targeted strategic infrastructure or direct adversaries. The 2012 Shamoon attack destroyed data on 30,000 Saudi Aramco workstations — striking at the economic foundation of a regional rival. A 2020 intrusion attempted to alter chlorine dosing levels in Israeli water treatment facilities — a direct physical-harm operation against an enemy state. The Stryker attack differs in kind. It hits a company whose products — surgical navigation systems, joint replacement implants, hospital bed platforms — sit in operating rooms worldwide, where disruption to device firmware, inventory management, or surgical planning software carries patient-safety implications extending well beyond the United States. The targeting logic mirrors the IRGC's kinetic "oil for oil" strikes on Haifa's refinery : reciprocal escalation, matched by sector.
The scale of Handala Hack's claim — 200,000 systems across 79 countries — is unverified, and wiper attack claims frequently overstate their reach. But Stryker's own SEC filing confirms genuine operational disruption, and the group's VEVAK linkage, assessed by Palo Alto Networks rather than self-declared, places the operation within Iran's state intelligence apparatus rather than the freelance hacktivist space. This is the war's first confirmed cyber front — and it has opened against a civilian target.
