Medical device giant Stryker is scrambling to restore thousands of employee devices after pro-Iran hackers deployed wiper malware across its corporate network in what security experts are calling the first major cyberattack on U.S. soil linked to escalating tensions with Iran. The attack brought widespread operational disruption to the Michigan-based company, which manufactures critical medical equipment used in hospitals worldwide, raising immediate concerns about supply chain impacts and the vulnerability of healthcare infrastructure to nation-state threats.
Stryker, the $18 billion medical technology company, confirmed it's working around the clock to restore corporate systems after hackers linked to Iran deployed destructive wiper malware that erased data on thousands of employee devices. The attack, disclosed Tuesday, represents a dramatic escalation in cyber conflict between Iran and the United States.
The breach hit Stryker's internal networks hard, wiping laptops, desktops, and potentially servers across multiple facilities. While the company hasn't disclosed the exact number of affected devices, sources familiar with the incident told TechCrunch that the damage spans "thousands" of endpoints. Stryker, which employs roughly 51,000 people globally, manufactures everything from surgical equipment to orthopedic implants used in operating rooms across America.
What makes this attack particularly significant is its timing and attribution. Cybersecurity experts tracking the incident believe this is the first major cyberattack on U.S. corporate infrastructure directly linked to retaliatory action following the Trump administration's military operations in Iran. Unlike ransomware attacks that seek financial gain, wiper malware is designed purely for destruction - a digital scorched-earth tactic favored by nation-state actors looking to inflict maximum damage.
The attack's technical sophistication suggests coordination by experienced threat actors. Wiper malware requires careful reconnaissance and network access to deploy effectively across an enterprise environment. The hackers would have needed to map Stryker's internal systems, establish persistent access, and coordinate the simultaneous destruction of data across multiple devices to maximize impact before security teams could respond.












