An unexpected error occurred: 
      

Cyberhealth: When Trusted Systems Become the Weak Link

By exploiting identity access and endpoint management systems, attackers demonstrated how a single breach can ripple across production, logistics, and service—reshaping how OEMs must think about cybersecurity.

Stryker Incident

A recent cyberattack on medical technology company Stryker is drawing attention across industries. This was not a new vulnerability or sophisticated malware – this breach occurred because attackers used a trusted system to cause widespread disruption.

For PMMI members, this incident is worth understanding. Many organizations rely on similar tools to manage computers, workstations, mobile devices, and users, and the lessons here apply broadly across manufacturing, packaging, and supply chain environments.

What happened?

According to public reporting and CISA guidance, attackers gained access to Stryker’s environment and leveraged Microsoft Intune, a widely used endpoint management platform.

Once inside, they were able to:

  • Compromise an administrative account
  • Escalate privileges by modifying administrative access
  • Use Intune’s built-in capabilities to remotely wipe large numbers of devices
  • Potentially access or exfiltrate sensitive data beforehand

Most importantly, the attackers didn’t need to deploy malware or exploit a software vulnerability. They used legitimate administrative tools to carry out the attack.

Why is this attack different?

        An unexpected error occurred: