No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, March 15, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Enterprise Resiliency Plans Can’t Ignore UEM

by TheAdviserMagazine
2 days ago
in Market Analysis
Reading Time: 6 mins read
A A
Enterprise Resiliency Plans Can’t Ignore UEM
Share on FacebookShare on TwitterShare on LInkedIn


On March 11, media reports indicated that an Iranian-linked hacktivist organization, Handala, claimed to have successfully attacked Stryker Corporation, a Fortune 500 medical device manufacturer. The group also claims to have wiped 200,000 systems and stolen 50 terabytes of data. Unnamed employees on social media said there were widespread network outages and that any user who had Microsoft Office on their personal phones had their devices wiped. In addition, Stryker released a message publicly to customers stating that the attack affected its Microsoft environment. Based on statements from the group claiming responsibility, this cyberattack is a response to the ongoing conflict between the US and Iran and is part of the escalating digital warfare that’s taking place as part of the broader conflict.

So far, Stryker hasn’t released any details about the attack publicly. Reports, however, indicate that this may be wiper malware. Wiper malware can masquerade as ransomware but destroy the victim’s data instead of encrypting it, making recovery more challenging.

Analysis so far also points to the attackers gaining access to Stryker’s mobile device management (MDM) and unified endpoint management (UEM) platform, then being able to extract information and force a system-level wipe and reset on any managed devices. This allegedly impacted personal users who were using their own devices that were registered with the MDM/UEM platform, Microsoft Intune. Please note that this does not necessarily signal a vulnerability with Intune itself. It’s far more likely that the attackers leveraged Intune in a living off the land-style attack, where the attacker uses native tools and processes within the environment to either collect or create an administrative login or is able to exploit those native tools to take administrative-level actions.

Why It Matters

MDM/UEM platform compromises are rare but not new. A recent attack on the European Commission this past January led to an attacker extracting personal information such as names and phone numbers. Malicious actors attacked a multinational conglomerate in 2020, using the MDM to deploy the Cerberus banking trojan. This attack looks different, as the malicious actors had more than data-level access to the platform or app deployment capabilities and were able to utilize administrator-level controls, such as sending wipe commands to managed devices.

Management platforms like MDM/UEM are “keys to the kingdom” systems, as they’re used across enterprises to manage, secure, and monitor the endpoints where users work. While commonly used for desktops and mobile devices, more systems like wearables and browsers are being covered by these platforms. MDM/UEMs allow for centralized control of not just the endpoints but can also bring in app delivery, configure privileged access, deliver certificates, or even get down to BIOS-level controls. A compromise of these platforms has extensive ramifications, as attackers can extract data and wipe devices but can also deploy scripts, relax permissions, and establish command-and-control (C&C) points within the infrastructure. These C&C points are less likely to be detected as malicious, as they’re deployed through normal management channels. From there, attackers could gain access to other corporate data than what is stored locally on the users’ endpoints.

Many enterprises use bring-your-own-device (BYOD) programs. BYOD devices are usually controlled by the MDM/UEM platform, which would give the attacker access to control that endpoint. This could allow them the same level of control as they have on corporate devices, giving them access to personal information as well as corporate info. This makes access to these devices a valuable commodity for malicious actors to sell on hacker marketplaces or to extort individuals.

A common part of the agreement for users enrolling in their company’s BYOD program is that the business retains the right to control, lock, and partially or fully wipe the device in the event of a security incident. This can mean employees can lose access to their personal files on the device and are responsible for regular backups of those files.

The wiping of devices, either corporate- or employee-owned, also highlights a current challenge in enterprises today where data management and security leaders want all business data to be centralized so that it’s easier to control and protect. Yet a lot of data winds up on users’ devices and may never make it to centralized storage. When one system fails, discovering what data was lost and the impact to the business is a challenge, but when 200,000 are wiped, this discovery takes much longer, and it may be some time before the business learns what was truly lost.

What To Do

Based on the claims of the attackers taking responsibility for the cyberattack and their stated reason, the attack appears to be geopolitically motivated. Stryker is a uniquely valuable target for a pro-Iran attacker: It is a publicly traded US company with large contracts with the US military for medical devices, and it has at least one company based in Israel, OrthoSpace Ltd., under its umbrella.

Know The Threat Environment And Prepare

While Stryker may not have been an overt target for a pro-Iran hacker group a month ago, the geopolitical situation is extremely chaotic this year, and the situation has fundamentally changed. The US has been very public about its intent to use cyberattacks more in offensive operations, even outlining this goal in its 2026 cyber strategy for America. To prepare for this, organizations must hold regular (at least once a quarter or more often, depending on resources) geopolitical risk conversations that involve the security team so that they can keep up to date on the latest geopolitical changes and the new attacker groups that may be more inclined to target them.

Companies that think they aren’t likely targets should assess traits such as their country of origin, location of operations, relationship with groups and governments around the world, and the latest threat intelligence about groups that might target them. Examine the tactics, techniques, and procedures of these groups to identify and close potential security posture gaps.

Examine Potential Attack Vectors

While the impacted devices appear restricted to those under MDM/UEM management, it’s imperative that all systems within the enterprise are scanned to look for tools that the threat actors can use to gain access to other data, as well as access to other systems such as those within the operational technology/industrial control system networks where Stryker develops and manufactures its devices.

Understand Your Impact

Stryker has not yet publicly shared any details beyond its Microsoft systems being disrupted. The best course of action is to contact your Stryker account team to find out what details they have available now and learn what their course of action is to communicate with you on the state of things. According to Stryker, its “connected products are not impacted and are fully safe to use.” Pay attention as the company learns more about the nature of the attack.

Users impacted by attacks impacting personal devices such as via the Stryker incident need to know what data may have been extracted. Watch for notices from your employer for more details on what data the attackers accessed. If the threat actor extracted data from BYOD devices, this could mean that anything from personal photos to bank statements on your device were extracted. Also, because of the level of control that MDM/UEM platforms have on managed endpoints, it’s possible that website access tokens and digital certificates could also have been extracted but not the credentials themselves. As a precaution, while the investigation is ongoing, change your passwords for applications and websites you may have been using from your BYO device.

Incidents like this one show the inherent risk of allowing work software on personal devices. It’s worth strongly considering if you would be better off using work-provisioned devices or separate devices solely dedicated to work instead of mixing personal and corporate. This is also an opportunity for risk reduction for the business — BYOD devices are inherently more risky.

Key Takeaways From The Incident

Incidents like this expose attacker techniques and illustrate how attackers may target others, highlighting gaps in many enterprise data resilience strategies. Some actions for all enterprises to take include:

Reviewing access controls to our management platforms like MDM/UEM.
Restricting access to enterprise management systems using phishing-resistant multifactor authentication to ensure that compromised credentials alone don’t allow access.
Configuring destructive actions, such as wiping, to utilize functions such as multi admin approval, which ensures that a single compromised admin account cannot take these actions alone.

The expectation that the only useful infrastructure and data for an organization lives in a data center or cloud environment falls apart in a world where employees are working remotely or where embedded devices and terminals are running full operating systems vulnerable to widespread attacks. Enterprises should make sure that if an attacker is able to compromise a control plane like Intune or execute a malware attack with something like wiper, they can recover those devices quickly or at least get employees and customers access to their data.

We’re closely watching this incident and will continue to share our insight as details emerge and we get definitive answers on what data may have been lost and other particulars that exposed how this attack took place.

Connect With Us

Forrester clients with questions related to this can connect with us through an inquiry or guidance session.



Source link

Tags: EnterpriseignoreplansresiliencyUEM
ShareTweetShare
Previous Post

Mortgage Rates Today, Friday, March 13: Kind of a Big Jump

Next Post

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Related Posts

edit post
Automating Channel Growth in 2026

Automating Channel Growth in 2026

by TheAdviserMagazine
March 13, 2026
0

A 2024 industry analysis reveals that 14.7% of market development funds are lost annually to overpayments and administrative errors stemming...

edit post
3 Cheap Mid-Cap Energy Stocks to Own as Oil Prices Surge to 0

3 Cheap Mid-Cap Energy Stocks to Own as Oil Prices Surge to $100

by TheAdviserMagazine
March 13, 2026
0

Oil prices are soaring amid escalating geopolitical tensions in the Middle East. WTI crude recently settled around $95 per barrel,...

edit post
When The Agents Take The Keyboard: Inside Cloudflare’s Next.js Rewrite

When The Agents Take The Keyboard: Inside Cloudflare’s Next.js Rewrite

by TheAdviserMagazine
March 13, 2026
0

I’ve spent much of my career as both an analyst and a practitioner advising people against “the big rewrite.” It’s...

edit post
Bitcoin Recovery Advances, But Breakout Still Faces Major Resistance

Bitcoin Recovery Advances, But Breakout Still Faces Major Resistance

by TheAdviserMagazine
March 13, 2026
0

ETF inflows and institutional buying support Bitcoin even as short-term volatility persists. Macro factors like Fed policy, inflation data, and...

edit post
The Intelligence Platform Powering AI GPU Infrastructure and Data Center Strategy

The Intelligence Platform Powering AI GPU Infrastructure and Data Center Strategy

by TheAdviserMagazine
March 13, 2026
0

Artificial intelligence workloads are transforming global data center infrastructure. As hyperscalers, GPU cloud providers, and enterprises race to deploy high-density...

edit post
Key Drivers, Trends, and Opportunities

Key Drivers, Trends, and Opportunities

by TheAdviserMagazine
March 13, 2026
0

Robotics-as-a-Service (RaaS) is an emerging business model that allows companies to deploy robotic systems through subscription or pay-per-use pricing rather...

Next Post
edit post
Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

edit post
Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

  • Trending
  • Comments
  • Latest
edit post
Foreclosure Starts are Up 19%—These Counties are Seeing the Highest Distress

Foreclosure Starts are Up 19%—These Counties are Seeing the Highest Distress

February 24, 2026
edit post
Gasoline-starved California is turning to fuel from the Bahamas

Gasoline-starved California is turning to fuel from the Bahamas

February 15, 2026
edit post
7 States Reporting a Surge in Norovirus Cases

7 States Reporting a Surge in Norovirus Cases

February 22, 2026
edit post
Where Is My 2025 Oregon State Tax Refund

Where Is My 2025 Oregon State Tax Refund

February 13, 2026
edit post
2025 Delaware State Tax Refund – DE Tax Brackets

2025 Delaware State Tax Refund – DE Tax Brackets

February 16, 2026
edit post
The Growing Movement to End Property Taxes Continues in Kentucky, And What It Means For Investors

The Growing Movement to End Property Taxes Continues in Kentucky, And What It Means For Investors

March 2, 2026
edit post
Oil prices to hit 0? How Indian stock markets may react as Iran war rages on

Oil prices to hit $150? How Indian stock markets may react as Iran war rages on

0
edit post
Mitigating Economic Risk in Multi-Factor Strategies

Mitigating Economic Risk in Multi-Factor Strategies

0
edit post
Week 10 and 11: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 10 and 11: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

0
edit post
Angel Studios Inc (ANGX) Reports Q4 Earnings

Angel Studios Inc (ANGX) Reports Q4 Earnings

0
edit post
Why the Neutral Interest Rate Cannot Be Established

Why the Neutral Interest Rate Cannot Be Established

0
edit post
75% of resumes never reach a human: the new rules of job searching in the AI era

75% of resumes never reach a human: the new rules of job searching in the AI era

0
edit post
I asked 20 people over 70 what they miss most about their parents and not one of them said advice, wisdom, or guidance — every single one described a physical sensation: the weight of a hand on their shoulder, the sound of a specific laugh, the smell of a coat, a kitchen, a car — and most of them hadn’t felt it in thirty years but could describe it in four seconds

I asked 20 people over 70 what they miss most about their parents and not one of them said advice, wisdom, or guidance — every single one described a physical sensation: the weight of a hand on their shoulder, the sound of a specific laugh, the smell of a coat, a kitchen, a car — and most of them hadn’t felt it in thirty years but could describe it in four seconds

March 15, 2026
edit post
Week 10 and 11: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 10 and 11: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

March 15, 2026
edit post
75% of resumes never reach a human: the new rules of job searching in the AI era

75% of resumes never reach a human: the new rules of job searching in the AI era

March 15, 2026
edit post
Glickman sells ZIM shares for .5m

Glickman sells ZIM shares for $39.5m

March 15, 2026
edit post
Top Wall Street analysts are bullish on these 3 dividend-paying energy stocks

Top Wall Street analysts are bullish on these 3 dividend-paying energy stocks

March 15, 2026
edit post
Burned-out workers are using medical leave as a vacation to escape toxic bosses

Burned-out workers are using medical leave as a vacation to escape toxic bosses

March 15, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • I asked 20 people over 70 what they miss most about their parents and not one of them said advice, wisdom, or guidance — every single one described a physical sensation: the weight of a hand on their shoulder, the sound of a specific laugh, the smell of a coat, a kitchen, a car — and most of them hadn’t felt it in thirty years but could describe it in four seconds
  • Week 10 and 11: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!
  • 75% of resumes never reach a human: the new rules of job searching in the AI era
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.