No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, April 26, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Enterprise Resiliency Plans Can’t Ignore UEM

by TheAdviserMagazine
1 month ago
in Market Analysis
Reading Time: 6 mins read
A A
Enterprise Resiliency Plans Can’t Ignore UEM
Share on FacebookShare on TwitterShare on LInkedIn


On March 11, media reports indicated that an Iranian-linked hacktivist organization, Handala, claimed to have successfully attacked Stryker Corporation, a Fortune 500 medical device manufacturer. The group also claims to have wiped 200,000 systems and stolen 50 terabytes of data. Unnamed employees on social media said there were widespread network outages and that any user who had Microsoft Office on their personal phones had their devices wiped. In addition, Stryker released a message publicly to customers stating that the attack affected its Microsoft environment. Based on statements from the group claiming responsibility, this cyberattack is a response to the ongoing conflict between the US and Iran and is part of the escalating digital warfare that’s taking place as part of the broader conflict.

So far, Stryker hasn’t released any details about the attack publicly. Reports, however, indicate that this may be wiper malware. Wiper malware can masquerade as ransomware but destroy the victim’s data instead of encrypting it, making recovery more challenging.

Analysis so far also points to the attackers gaining access to Stryker’s mobile device management (MDM) and unified endpoint management (UEM) platform, then being able to extract information and force a system-level wipe and reset on any managed devices. This allegedly impacted personal users who were using their own devices that were registered with the MDM/UEM platform, Microsoft Intune. Please note that this does not necessarily signal a vulnerability with Intune itself. It’s far more likely that the attackers leveraged Intune in a living off the land-style attack, where the attacker uses native tools and processes within the environment to either collect or create an administrative login or is able to exploit those native tools to take administrative-level actions.

Why It Matters

MDM/UEM platform compromises are rare but not new. A recent attack on the European Commission this past January led to an attacker extracting personal information such as names and phone numbers. Malicious actors attacked a multinational conglomerate in 2020, using the MDM to deploy the Cerberus banking trojan. This attack looks different, as the malicious actors had more than data-level access to the platform or app deployment capabilities and were able to utilize administrator-level controls, such as sending wipe commands to managed devices.

Management platforms like MDM/UEM are “keys to the kingdom” systems, as they’re used across enterprises to manage, secure, and monitor the endpoints where users work. While commonly used for desktops and mobile devices, more systems like wearables and browsers are being covered by these platforms. MDM/UEMs allow for centralized control of not just the endpoints but can also bring in app delivery, configure privileged access, deliver certificates, or even get down to BIOS-level controls. A compromise of these platforms has extensive ramifications, as attackers can extract data and wipe devices but can also deploy scripts, relax permissions, and establish command-and-control (C&C) points within the infrastructure. These C&C points are less likely to be detected as malicious, as they’re deployed through normal management channels. From there, attackers could gain access to other corporate data than what is stored locally on the users’ endpoints.

Many enterprises use bring-your-own-device (BYOD) programs. BYOD devices are usually controlled by the MDM/UEM platform, which would give the attacker access to control that endpoint. This could allow them the same level of control as they have on corporate devices, giving them access to personal information as well as corporate info. This makes access to these devices a valuable commodity for malicious actors to sell on hacker marketplaces or to extort individuals.

A common part of the agreement for users enrolling in their company’s BYOD program is that the business retains the right to control, lock, and partially or fully wipe the device in the event of a security incident. This can mean employees can lose access to their personal files on the device and are responsible for regular backups of those files.

The wiping of devices, either corporate- or employee-owned, also highlights a current challenge in enterprises today where data management and security leaders want all business data to be centralized so that it’s easier to control and protect. Yet a lot of data winds up on users’ devices and may never make it to centralized storage. When one system fails, discovering what data was lost and the impact to the business is a challenge, but when 200,000 are wiped, this discovery takes much longer, and it may be some time before the business learns what was truly lost.

What To Do

Based on the claims of the attackers taking responsibility for the cyberattack and their stated reason, the attack appears to be geopolitically motivated. Stryker is a uniquely valuable target for a pro-Iran attacker: It is a publicly traded US company with large contracts with the US military for medical devices, and it has at least one company based in Israel, OrthoSpace Ltd., under its umbrella.

Know The Threat Environment And Prepare

While Stryker may not have been an overt target for a pro-Iran hacker group a month ago, the geopolitical situation is extremely chaotic this year, and the situation has fundamentally changed. The US has been very public about its intent to use cyberattacks more in offensive operations, even outlining this goal in its 2026 cyber strategy for America. To prepare for this, organizations must hold regular (at least once a quarter or more often, depending on resources) geopolitical risk conversations that involve the security team so that they can keep up to date on the latest geopolitical changes and the new attacker groups that may be more inclined to target them.

Companies that think they aren’t likely targets should assess traits such as their country of origin, location of operations, relationship with groups and governments around the world, and the latest threat intelligence about groups that might target them. Examine the tactics, techniques, and procedures of these groups to identify and close potential security posture gaps.

Examine Potential Attack Vectors

While the impacted devices appear restricted to those under MDM/UEM management, it’s imperative that all systems within the enterprise are scanned to look for tools that the threat actors can use to gain access to other data, as well as access to other systems such as those within the operational technology/industrial control system networks where Stryker develops and manufactures its devices.

Understand Your Impact

Stryker has not yet publicly shared any details beyond its Microsoft systems being disrupted. The best course of action is to contact your Stryker account team to find out what details they have available now and learn what their course of action is to communicate with you on the state of things. According to Stryker, its “connected products are not impacted and are fully safe to use.” Pay attention as the company learns more about the nature of the attack.

Users impacted by attacks impacting personal devices such as via the Stryker incident need to know what data may have been extracted. Watch for notices from your employer for more details on what data the attackers accessed. If the threat actor extracted data from BYOD devices, this could mean that anything from personal photos to bank statements on your device were extracted. Also, because of the level of control that MDM/UEM platforms have on managed endpoints, it’s possible that website access tokens and digital certificates could also have been extracted but not the credentials themselves. As a precaution, while the investigation is ongoing, change your passwords for applications and websites you may have been using from your BYO device.

Incidents like this one show the inherent risk of allowing work software on personal devices. It’s worth strongly considering if you would be better off using work-provisioned devices or separate devices solely dedicated to work instead of mixing personal and corporate. This is also an opportunity for risk reduction for the business — BYOD devices are inherently more risky.

Key Takeaways From The Incident

Incidents like this expose attacker techniques and illustrate how attackers may target others, highlighting gaps in many enterprise data resilience strategies. Some actions for all enterprises to take include:

Reviewing access controls to our management platforms like MDM/UEM.
Restricting access to enterprise management systems using phishing-resistant multifactor authentication to ensure that compromised credentials alone don’t allow access.
Configuring destructive actions, such as wiping, to utilize functions such as multi admin approval, which ensures that a single compromised admin account cannot take these actions alone.

The expectation that the only useful infrastructure and data for an organization lives in a data center or cloud environment falls apart in a world where employees are working remotely or where embedded devices and terminals are running full operating systems vulnerable to widespread attacks. Enterprises should make sure that if an attacker is able to compromise a control plane like Intune or execute a malware attack with something like wiper, they can recover those devices quickly or at least get employees and customers access to their data.

We’re closely watching this incident and will continue to share our insight as details emerge and we get definitive answers on what data may have been lost and other particulars that exposed how this attack took place.

Connect With Us

Forrester clients with questions related to this can connect with us through an inquiry or guidance session.



Source link

Tags: EnterpriseignoreplansresiliencyUEM
ShareTweetShare
Previous Post

Mortgage Rates Today, Friday, March 13: Kind of a Big Jump

Next Post

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Related Posts

edit post
Software for Managing Channel Rebates: The 2026 Executive Guide to Automated Incentives

Software for Managing Channel Rebates: The 2026 Executive Guide to Automated Incentives

by TheAdviserMagazine
April 25, 2026
0

A typical manufacturer loses up to 10% of their total incentive budget every year to “leakage” caused by manual processing...

edit post
How to Automate Partner Rebate Programs: The 2026 Strategy Guide

How to Automate Partner Rebate Programs: The 2026 Strategy Guide

by TheAdviserMagazine
April 24, 2026
0

According to a 2023 report by the Incentive Research Foundation, manual incentive management results in a 10% error rate in...

edit post
Lessons From IT Security: How Revenue Enablement Builds Executive Relevance

Lessons From IT Security: How Revenue Enablement Builds Executive Relevance

by TheAdviserMagazine
April 24, 2026
0

We recently published Advocating For Revenue Enablement: A Practitioner’s Guide To Executive Communications, a report born from a familiar frustration: Revenue...

edit post
What Will Decide the Future of Tokenized Finance?

What Will Decide the Future of Tokenized Finance?

by TheAdviserMagazine
April 24, 2026
0

Tokenization is shaping into a foundation for the next wave of financial system development. Experts and analysts discussed it at...

edit post
In The AI Era, Banks Need Dynamic Platforms — Results From The Forrester Wave™: Digital Banking Engagement Platforms, Q2 2026

In The AI Era, Banks Need Dynamic Platforms — Results From The Forrester Wave™: Digital Banking Engagement Platforms, Q2 2026

by TheAdviserMagazine
April 24, 2026
0

To compete for customers and grow profitably, banks need the ability to adjust as much and as fast as required...

edit post
Digital Natives Are Rewriting B2B Buying

Digital Natives Are Rewriting B2B Buying

by TheAdviserMagazine
April 24, 2026
0

Today’s B2B buying groups are bigger, more networked, and increasingly led by digital natives. In Forrester’s Buyers’ Journey Survey, 2025, 64%...

Next Post
edit post
Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

edit post
Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

  • Trending
  • Comments
  • Latest
edit post
Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

March 27, 2026
edit post
Virginia Permits ADULT MIGRANT MEN To Attend High School

Virginia Permits ADULT MIGRANT MEN To Attend High School

March 30, 2026
edit post
A 58-year-old left NYC for Miami to save on taxes — then retired early thanks to hidden savings. Here’s the math

A 58-year-old left NYC for Miami to save on taxes — then retired early thanks to hidden savings. Here’s the math

March 30, 2026
edit post
Tax Flight Accelerates In Massachusetts

Tax Flight Accelerates In Massachusetts

April 6, 2026
edit post
Property Tax Relief & Income Tax Relief

Property Tax Relief & Income Tax Relief

April 1, 2026
edit post
The Stevia Loophole Why Some Sweetened Drinks are Still SNAP-Legal While Others are Banned in Texas

The Stevia Loophole Why Some Sweetened Drinks are Still SNAP-Legal While Others are Banned in Texas

April 4, 2026
edit post
As Inflation Reignites, Should You Consider I Bonds?

As Inflation Reignites, Should You Consider I Bonds?

0
edit post
Can the IRS Ignore Your Request for an Estate Tax Valuation Explanation? – Houston Tax Attorneys

Can the IRS Ignore Your Request for an Estate Tax Valuation Explanation? – Houston Tax Attorneys

0
edit post
Stock Market Holiday: NSE, BSE to remain shut one day this week. Check upcoming market holidays

Stock Market Holiday: NSE, BSE to remain shut one day this week. Check upcoming market holidays

0
edit post
“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

0
edit post
John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

0
edit post
McMahan On Killing in War

McMahan On Killing in War

0
edit post
“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

April 26, 2026
edit post
Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

April 26, 2026
edit post
John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

April 26, 2026
edit post
Stablecoin Market Sheds 2M as KelpDAO Breach Triggers DeFi Unwind

Stablecoin Market Sheds $892M as KelpDAO Breach Triggers DeFi Unwind

April 26, 2026
edit post
Gilead Sciences Inc. (GILD): Growing Popularity as Defensive Stock

Gilead Sciences Inc. (GILD): Growing Popularity as Defensive Stock

April 26, 2026
edit post
As Inflation Reignites, Should You Consider I Bonds?

As Inflation Reignites, Should You Consider I Bonds?

April 26, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • “Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious
  • Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!
  • John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.