No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, May 17, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Enterprise Resiliency Plans Can’t Ignore UEM

by TheAdviserMagazine
2 months ago
in Market Analysis
Reading Time: 6 mins read
A A
Enterprise Resiliency Plans Can’t Ignore UEM
Share on FacebookShare on TwitterShare on LInkedIn


On March 11, media reports indicated that an Iranian-linked hacktivist organization, Handala, claimed to have successfully attacked Stryker Corporation, a Fortune 500 medical device manufacturer. The group also claims to have wiped 200,000 systems and stolen 50 terabytes of data. Unnamed employees on social media said there were widespread network outages and that any user who had Microsoft Office on their personal phones had their devices wiped. In addition, Stryker released a message publicly to customers stating that the attack affected its Microsoft environment. Based on statements from the group claiming responsibility, this cyberattack is a response to the ongoing conflict between the US and Iran and is part of the escalating digital warfare that’s taking place as part of the broader conflict.

So far, Stryker hasn’t released any details about the attack publicly. Reports, however, indicate that this may be wiper malware. Wiper malware can masquerade as ransomware but destroy the victim’s data instead of encrypting it, making recovery more challenging.

Analysis so far also points to the attackers gaining access to Stryker’s mobile device management (MDM) and unified endpoint management (UEM) platform, then being able to extract information and force a system-level wipe and reset on any managed devices. This allegedly impacted personal users who were using their own devices that were registered with the MDM/UEM platform, Microsoft Intune. Please note that this does not necessarily signal a vulnerability with Intune itself. It’s far more likely that the attackers leveraged Intune in a living off the land-style attack, where the attacker uses native tools and processes within the environment to either collect or create an administrative login or is able to exploit those native tools to take administrative-level actions.

Why It Matters

MDM/UEM platform compromises are rare but not new. A recent attack on the European Commission this past January led to an attacker extracting personal information such as names and phone numbers. Malicious actors attacked a multinational conglomerate in 2020, using the MDM to deploy the Cerberus banking trojan. This attack looks different, as the malicious actors had more than data-level access to the platform or app deployment capabilities and were able to utilize administrator-level controls, such as sending wipe commands to managed devices.

Management platforms like MDM/UEM are “keys to the kingdom” systems, as they’re used across enterprises to manage, secure, and monitor the endpoints where users work. While commonly used for desktops and mobile devices, more systems like wearables and browsers are being covered by these platforms. MDM/UEMs allow for centralized control of not just the endpoints but can also bring in app delivery, configure privileged access, deliver certificates, or even get down to BIOS-level controls. A compromise of these platforms has extensive ramifications, as attackers can extract data and wipe devices but can also deploy scripts, relax permissions, and establish command-and-control (C&C) points within the infrastructure. These C&C points are less likely to be detected as malicious, as they’re deployed through normal management channels. From there, attackers could gain access to other corporate data than what is stored locally on the users’ endpoints.

Many enterprises use bring-your-own-device (BYOD) programs. BYOD devices are usually controlled by the MDM/UEM platform, which would give the attacker access to control that endpoint. This could allow them the same level of control as they have on corporate devices, giving them access to personal information as well as corporate info. This makes access to these devices a valuable commodity for malicious actors to sell on hacker marketplaces or to extort individuals.

A common part of the agreement for users enrolling in their company’s BYOD program is that the business retains the right to control, lock, and partially or fully wipe the device in the event of a security incident. This can mean employees can lose access to their personal files on the device and are responsible for regular backups of those files.

The wiping of devices, either corporate- or employee-owned, also highlights a current challenge in enterprises today where data management and security leaders want all business data to be centralized so that it’s easier to control and protect. Yet a lot of data winds up on users’ devices and may never make it to centralized storage. When one system fails, discovering what data was lost and the impact to the business is a challenge, but when 200,000 are wiped, this discovery takes much longer, and it may be some time before the business learns what was truly lost.

What To Do

Based on the claims of the attackers taking responsibility for the cyberattack and their stated reason, the attack appears to be geopolitically motivated. Stryker is a uniquely valuable target for a pro-Iran attacker: It is a publicly traded US company with large contracts with the US military for medical devices, and it has at least one company based in Israel, OrthoSpace Ltd., under its umbrella.

Know The Threat Environment And Prepare

While Stryker may not have been an overt target for a pro-Iran hacker group a month ago, the geopolitical situation is extremely chaotic this year, and the situation has fundamentally changed. The US has been very public about its intent to use cyberattacks more in offensive operations, even outlining this goal in its 2026 cyber strategy for America. To prepare for this, organizations must hold regular (at least once a quarter or more often, depending on resources) geopolitical risk conversations that involve the security team so that they can keep up to date on the latest geopolitical changes and the new attacker groups that may be more inclined to target them.

Companies that think they aren’t likely targets should assess traits such as their country of origin, location of operations, relationship with groups and governments around the world, and the latest threat intelligence about groups that might target them. Examine the tactics, techniques, and procedures of these groups to identify and close potential security posture gaps.

Examine Potential Attack Vectors

While the impacted devices appear restricted to those under MDM/UEM management, it’s imperative that all systems within the enterprise are scanned to look for tools that the threat actors can use to gain access to other data, as well as access to other systems such as those within the operational technology/industrial control system networks where Stryker develops and manufactures its devices.

Understand Your Impact

Stryker has not yet publicly shared any details beyond its Microsoft systems being disrupted. The best course of action is to contact your Stryker account team to find out what details they have available now and learn what their course of action is to communicate with you on the state of things. According to Stryker, its “connected products are not impacted and are fully safe to use.” Pay attention as the company learns more about the nature of the attack.

Users impacted by attacks impacting personal devices such as via the Stryker incident need to know what data may have been extracted. Watch for notices from your employer for more details on what data the attackers accessed. If the threat actor extracted data from BYOD devices, this could mean that anything from personal photos to bank statements on your device were extracted. Also, because of the level of control that MDM/UEM platforms have on managed endpoints, it’s possible that website access tokens and digital certificates could also have been extracted but not the credentials themselves. As a precaution, while the investigation is ongoing, change your passwords for applications and websites you may have been using from your BYO device.

Incidents like this one show the inherent risk of allowing work software on personal devices. It’s worth strongly considering if you would be better off using work-provisioned devices or separate devices solely dedicated to work instead of mixing personal and corporate. This is also an opportunity for risk reduction for the business — BYOD devices are inherently more risky.

Key Takeaways From The Incident

Incidents like this expose attacker techniques and illustrate how attackers may target others, highlighting gaps in many enterprise data resilience strategies. Some actions for all enterprises to take include:

Reviewing access controls to our management platforms like MDM/UEM.
Restricting access to enterprise management systems using phishing-resistant multifactor authentication to ensure that compromised credentials alone don’t allow access.
Configuring destructive actions, such as wiping, to utilize functions such as multi admin approval, which ensures that a single compromised admin account cannot take these actions alone.

The expectation that the only useful infrastructure and data for an organization lives in a data center or cloud environment falls apart in a world where employees are working remotely or where embedded devices and terminals are running full operating systems vulnerable to widespread attacks. Enterprises should make sure that if an attacker is able to compromise a control plane like Intune or execute a malware attack with something like wiper, they can recover those devices quickly or at least get employees and customers access to their data.

We’re closely watching this incident and will continue to share our insight as details emerge and we get definitive answers on what data may have been lost and other particulars that exposed how this attack took place.

Connect With Us

Forrester clients with questions related to this can connect with us through an inquiry or guidance session.



Source link

Tags: EnterpriseignoreplansresiliencyUEM
ShareTweetShare
Previous Post

Mortgage Rates Today, Friday, March 13: Kind of a Big Jump

Next Post

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Related Posts

edit post
Channel Program Compliance and Security: The 2026 Enterprise Guide

Channel Program Compliance and Security: The 2026 Enterprise Guide

by TheAdviserMagazine
May 16, 2026
0

In 2026, channel compliance is no longer a legal checkbox but a data-driven security discipline that protects brand equity and...

edit post
Scaling a Global Channel Program: The 2026 Framework for Automated Growth

Scaling a Global Channel Program: The 2026 Framework for Automated Growth

by TheAdviserMagazine
May 15, 2026
0

Most organizations believe scaling a global channel program is a recruitment challenge; however, adding more partners to a fragmented system...

edit post
3 Resilient Software Stocks Built to Thrive Amid AI Disruption

3 Resilient Software Stocks Built to Thrive Amid AI Disruption

by TheAdviserMagazine
May 15, 2026
0

Amid AI disruption fears, some software leaders are actually strengthening their moats. Snowflake, Reddit, and Workday each possess unique assets...

edit post
Football 2026 Fan Behaviour, Media Consumption & Tournament Predictions

Football 2026 Fan Behaviour, Media Consumption & Tournament Predictions

by TheAdviserMagazine
May 15, 2026
0

This report presents findings from the GeoPoll Africa Football Survey 2026, a five-country study conducted in May 2026. The survey...

edit post
Bitcoin Hovers Near K on Strong ETF Demand, but Macro Pressure Limits Upside

Bitcoin Hovers Near $80K on Strong ETF Demand, but Macro Pressure Limits Upside

by TheAdviserMagazine
May 15, 2026
0

Institutional ETF inflows and corporate accumulation continue supporting Bitcoin’s recovery above key technical levels. Macroeconomic pressures and rising are limiting...

edit post
Anthropic Raises The Stakes For Digital Wealth Management Platform Vendors

Anthropic Raises The Stakes For Digital Wealth Management Platform Vendors

by TheAdviserMagazine
May 15, 2026
0

Anthropic’s latest move — agent templates for various finance and client coverage functions — is part of a broader trend...

Next Post
edit post
Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

Coca-Cola: Pullback am EMA 50 bietet Einstiegschance!

edit post
Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

Fourth-quarter GDP revised down to just 0.7% growth; January core inflation was 3.1%

  • Trending
  • Comments
  • Latest
edit post
Gavin Newsom issues ‘final warning’ amid California’s dire housing crisis — what’s at stake for millions of residents

Gavin Newsom issues ‘final warning’ amid California’s dire housing crisis — what’s at stake for millions of residents

May 3, 2026
edit post
Florida Warning: With Senior SNAP Benefits Averaging 8/Month, Thousands Risk Losing Assistance in 2026

Florida Warning: With Senior SNAP Benefits Averaging $188/Month, Thousands Risk Losing Assistance in 2026

April 27, 2026
edit post
From Maine to Michigan, Democrats Are Making Communism Great Again

From Maine to Michigan, Democrats Are Making Communism Great Again

May 16, 2026
edit post
Minnesota Wealth Tax | Intangible Personal Property Tax

Minnesota Wealth Tax | Intangible Personal Property Tax

May 6, 2026
edit post
10 Cheapest High Dividend Stocks With P/E Ratios Under 10

10 Cheapest High Dividend Stocks With P/E Ratios Under 10

April 13, 2026
edit post
Exclusive: America’s largest Black-owned bank launches podcast with mission to unlock hidden shame holding back generational wealth

Exclusive: America’s largest Black-owned bank launches podcast with mission to unlock hidden shame holding back generational wealth

April 29, 2026
edit post
Iran campaign depresses Israel’s economy

Iran campaign depresses Israel’s economy

0
edit post
‘Biggest bottleneck in the AI buildup’ fuels DRAM ETF to record

‘Biggest bottleneck in the AI buildup’ fuels DRAM ETF to record

0
edit post
Channel Program Compliance and Security: The 2026 Enterprise Guide

Channel Program Compliance and Security: The 2026 Enterprise Guide

0
edit post
Scotiabank Lifts Target on W. P. Carey (WPC) as Net Lease REITs Report Stronger AFFO

Scotiabank Lifts Target on W. P. Carey (WPC) as Net Lease REITs Report Stronger AFFO

0
edit post
Bitcoin has one level left before macro pressure opens the path to k as Treasury yields extend two-day correction

Bitcoin has one level left before macro pressure opens the path to $75k as Treasury yields extend two-day correction

0
edit post
4 High-Use Drugs That Will Have Lower Medicare Prices — And 3 Others Facing Negotiations

4 High-Use Drugs That Will Have Lower Medicare Prices — And 3 Others Facing Negotiations

0
edit post
Iran campaign depresses Israel’s economy

Iran campaign depresses Israel’s economy

May 17, 2026
edit post
Bitcoin has one level left before macro pressure opens the path to k as Treasury yields extend two-day correction

Bitcoin has one level left before macro pressure opens the path to $75k as Treasury yields extend two-day correction

May 17, 2026
edit post
What does an import restriction mean for silver investments?

What does an import restriction mean for silver investments?

May 17, 2026
edit post
Wall Street is keeping a close eye on Kevin Warsh. This is what they’re watching out for

Wall Street is keeping a close eye on Kevin Warsh. This is what they’re watching out for

May 17, 2026
edit post
Ethereum Triangle Breakdown Adds Pressure On Its Recovery Outlook

Ethereum Triangle Breakdown Adds Pressure On Its Recovery Outlook

May 16, 2026
edit post
What Comes Next for the CLARITY Act? Grayscale Flags Key Hurdles

What Comes Next for the CLARITY Act? Grayscale Flags Key Hurdles

May 16, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Iran campaign depresses Israel’s economy
  • Bitcoin has one level left before macro pressure opens the path to $75k as Treasury yields extend two-day correction
  • What does an import restriction mean for silver investments?
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.