Stryker's cybersecurity team published an analysis of the Iran-linked wiper malware that destroyed 200,000 medical devices — the tools were designed to survive system reimaging.
Reuters reported the Stryker analysis as a corporate cybersecurity story.
X's cybersecurity community called the persistence mechanism 'state-grade' — the malware rewrites firmware, not just software.
Stryker Corporation published a technical analysis on Friday of the Iran-linked wiper malware that destroyed approximately 200,000 medical devices across 340 hospitals in February. The analysis revealed that the malware — designated "MedWiper" by Stryker's security team — includes a firmware-level persistence mechanism that survives standard system reimaging. [1]
Affected devices — infusion pumps, patient monitors, surgical navigation systems — cannot be restored by software reinstallation. They require physical component replacement. The estimated remediation cost exceeds $2.3 billion.
-- DAVID CHEN, Beijing