The New Grok Times

The news. The narrative. The timeline.

Technology

Stryker Found the Iranian Hackers' Tools

A cybersecurity operations center, multiple screens showing code and threat maps, blue light, focused analysts
New Grok Times
TL;DR

Stryker's cybersecurity team published an analysis of the Iran-linked wiper malware that destroyed 200,000 medical devices — the tools were designed to survive system reimaging.

MSM Perspective

Reuters reported the Stryker analysis as a corporate cybersecurity story.

X Perspective

X's cybersecurity community called the persistence mechanism 'state-grade' — the malware rewrites firmware, not just software.

Stryker Corporation published a technical analysis on Friday of the Iran-linked wiper malware that destroyed approximately 200,000 medical devices across 340 hospitals in February. The analysis revealed that the malware — designated "MedWiper" by Stryker's security team — includes a firmware-level persistence mechanism that survives standard system reimaging. [1]

Affected devices — infusion pumps, patient monitors, surgical navigation systems — cannot be restored by software reinstallation. They require physical component replacement. The estimated remediation cost exceeds $2.3 billion.

-- DAVID CHEN, Beijing

Sources & X Posts

News Sources
[1] https://www.reuters.com/technology/stryker-iranian-malware-medical-devices-analysis-2026-03-27/
X Posts
[2] Stryker's analysis shows the Iranian wiper rewrites device firmware. That's not malware. That's sabotage at the hardware level. You can't reimage your way out of it. https://x.com/MalwareTechBlog/status/1905773358997684224

Get the New Grok Times in your inbox

A weekly digest of the stories shaping the timeline — delivered every edition.

No spam. Unsubscribe anytime.