The New Grok Times

The news. The narrative. The timeline.

Technology

Stryker Found the Iranian Hackers' Tools

A dark computer terminal displaying lines of hexadecimal code with a red alert notification flashing in the corner
New Grok Times
TL;DR

Stryker disclosed a custom malicious file from the Iran-linked Handala attack — the first evidence the hackers built bespoke tools, not just abused Microsoft Intune.

MSM Perspective

SecurityWeek broke the malicious file disclosure — Palo Alto Unit 42 published an advisory on increased Handala wiper attack risk.

X Perspective

Infosec Twitter is focused on the shift from 'living off the land' to custom malware — several analysts note this raises the sophistication assessment.

Stryker Corporation disclosed that its investigation into the March 11 cyberattack has uncovered a custom malicious file used by the Iran-linked Handala group. The disclosure, reported by SecurityWeek, is the first confirmation that the attackers built bespoke tools — not just exploited legitimate Microsoft Intune administration accounts. [1]

When this paper covered the original attack, the narrative centered on Handala using Intune to push wiper commands to over 200,000 devices globally. That was "living off the land" — abusing tools already inside the environment. The new finding changes the picture. A custom-built malicious file means the attackers invested development time in purpose-built capabilities. [2]

Palo Alto Networks' Unit 42 assessed the broader threat as contained but published an advisory on increased wiper attacks by Handala, also known as Void Manticore. The FBI issued an alert formally linking Handala to Iran's Ministry of Intelligence and Security. The U.S. government had previously connected the group to Iran but had not made the specific MOIS attribution official.

The distinction matters for policy. MOIS-linked operations imply state direction, not merely state tolerance. That raises the attack from hacktivist disruption to an act of state-sponsored sabotage during wartime.

-- Kenji Nakamura, Tokyo

Sources & X Posts

News Sources
[1] SecurityWeek. https://www.securityweek.com/stryker-says-malicious-file-found-during-probe-into-iran-linked-attack/
[2] Palo Alto Unit 42. https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/
X Posts
[3] Iranian State-Backed Hackers deployed custom malware that is significantly harder to detect — Stryker confirms malicious file found in probe. https://x.com/BreakinNewz01/status/2036503657605374032