Secure endpoint management systems immediately, CISA urges
Help Net SecurityArchived Mar 19, 2026✓ Full text saved
The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber activity tied to Middle East conflicts may be spilling into their operations. Attackers breached Stryker’s internal Microsoft environment and reportedly wiped 200,000 systems, servers, and mobile devices, while extracting 50 terabytes of data. To defend against similar malicious activity involving the misuse of legitimate end
Full text archived locally
✦ AI Summary· Claude Sonnet
Sinisa Markovic, Senior Staff Writer, Help Net Security
March 19, 2026
Share
Secure endpoint management systems immediately, CISA urges
The US Cybersecurity and Infrastructure Security Agency (CISA) warns that the cyberattack on Stryker Corporation serves as a signal to U.S. organizations that foreign cyber activity tied to Middle East conflicts may be spilling into their operations.
Attackers breached Stryker’s internal Microsoft environment and reportedly wiped 200,000 systems, servers, and mobile devices, while extracting 50 terabytes of data.
To defend against similar malicious activity involving the misuse of legitimate endpoint management software, CISA urges organizations to implement Microsoft’s best practices for securing Microsoft Intune and apply the same principles to other endpoint management platforms.
The agency recommends using least privilege when designing administrative roles, limiting access through role-based controls, and enforcing phishing-resistant MFA. It also advises using Microsoft Entra ID capabilities to block unauthorized access to privileged actions in Microsoft Intune.
“Set up policies that require a second administrative account’s approval to allow changes to sensitive or high-impact actions (such as device wiping), applications, scripts, RBAC, configurations, etc,” CISA added.
CISA said it is collaborating with federal partners, including the FBI, to identify potential threats and determine mitigation actions.
More about
CISA
cybersecurity
endpoint management
endpoint security
government
Microsoft
USA
Share