Three weeks ago, we posted about the Stryker attack — an Iran-linked group called Handala weaponized the company’s own Microsoft Intune platform and wiped over 200,000 devices across 79 offices worldwide. That was just the opening move.

How Fast This Has Escalated

Iranian state-backed operators are demonstrating that takedowns and indictments don’t deter them. And their targeting has shifted from disruption of a single company to direct provocation of U.S. law-enforcement leadership.

These groups are using legitimate enterprise tools as weapons, moving from access to destruction in hours, and treating U.S. companies as legitimate wartime targets.

Three Questions Every CISO Should Be Asking Right Now

What Sphinx Is Doing About It

Sphinx built the Evolved Security Playbook to answer these questions.

Sources

DOJ Office of Public Affairs · Palo Alto Networks Unit 42 Threat Brief · Beazley Security / Halcyon Research · Stryker SEC 8-K Filing · Krebs on Security

Contact Sphinx: contact@sphinxsecure.com

Test your defenses against the actors operating right now.

Engage Sphinx for a RECON assessment, RedShift emulation, or Helix managed defense.

Get Started