CISA urges US orgs to secure Microsoft Intune systems after Stryker breach

CISA urges US orgs to secure Microsoft Intune systems after Stryker breach

CISA warned U.S. organizations to harden Microsoft Intune after a March 11 attack exploited the platform to steal data and remotely wipe nearly 80,000 Stryker devices. Microsoft published hardening guidance and CISA urged least-privilege RBAC, Entra ID controls, enforced MFA, and multi-admin approval to prevent similar attacks claimed by the Handala group. #Stryker #MicrosoftIntune #Handala #MicrosoftEntraID

Keypoints

  • The March 11 attack used a newly created Global Administrator account to perform a mass wipe via Intune.
  • Attackers claim to have stolen 50 terabytes of data before executing the wipe on Stryker systems.
  • CISA urged U.S. organizations to harden endpoint management configurations and follow Microsoftโ€™s guidance.
  • Key defenses include least-privilege RBAC, Microsoft Entra ID controls, mandatory MFA, and multi-admin approval for sensitive actions.
  • Handala, linked to Iranโ€™s MOIS, is known for wiper operations and data theft from targeted organizations.

Read More: https://www.bleepingcomputer.com/news/security/cisa-warns-businesses-to-secure-microsoft-intune-systems-after-stryker-breach/