Join Us LIVE, TODAY March 12th, 11am Eastern, 8am Pacific, 4pm UK
Iran appears to have conducted a significant cyberattack against a U.S. company, a first since the war started
An Iran-linked hacker group has claimed responsibility for a cyberattack on a medical tech company in what appears to be the first significant instance of Iran’s hacking an American company since the start of the war between the countries.
The company, Stryker, which is headquartered in Michigan, produces a range of medical equipment and technology.
Historically, Iran has conducted some of the most infamous “wiper” cyberattacks on national enemies, aiming to simply erase all data on computers’ networks. Victims include Saudi Aramco, Saudi Arabia’s national oil company, in 2012, and the Sands Casino in 2014.
Since the war started, some established hacker groups sympathetic to Iranian leadership have claimed minor attacks, but most have been relegated to briefly altering the appearance of a website, and none have appeared to have had major impact. Some tech and cybersecurity companies, including Google, and the email cybersecurity company Proofpoint have told NBC News that they have largely seen Iran’s hackers conducting espionage related to the war.
But that appears to have changed Wednesday, with what appears to have been a different type of attack that also deleted information from devices. A Stryker employee, who requested to not be identified because they are not authorized to speak for the company, said that employee’s work-issued phones stopped working, grinding work and communications with colleagues to a standstill.
Handala Team, which cybersecurity companies say has ties to Iran's Intelligence Ministry, has claimed responsibility for the Stryker hack in statements on its Telegram and X accounts. The group routinely brags about its exploits on the social media platforms, which have in recent days taken down previous versions of their accounts.
Specifics of how the hack was conducted are not clear. But public evidence of the hack points to the likelihood that hackers gained access to the company’s Microsoft Intune account, which the employee confirmed Stryker uses. From there, Handala appears to have wiped some employees’ devices back to factory settings, an expert said.
“They seem to have obtained access to the Microsoft Intune management console. This is a solution for managing corporate devices,” said Rafe Pilling, the director of threat intelligence at the cybersecurity company Sophos, which has linked Handala to Iran’s inteligence operations.
https://www.yahoo.com/news/articles/iran-appears-conducted-significant-cyberattack-014232843.html
How the hell are they gonna get it here …FF is on the way
THIS
Kinda reminds me of the Obama nuke thingy
the Drones in question…
moar
Four Military Drones Stolen from Fort Campbell in Kentucky
Four military drones were stolen from Fort Campbell in Kentucky.
In a post on the U.S. Army Fort Campbell Facebook Page, a spokesperson wrote that four Skydio X10D Drone Systems were stolen from the 326th Division Engineer Battalion building.
The Department of the Army Criminal Investigation Division is offering a reward for information that leads to the conviction of those behind the theft.
The drones were originally stolen in November of last year, but Fort Campbell released information and surveillance photos to the public on March 11.
Image of a reward notice from the Army Criminal Investigation Division offering $5,000 for information on the theft of Skydio X10D drones at Fort Campbell, KY.
Per WKNY:
The U.S. Army Fort Campbell is reporting the theft of four drone systems, and it needs your help to locate the suspects.
According to a social media post by the U.S. Army Fort Campbell, the Department of the Army Criminal Investigation Division is offering $5,000 for information leading to the arrest and conviction of those responsible for the theft.
Fort Campbell states the theft involved four Skydio X10D drone systems.
The drone systems were last seen on November 21, 2025 at the 326th Division Engineer Battalion at Building 6955 on A Shau Valley Road in Fort Campbell, according to the post.
Between November 21-24, 2025, Fort Campbell states unknown individuals unlawfully accessed the building and took the drones.
The Skydio X10D is an unmanned aerial drone designed with a modular payload capability.
The U.S. Army 7th Army Training Command, last July, used the Skydio X10D to drop a live M67 grenade for the first time at the Grafenwoehr Training Area in Germany.
LOOK:
💥Innovation in Action!💡
Using the cutting-edge Skydio X10 drone and a U.S. Army Combat Capabilities Development Command-designed Audible dropper, Soldiers tested the ability to deploy a live M67 grenade at the Grafenwoehr Training Area in Germany. pic.twitter.com/MksoIzKNXD
— CPE Aviation (@CPEAviation) July 24, 2025
The report of the stolen drones came just 24 hours before ABC News reported that the FBI had released a bulletin that warned California police departments that Iran may try to attack the Golden State with drones.
https://www.thegatewaypundit.com/2026/03/four-military-drones-stolen-fort-campbell-kentucky/