Essential flaw
If Intune was the path to compromise, the primary job for Stryker’s forensics staff shall be to work out how attackers obtained into the system.
“Stryker makes use of Entra for authentication, which integrates the whole lot into this with single sign-on, together with the software program that builds and updates all units, together with servers, laptops, and telephones,” commented Rob Demain, CEO of security managed security firm, e2e-assure.
“It is a greatest follow design sample, however with a essential flaw: if it’s compromised, the attacker has entry to wipe all units, which appears to be what has occurred right here. Preliminary entry is more likely to be through credential theft, sometimes Adversary-in-the-Center (AitM).”



