this post was submitted on 12 Mar 2026
294 points (99.3% liked)

News

36491 readers
2972 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious biased sources will be removed at the mods’ discretion. Supporting links can be added in comments or posted separately but not to the post body. Sources may be checked for reliability using Wikipedia, MBFC, AdFontes, GroundNews, etc.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source. Clickbait titles may be removed.


Posts which titles don’t match the source may be removed. If the site changed their headline, we may ask you to update the post title. Clickbait titles use hyperbolic language and do not accurately describe the article content. When necessary, post titles may be edited, clearly marked with [brackets], but may never be used to editorialize or comment on the content.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials, videos, blogs, press releases, or celebrity gossip will be allowed. All posts will be judged on a case-by-case basis. Mods may use discretion to pre-approve videos or press releases from highly credible sources that provide unique, newsworthy content not available or possible in another format.


7. No duplicate posts.


If an article has already been posted, it will be removed. Different articles reporting on the same subject are permitted. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners or news aggregators.


All posts must link to original article sources. You may include archival links in the post description. News aggregators such as Yahoo, Google, Hacker News, etc. should be avoided in favor of the original source link. Newswire services such as AP, Reuters, or AFP, are frequently republished and may be shared from other credible sources.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 2 years ago
MODERATORS
 

An Iran-linked hacker group has claimed responsibility for a cyberattack on a medical tech company in what appears to be the first significant instance of Iran’s hacking an American company since the start of the war between the countries.

The company, Stryker, which is headquartered in Michigan, produces a range of medical equipment and technology.

Historically, Iran has conducted some of the most infamous “wiper” cyberattacks on national enemies, aiming to simply erase all data on computers’ networks. Victims include Saudi Aramco, Saudi Arabia’s national oil company, in 2012, and the Sands Casino in 2014.

you are viewing a single comment's thread
view the rest of the comments
[–] aramis87@fedia.io 17 points 1 day ago (2 children)

Because it's a warning shot. They don't want to immediately target the US government, large financial or tech companies, or infrastructure - they may attack those later, but not at the start. It's too quick an escalation.

If and when they do attack the US government sites, expect it to be a "less consequential" agency - Health and Human Services or something. If they have a way into the Pentagon, Department of Energy, or other high-value targets (for them), then the information they can get from those targets is way more valuable than attacking them and losing that access.

[–] CorrectAlias@piefed.blahaj.zone 7 points 1 day ago* (last edited 1 day ago)

I honestly kind of doubt what you say in your first paragraph. Their country is getting glassed, why would they hold back? Do you think that they're thinking the US government will stop if they breach a mid sized company? Besides, it's not a great "warning shot" when most of the general public has no idea what the company is (this is America we're talking about).

What I think is more likely is that it was found on Shodan (or similar), researched, and since it's a sizable US company with clear attack vectors, they took action. I don't think they specifically sought out this company.

Targets like the US government, banks, and tech companies generally have the money to defend against such exploits, to a point. To be clear, I'm not saying that these large organizations do not have exploitable infrastructure (especially the US govt these days). I'm saying that they have the money, employees, and capacity to reduce their attack surfaces, and also have alarming for when something abnormal is detected. It's a similar strategy for homes and businesses with prominent security cameras in plain view. The security cameras can't physically stop a burglary, but they do make the location less of an easy target and cause most criminals to find somewhere without them instead.

For a little bit of context and without doxxing myself, I've worked for several large fortune 50 companies on the tech side of things, and many of these attacks were caught and dealt with internally without the need to notify anyone in the public. There have been a ton of non-publicly disclosed attacks from state level actors in these organizations, and they've only been increasing, even before this illegal war.

Again, not to say that Iran doesn't have some tricks up their sleeves in regard cyberattacks. I do think that they will eventually breach and damage some huge companies in the near future, I just don't think that this was any type of warning shot.

[–] dominic.borcea@piefed.social 4 points 1 day ago

It’s too quick an escalation.

I'm sorry? They're okay with bombing US bases and kill soldiers, but cyber attacks against government websites is one step too far? They're bombing shit left and right but hacking some Usaian company is too much?

Sorry, that really doesn't track.

A more feasible explanation would be that this is the best they can do right now. I really don't see any reason why they would hold back.