Weekly Cyber Intel Brief - Week of March 14-20, 2026
Pro-Iran hackers weaponized Microsoft Intune to mass-wipe Stryker devices, the DOJ dismantled four major IoT botnets comprising three million compromised devices, and a fintech vendor breach exposed 672,000 bank customers' financial data seven months after the attack.

PressContact tracks the cybersecurity stories generating the most media coverage and security team attention each week. Here are the three that defined the week of March 14-20, 2026.
1. Pro-Iran Hackers Mass-Wipe Stryker Devices via Microsoft Intune
Pro-Iran threat actors breached medical technology company Stryker and weaponized Microsoft Intune - the company's enterprise Mobile Device Management (MDM) platform - to remotely wipe thousands of phones, tablets, and computers across the organization. CISA issued an urgent advisory warning all organizations to audit their Intune administrator accounts and review conditional access policies immediately.
This is the first major documented case of attackers using an enterprise MDM tool as a destructive weapon at scale. The attack vector is straightforward: compromise a single privileged Intune admin account, and you have the ability to factory-reset every managed device in the organization simultaneously. Stryker was forced to begin manually restoring its ordering and shipping systems after the wipe.
The PR and communications angle here is significant. Stryker's response - the timeline from detection to public disclosure, the messaging to customers whose orders were disrupted, and the coordination with CISA - is a live case study in crisis communications for a destructive attack. Any organization using Microsoft Intune (which is most enterprises running Microsoft 365) needs to treat this as a direct threat model, not a one-off incident.
2. US, Germany, and Canada Dismantle Four Major IoT DDoS Botnets
The U.S. Department of Justice, working with law enforcement in Germany and Canada and dozens of technology companies including Amazon, seized infrastructure supporting four major IoT botnets: Aisuru, KimWolf, JackSkid, and Mossad. Combined, the four networks controlled approximately three million compromised devices - cameras, routers, streaming TV boxes, and other IoT hardware - and had issued hundreds of thousands of DDoS attack commands against targets including U.S. Department of Defense networks.
Cloudflare had previously warned that Aisuru and KimWolf together could "cripple critical infrastructure, crash most legacy cloud-based DDoS protection solutions, and even disrupt the connectivity of entire nations." KimWolf was particularly notable for targeting residential proxy networks - it infiltrated home networks through compromised streaming devices, bypassing the protection that home routers typically provide against external threats.
Amazon's involvement is worth noting. The company's vice president Tom Scholl confirmed that Amazon helped the FBI and Defense Department identify the botnets' command-and-control infrastructure and reverse-engineered the malware to understand its operations. This is a model for how cloud providers can contribute to law enforcement operations without waiting for a subpoena.
3. Marquis Fintech Breach - 672,000 Bank Customers' Financial Data Stolen Seven Months Ago
Marquis, a Plano, Texas-based fintech company that provides data analytics services to hundreds of community banks and credit unions, disclosed this week that 672,075 individuals had personal and financial data stolen in a ransomware attack that occurred in August 2025. The company is now notifying affected individuals - seven months after the breach.
This is a textbook third-party vendor breach scenario. The affected individuals are customers of the banks that use Marquis, not Marquis customers directly. Most of them had no idea Marquis existed before receiving a breach notification letter. The data stolen includes the kind of information used in financial fraud: account numbers, transaction histories, and personal identifiers.
The seven-month notification gap is the communications story here. Under most U.S. state breach notification laws, companies have 30-90 days to notify affected individuals once they have confirmed a breach. A gap of this length suggests either a prolonged investigation, legal complexity around what was actually stolen, or delayed discovery of the full scope. Any of those explanations raises questions that regulators and plaintiffs' attorneys will be asking.
PressContact publishes the Weekly Cyber Intel Brief to help security vendors, PR teams, and communications professionals stay current on the stories generating the most coverage and industry attention. If you work in cybersecurity PR and want to discuss any of these stories, reach out directly.


