March 13, 2026
6 min read
Alan Wallace

Weekly Cyber Intel Brief - Week of March 9-13, 2026

Iran-linked hackers mass-wiped Stryker devices via Microsoft Intune, a year-long TriZetto healthcare breach exposed 3.4 million patients, and ShinyHunters harvested data from 100 Salesforce Experience Cloud customers.

Share:
Weekly Cyber Intel Brief - Week of March 9-13, 2026

PressContact tracks the cybersecurity stories generating the most media coverage and security team attention each week. Here are the three that defined the week of March 9-13, 2026.

1. Iran-Linked Hackers Mass-Wipe Stryker Devices via Microsoft Intune

CriticalMarch 11-13, 2026Source: NBC News, Fox Business, Check Point Research

An Iran-linked hacking group claimed responsibility for a major cyberattack against Stryker (NYSE: SYK), one of the world's largest medical device companies, headquartered in Portage, Michigan. The attack reportedly disabled approximately 200,000 devices and extracted an estimated 50TB of data. Employees reported that work-issued phones and laptops stopped functioning entirely on the morning of Wednesday, March 11, 2026.

The attackers obtained employee login credentials and gained access to Stryker's Microsoft Intune account - the corporate mobile device management (MDM) platform. They then used Intune's legitimate remote wipe feature to mass-erase devices across the organization. Rather than deploying custom malware, the threat actors weaponized a standard IT management tool. Kevin Mandia, CEO of Armadin, described it as a "clever" and unexpected method that can bring a company to a halt without triggering traditional malware detection.

Attribution is consistent with Iran's documented pattern of retaliatory cyber operations following U.S.-Israeli military strikes. Check Point Research mapped multiple Iran-linked clusters - including Cotton Sandstorm, Educated Manticore, MuddyWater, Handala, and Agrius - conducting espionage, disruption, and influence operations in the current conflict period.

What to watch: This appears to be the first significant Iranian cyber operation against a U.S. company since the start of the current U.S.-Israel-Iran conflict. MDM platforms with remote wipe capabilities are now confirmed high-value targets. Any organization using Microsoft Intune needs strong MFA and privileged access controls on admin accounts immediately.

2. TriZetto Healthcare Breach - 3.4 Million Patients, One Year of Undetected Access

Data BreachMarch 9, 2026Source: TechRadar, Security Affairs

TriZetto Provider Solutions (TPS), a healthcare technology company owned by Cognizant, disclosed a data breach affecting 3,433,965 individuals. The company filed a breach notification with the Maine Attorney General and began notifying affected patients this week.

An unauthorized threat actor first gained access to a web portal used by TriZetto's healthcare provider customers in November 2024. The intrusion went undetected until October 2, 2025 - nearly a year of active data exfiltration. Notifications to affected individuals were issued in early March 2026, following the completion of the forensic investigation. The breach included names, birth dates, Social Security numbers, health insurance member numbers, provider names, and other demographic and health data. TriZetto supports approximately 200 million members and 875,000 healthcare providers.

What to watch: The nearly year-long dwell time before detection is a significant red flag. For communications professionals: if your clients operate in healthcare tech or insurance, this breach is a useful benchmark for crisis response timelines and notification obligations. SSNs and insurance data can surface on dark web markets years after a breach.

3. ShinyHunters Harvests Data from 100 Salesforce Experience Cloud Customers

Active CampaignMarch 11, 2026Source: Help Net Security, Infosecurity Magazine

The ShinyHunters cybercrime group claimed responsibility for a data theft campaign targeting Salesforce Experience Cloud customers. The group states it has stolen data from approximately 100 high-profile companies by exploiting misconfigured guest user permissions in Salesforce's public-facing Experience Cloud sites.

Attackers used a modified version of AuraInspector - an open-source tool originally developed by Mandiant to help defenders audit Salesforce Aura framework configurations. ShinyHunters weaponized it to mass-scan public-facing Experience Cloud sites, probe the /s/sfsites/aura API endpoint, and query Salesforce CRM objects without authentication where guest user profiles had excessive permissions. The group claims it began exploiting insecure configurations in September 2025 and started using the modified tool in January 2026.

Salesforce confirmed the attack campaign on March 7, 2026, noting it does not involve a platform vulnerability but rather customer misconfiguration. The company urged customers to enforce a "Least Privilege" access model, disable unauthenticated API access, and restrict guest user permissions.

What to watch: Any organization running public-facing Salesforce Experience Cloud sites should audit guest user permissions immediately. Disabling public APIs is described as "the highest-impact single change" to close the attack vector. ShinyHunters' typical playbook involves cyber extortion - threatening to leak stolen data unless a ransom is paid.

Also on the Radar

  • AkzoNobel:Anubis ransomware group claimed 170 GB stolen, including employee and financial records, from the global paint manufacturer's U.S. site. (Check Point Research, March 9)
  • LexisNexis:Attackers claimed theft of 3.9 million records, including approximately 400,000 user profiles and some government accounts. Company says exposed systems held mainly pre-2020 legacy data. (Check Point Research, March 9)
  • Chrome/Edge AI Extensions:Researchers uncovered AI-themed browser extensions harvesting LLM chat histories and browsing activity from 900,000 users across 20,000 enterprise environments. (Check Point Research, March 9)
  • CVE-2026-0628 (Chrome/Gemini):Google patched a high-severity flaw in Chrome's Gemini AI panel allowing malicious extensions to inject code and access cameras and microphones. (Check Point Research, March 9)

PressContact publishes the Weekly Cyber Intel Brief to help security vendors, PR teams, and communications professionals stay current on the stories generating the most coverage and industry attention. If you work in cybersecurity PR and want to discuss any of these stories, reach out directly.