The week in breach news

Nation-state threats take center stage this week, with an Iran-linked cyberattack disrupting operations at medical giant Stryker and the FBI investigating a suspected Chinese intrusion into its surveillance network. Meanwhile, other incidents continue to unfold, including a breach in France’s healthcare system that exposed 15.8 million records, new threats targeting Salesforce Experience Cloud sites and confirmation that a ransomware attack at the University of Hawaii Cancer Center exposed nearly 1.2 million individuals.

United States

Stryker Corporation

Industry: Healthcare Exploit: Nation-State

Operations at Stryker, America’s largest medical device maker, remain disrupted more than a week after an Iran-linked cyberattack.

On March 11, Stryker Corporation confirmed it suffered a significant cyber incident that impacted its global Microsoft environment. The Iran-linked threat actor Handala claimed responsibility for the attack, which appears to be politically motivated and destructive in nature. Unlike typical financially driven incidents, Stryker stated there is no indication of ransomware or traditional malware, suggesting a deliberate data destruction campaign rather than extortion.

Reports indicate that attackers may have exploited Microsoft Intune, Stryker’s mobile device management platform, to issue remote wipe commands across corporate devices worldwide. The group claims to have wiped thousands of servers and endpoints, including Windows laptops and smartphones, and alleges the exfiltration of up to 50 TB of corporate data.

Source

How it could affect your business

It is important to note that relying on the belief that “the cloud has it covered” can leave organizations exposed when core systems are compromised. Even cloud-based environments such as Microsoft Azure, Microsoft 365 or Google Workspace can become single points of failure, making it critical to maintain independent, third-party backups. Distributing data across separate environments helps reduce single-cloud risk and ensures organizations can recover even when primary platforms are disrupted.

United States

Federal Bureau of Investigation (FBI)

Industry: Government & Public Sector Exploit: Nation-State

In another nation-state-linked incident, the Federal Bureau of Investigation (FBI) is investigating suspicious cyber activity on its critical surveillance network.

U.S. investigators believe hackers affiliated with the Chinese government are responsible for a cyber intrusion into an internal FBI computer system that holds information related to certain domestic surveillance orders. The agency identified abnormal log activity on February 17 within the targeted system, which is unclassified but contains sensitive data about the communications of individuals under FBI investigation.

The White House, the National Security Agency (NSA), the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are collaborating on an ongoing investigation into the incident.

Source

How it could affect your business

Nation-state attacks are increasing in scale and frequency, often targeting organizations tied to critical infrastructure and sensitive government operations. To strengthen defenses, organizations should implement continuous monitoring, enforce strict access controls for sensitive systems and adopt a zero-trust approach to limit lateral movement and detect suspicious activity early.

Europe

French health ministry

Industry: Healthcare Exploit: Supply Chain Attack

The French health ministry announced a major data breach involving a third-party health care software provider that exposed approximately 15.8 million administrative medical files.

The cyberattack targeted systems belonging to Cegedim Santé, a health care software vendor used by around 3,800 doctors in France. The leaked records reportedly include personal data such as full names, gender, dates of birth, phone numbers, residential addresses and email IDs. In some cases, highly sensitive health information was also exposed.

The incident surfaced just weeks after another major breach involving the French Ministry of Finance, where more than 1.2 million accounts in the national bank account registry were exposed.

Source

How it could affect your business

This incident highlights how attackers are increasingly exploiting supply chains to target large networks. By compromising a single vendor, threat actors can gain access to interconnected networks and sensitive data at scale. To reduce risk, organizations should enforce strict third-party security assessments, limit vendor access to critical systems and continuously monitor integrations for unusual activity.

North America

Salesforce Experience Cloud

Industry: Technology Exploit: Misconfiguration

Salesforce’s Cybersecurity Operations Center has warned that threat actors are mass-scanning publicly accessible Experience Cloud sites using a modified version of the AuraInspector tool to access customer data.

AuraInspector is an open-source command-line tool originally released to audit Salesforce Aura and Experience Cloud applications for data exposure risks. It simulates a guest user to discover endpoints and test for access control weaknesses. Evidence suggests threat actors are now using a modified version of this tool to exploit overly permissive guest user settings, allowing unauthorized access to sensitive records.

Misconfigured sites risk exposing customer relationship management (CRM) data such as accounts, contacts and leads, which can then be used to carry out targeted social engineering or vishing attacks.

Source

How it could affect your business

Misconfigurations like these can quietly expose large volumes of sensitive CRM data without immediate detection. Salesforce customers should review guest user permissions and enforce a least-privilege access model, ensuring that unauthenticated users can access only explicitly shared and necessary records. Organizations should also prevent unauthenticated access to API endpoints, restrict visibility into internal users and disable self-registration features where they are not required to reduce exposure.

United States

University of Hawaii Cancer Center

Industry: Healthcare Exploit: Ransomware & Malware

An August 2025 ransomware attack targeting the University of Hawaii Cancer Center compromised the personal information of approximately 1.2 million individuals.

The cancer center, which disclosed the incident in January, said the breach involved three main data sets:

  • Two legacy files from 1998 to 2000 containing names and Social Security numbers from driver’s license and voter registration records
  • Files linked to the Multiethnic Cohort Study and other research projects, including names, addresses, Social Security numbers and limited health data
  • Additional research registry files with names and Social Security numbers collected from public health sources for epidemiological studies

Most of the exposed data is tied to a long-running study launched in 1993 that enrolled more than 215,000 participants, of whom 87,493 have been confirmed to be affected by this incident.

Source

How it could affect your business

Cyberattacks targeting healthcare institutions continue to rise, as they hold highly sensitive personal and medical information that is valuable to threat actors. When exposed, this data can be reused in targeted phishing and social engineering campaigns, making it easier to impersonate trusted entities and exploit victims further. Individuals should stay alert to unexpected communications, avoid sharing personal or medical details over unsolicited messages and regularly monitor financial and health-related accounts for suspicious activity.

Like what you're reading?

Subscribe now to get security news and information in your inbox every week

Upcoming webinars & events

Join our upcoming events and webinars for expert insights, practical strategies and the latest cybersecurity trends.

Network Detective Pro Tech Jam: Finding risk before the attacker does

March 25, 2026 11:00 AM EDT

Maintaining real-time visibility into network risk can be challenging as IT environments become more complex and cyberthreats become more sophisticated. In this session, discover how Network Detective Pro streamlines and automates IT assessments to uncover misconfigurations, legacy systems and exposure points attackers commonly exploit.

Register Now

Optimising Kaseya 365: Unified user security & alert automation

April 2, 2026 11:00 AM GMT

With users at the center of today’s threat landscape, security must align prevention, response and recovery around the human layer. In this session, learn how to use INKY, SaaS Alerts, BullPhish ID, Dark Web ID and SaaS Protection together to strengthen user security while simplifying alert management within Kaseya 365.

Register Now