Imagine waking up to find your laptop and phone—work or personal—completely wiped out by a cyberattack. That’s exactly what happened to nearly 80,000 Stryker employees in March 2026 when hackers exploited Microsoft Intune’s remote wipe capability after compromising a Global Admin account. In this article, we’ll break down what happened during the Stryker incident, how attackers leveraged their access (and what saved Stryker from worse harm), and—most importantly—what practical steps you can take right now to protect your organization from a similar Microsoft Intune wipe disaster.
The Stryker Incident: A Closer Look
In March 2026, “Stryker Microsoft Intune Wipe” made headlines across the tech and healthcare sectors. The breach, which stemmed from a compromised Global Admin account, gave hackers the keys to Microsoft Intune’s remote wipe functionality. It wasn’t just “some IT glitch.” Almost overnight, nearly 80,000 company-managed and personal devices used by Stryker staff were systematically erased.
The hackers seized on Intune’s remote wipe feature—an IT tool intended for lost or stolen corporate devices. Once inside, they initiated bulk wipe commands. The incident highlighted the double-edged sword of admin-level cloud management: immense convenience, but also catastrophic risk if credentials fall into the wrong hands.
Impact on Stryker Employees
The fallout was more than a nuisance. For many employees, work stopped cold. Laptops were cleared of business-critical documents, while phones lost email, contacts, and secure company apps. And the attack didn’t discriminate. Both corporate and personal devices enrolled in the company’s Intune were affected. Staff who relied on their phones for two-factor authentication (2FA) faced lockouts from not only business systems but also their banking and personal accounts.
Company-Managed vs. Personal Devices
It’s important to draw a line between company-managed and personal devices here. Devices owned and provided by Stryker were quickly restored from official backups—annoying, yes, but recoverable. The real pain point was with employee-owned personal devices. Many lost photos, notes, and confidential records, often without an easy way to restore them. For some, that meant weeks of rebuilding both their professional toolkit and their personal digital lives.
This high-profile Stryker event forced countless organizations to rethink their approach to Microsoft Intune, particularly how they handle both work and personal device enrollment. The lesson? Convenience sometimes comes with unexpected vulnerabilities.
Understanding the Hacker Tactics
The Stryker incident showed just how quickly a single mistake can open the floodgates. Rather than deploying sophisticated malware, the attackers zeroed in on gaining powerful credentials—the “keys” to the company’s digital kingdom.
How the Attackers Got In
- Compromising the Global Admin Account: Hackers targeted a Global Admin account in Stryker’s Microsoft 365 environment. This account isn’t just another user; it has broad, far-reaching authority across Office 365 and Microsoft Intune.
- Phishing and Social Engineering: Early findings suggested the attackers used a carefully crafted phishing campaign. By luring an admin into disclosing credentials—sometimes by mimicking Microsoft itself—the hackers sidestepped technical barriers and walked right in.
- Bypassing Multi-factor Authentication (MFA): While strong controls like MFA were in place, attackers exploited weaknesses like approval fatigue (where users rapidly approve MFA prompts without double-checking). Once they obtained admin access, the attackers were just a few clicks away from full Intune control.
The Role of Microsoft’s Detection and Response Team (DART)
- Swift Investigation: The Microsoft DART team, industry-leading specialists in incident response, arrived on scene within hours of the breach’s discovery. They coordinated closely with Stryker’s cybersecurity staff to triage the damage and trace the attackers’ movements.
- Forensic Analysis: DART’s forensic efforts included analyzing logs, isolating suspicious activities, and identifying command histories associated with the admin account. Their rapid response helped confirm the method of attack and prevent further escalation.
- Mitigation and Recovery: Working in tandem with cybersecurity consultants and Stryker’s IT, DART helped contain the breach, close unauthorized access, and harden controls on privileged accounts—including resetting authentication methods and auditing device wipe permissions.
This multi-layered response not only clarified how the attackers operated but also set a new example for how organizations should react to cloud platform account breaches. For any business using Microsoft Intune, it was a sharp reminder: the weakest link is often just a single compromised admin account.
Safeguarding Your Organization
If the Stryker Microsoft Intune wipe proved anything, it’s that even a single lapse can have sweeping consequences. Every company—regardless of size—should make admin account security and device management a top priority. Here’s how to protect your organization from similar threats and keep personal data safe.
Harden Admin Account Security
1. Minimize Admin Accounts
- Only grant Global Admin roles to those who truly need them. Limit the number of privileged accounts and use role-based access control (RBAC) whenever possible.
2. Enforce Strong Multi-Factor Authentication
- Require phishing-resistant MFA methods, such as hardware security keys or app-based authentication with number matching. Avoid SMS-based MFA whenever possible.
3. Implement Privileged Access Workstations (PAWs)
- Handle administrative tasks from tightly controlled, isolated devices that never access email or browse the web.
4. Monitor and Audit Admin Activity
- Regularly review sign-in logs and privilege escalation events. Set alerts for unusual admin actions, especially those involving device wipes or permission changes.
Best Practices for Microsoft Intune Device Management
1. Separate Work and Personal Devices
- Where feasible, create separate company profiles for work apps and data on personal devices, using features like Intune App Protection Policies. This limits wipe actions to work data only.
2. Back Up Critical Data
- Encourage (or automate) regular backups for all managed devices, regardless of ownership. Employees should understand where and how to restore both work and personal files.
3. Limit Device Wipe Permissions
- Only trusted IT staff should have the ability to send wipe commands. Require approval for bulk wipe actions and regularly review who has this capability.
4. Educate and Simulate
- Practice phishing drills and incident response tabletop exercises. Make sure everyone—from admins to front-line staff—knows how to spot warning signs and respond.
Protecting What Matters
Proactive security isn’t about one-time fixes. It’s about weaving smart habits into every layer of IT operations, from the logins admins use to the convenience of remote work tools like Intune. By following these best practices, organizations can enjoy the benefits of modern device management—without exposing employees or sensitive data to avoidable risk.



