
Sign up to save your podcasts
Or


A state intelligence-linked hacktivist group deployed wiper malware against a $25 billion medical technology and defense industrial base supplier, causing a global network disruption that sent over 5,000 workers home, triggered an SEC filing, and temporarily disrupted emergency medical communications in at least one state. The group claims to have erased data from 200,000+ devices and exfiltrated 50TB of data, though these claims remain unverified. Multiple threat intelligence firms assess this as the first confirmed significant destructive cyber operation against a major corporation since the conflict began — marking a transition from hacktivist noise to operational destruction targeting healthcare and defense supply chains.
Links & Resources
By Tushar VartakA state intelligence-linked hacktivist group deployed wiper malware against a $25 billion medical technology and defense industrial base supplier, causing a global network disruption that sent over 5,000 workers home, triggered an SEC filing, and temporarily disrupted emergency medical communications in at least one state. The group claims to have erased data from 200,000+ devices and exfiltrated 50TB of data, though these claims remain unverified. Multiple threat intelligence firms assess this as the first confirmed significant destructive cyber operation against a major corporation since the conflict began — marking a transition from hacktivist noise to operational destruction targeting healthcare and defense supply chains.
Links & Resources