


By Andy Lomasky, Senior Director, IT, PMMI
A recent cyberattack on medical technology company Stryker is drawing attention across industries. This was not a new vulnerability or sophisticated malware – this breach occurred because attackers used a trusted system to cause widespread disruption.
For PMMI members, this incident is worth understanding. Many organizations rely on similar tools to manage computers, workstations, mobile devices, and users, and the lessons here apply broadly across manufacturing, packaging, and supply chain environments.
What Happened
According to public reporting and CISA guidance, attackers gained access to Stryker’s environment and leveraged Microsoft Intune, a widely used endpoint management platform.
Once inside, they were able to:
Most importantly, the attackers didn’t need to deploy malware or exploit a software vulnerability. They used legitimate administrative tools to carry out the attack.
Why This Attack Is Different
This incident highlights a growing shift in cyberattacks - rather than breaking systems, attackers are increasingly abusing trusted platforms once they gain access.
Endpoint management tools like Microsoft Intune are designed to:
Those same capabilities, in the wrong hands, can be used to disrupt operations at scale, which is exactly what happened. For organizations managing fleets of workstations, laptops, mobile devices, or remote endpoints, these platforms represent a powerful, and potentially risky, control layer.
Why It Matters for PMMI Members
Many companies in the packaging and processing industry use tools like Intune, ServiceNow, Workspace ONE, or other device management platforms to support their remote and hybrid workforces, field service teams, plant floor systems connected to corporate networks, and BYOD (bring-your-own-device) environments.
If compromised, these systems could:
This makes endpoint management platforms a critical part of your security architecture, not just a convenience.
How to Reduce Your Risk
The Stryker incident reinforces several foundational security practices that every organization should revisit:
The Bigger Lesson
The Stryker attack is not just about one company or one tool, it reflects the broader reality that greatest risk is often not a technical vulnerability - it’s what attackers can do once they gain access. By focusing on access control, visibility, and governance of powerful systems like endpoint management platforms, organizations can significantly reduce the likelihood and impact of this type of attack.
Final Thought
For PMMI members, this is a good moment to pause and ask your IT departments a few practical questions:
If the answers are unclear, that’s a strong signal to take a closer look.