{"id":60331,"date":"2026-03-18T07:32:08","date_gmt":"2026-03-18T07:32:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/"},"modified":"2026-03-18T07:32:08","modified_gmt":"2026-03-18T07:32:08","slug":"irans-cyberattack-against-med-tech-firm-is-just-the-beginning","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/","title":{"rendered":"Iran&#8217;s cyberattack against med tech firm is &#8216;just the beginning&#8217;"},"content":{"rendered":"<p>Businesses should expect that Iran will conduct more aggressive cyber-ops as the war escalates, according to security analysts.<\/p>\n<p>&#8220;Cyber and terrorism are the two levers that I believe Iran will pull now that their navy is decimated,&#8221; retired US Army Lt. Gen. Ross Coffman told <em>The Register<\/em>. &#8220;What we saw against Stryker &#8211; it&#8217;s just the beginning.&#8221;<\/p>\n<p>Stryker is a medical technology outfit that was last week hit by a cyber crew with <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/10\/cybercrime_iran_mois\/\">ties to Iran&#8217;s intelligence agency<\/a>, causing a <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/11\/us_medtech_firm_stryker_cyberattack_iran\/\">global network outage<\/a> at the company. The attack represented the first destructive cyberattack to hit a US-based company during the Iran war. A week after the attack, Stryker&#8217;s ordering and shipping <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.stryker.com\/us\/en\/about\/news\/2026\/a-message-to-our-customers-03-2026.html\">systems remain offline<\/a>.<\/p>\n<h3 class=\"crosshead\">Iran sends &#8216;a very clear signal&#8217;<\/h3>\n<p>&#8220;The Stryker hack marks the first time that Iran executed a successful full-blown disruptive attack against a major US corporation, especially against a company that plays a critical role in the healthcare supply chain.&#8221; Sergey Shykevich, threat intelligence group manager at Tel Aviv-based Check Point Research told <em>The Register<\/em>. &#8220;It&#8217;s a very clear signal that Iran sends about its capabilities, but even more about its intentions and courage to execute such operations.&#8221;<\/p>\n<p>Iran is a less <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/05\/10\/iran_intel_analysis\/\">predictable cyber-adversary<\/a> than nations like China and Russia. It has been conducting <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/10\/24\/iran_muddywater_campaign\/\">cyber-espionage<\/a>, <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/07\/19\/idf_cyber_chief_iran\/\">phishing<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/06\/23\/iran_cyberattacks_against_us\/\">disinformation campaigns<\/a> for more than 15 years. It&#8217;s also adept at <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/27\/us_charges_iran_trump_campaign_hack\/\">hack-and-leak operations<\/a>, and <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/02\/cyber_warfighters_iran\/\">nuisance-level denial-of-service attacks<\/a>. The nation\u2019s offensive cyber teams have also developed custom malware that can <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/12\/13\/iran_cyberweapon_us_attacks\/\">remotely control water and fuel management systems<\/a>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>But so far, most of their cyberattacks to date have been opportunistic &#8211; such as those in 2023 that <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/12\/04\/iran_terrorist_us_water_attacks\/\">used default passwords<\/a> to break into internet-accessible programmable logic controllers used in multiple US water systems.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Even with the Stryker cyberattack, Iran &#8220;had every capability to be more sophisticated, and they did not,&#8221; said Tal Kollender, a former Israel Defense Forces cyber specialist who cofounded and leads a security company called Remedio.<\/p>\n<p>Another threat analyst, who asked to remain anonymous because of safety concerns, told <em>The Register<\/em>, &#8220;Iran has been using cyber aggressively for quite a while \u2013 particularly in Israel \u2013 and so there&#8217;s no secret weapon that they&#8217;ve been holding back.&#8221;<\/p>\n<blockquote class=\"pullquote\"><p>The bigger concern is that Iran is going to hit more targets<\/p><\/blockquote>\n<p>&#8220;We&#8217;re not suddenly going to see some new level of aggression, because they&#8217;ve essentially been demonstrating their capability for quite a while, so we can really expect to see more of the same,&#8221; the analyst continued. &#8220;The bigger concern is just that Iran is going to hit more targets&#8221; beyond Israel, expanding to the Gulf states, the US, and any other allied countries.<\/p>\n<p>&#8220;[Iranian] actors are generally looking for targets of opportunity,&#8221; they said. &#8220;They now are going to have a greater field of opportunities.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,dmpu,\" data-sm=\",fluid,mpu,dmpu,\" data-md=\",fluid,mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>While US government agencies remain the top targets for Iran&#8217;s cyber weapons, all of the security professionals we interviewed told us that American businesses are more at risk.<\/p>\n<p>&#8220;The NSA is really, really good at defensive operations, and so I don&#8217;t see&#8230;the attacks going against government assets, I see them going after civilian assets,&#8221; said Coffman, who served more than 35 years in the US Army and is now president of Forward Edge-AI, which provides AI and cybersecurity services to US government, defense, and critical infrastructure sectors.<\/p>\n<p>&#8220;As [Iran] looks at this warfare, they are really focused on the global economy,\u201d Coffman said. \u201cWe can remove their navy. We can remove their air power. We can attack them across all instruments of power, diplomatic, information, military, and economic. And they&#8217;ll still have the ability to hack.&#8221;<\/p>\n<h3 class=\"crosshead\">Plausible deniability<\/h3>\n<p>Iran historically <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/04\/13\/hacktivism_is_having_a_resurgence\/\">used hacktivists<\/a> or even <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2025\/02\/12\/ransomware_nation_state_groups\/\">cybercriminals as proxies<\/a> for government-sponsored attacks. This was the case in 2023, when CyberAv3ngers, an Islamic Revolutionary Guard Corps (IRGC)-affiliated group, broke into multiple US water facilities.<\/p>\n<p>Security researchers at Symantec and Carbon Black told <em>The Register<\/em> earlier this month that MuddyWater, an Iranian cyber crew believed to be part of the Iranian Ministry of Intelligence and Security (MOIS), has been <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2026\/03\/05\/mudywater_backdoor_us_networks\/\">burrowed deep into multiple US companies&#8217;<\/a> networks \u2013 targeting a bank, a software firm, and an airport \u2013 since the beginning of February, with more activity in the days following the US and Israeli military strikes.<\/p>\n<p>Another MOIS-linked crew, Handala, claimed to be behind the Stryker hack.<\/p>\n<p>&#8220;This isn&#8217;t necessarily new, but it is noteworthy, as it gives the government a layer of protection through deniability and helps establish a narrative that others outside the government support its actions,&#8221; Forrester analyst Allie Mellen and author of the book Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, told <em>The Register<\/em>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>While the hacktivist playbook isn&#8217;t new, &#8220;their ability to quickly and effectively scale during a near-total domestic internet blackout is,&#8221; Qrypt CTO Denis Mandich said. Before co-founding the quantum-secure encryption company, Mandich spent two decades in the US intelligence community.<\/p>\n<p>&#8220;Iran and its proxies are far more likely to inflict economic pain than to risk cleaner state-on-state exchanges,&#8221; he added. &#8220;Their pre-positioned access will lead to more disruption and data destruction for a cheap, scalable way to have a disproportionate impact.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2026\/03\/18\/irans_cyberattack_against_stryker\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even without a navy, or air power, &#8216;They&#8217;ll still have the ability to hack&#8217; Businesses should expect that Iran will conduct more aggressive cyber-ops as the war escalates, according to security analysts.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-60331","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Iran&#039;s cyberattack against med tech firm is &#039;just the beginning&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Iran&#039;s cyberattack against med tech firm is &#039;just the beginning&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-18T07:32:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Iran&#8217;s cyberattack against med tech firm is &#8216;just the beginning&#8217;\",\"datePublished\":\"2026-03-18T07:32:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\"},\"wordCount\":868,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\",\"name\":\"Iran's cyberattack against med tech firm is 'just the beginning' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2026-03-18T07:32:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage\",\"url\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Iran&#8217;s cyberattack against med tech firm is &#8216;just the beginning&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Iran's cyberattack against med tech firm is 'just the beginning' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/","og_locale":"en_US","og_type":"article","og_title":"Iran's cyberattack against med tech firm is 'just the beginning' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-03-18T07:32:08+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Iran&#8217;s cyberattack against med tech firm is &#8216;just the beginning&#8217;","datePublished":"2026-03-18T07:32:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/"},"wordCount":868,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/","url":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/","name":"Iran's cyberattack against med tech firm is 'just the beginning' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2026-03-18T07:32:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2abp9Bzcujn0g2v1O2t2ngAAAAcU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/irans-cyberattack-against-med-tech-firm-is-just-the-beginning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Iran&#8217;s cyberattack against med tech firm is &#8216;just the beginning&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60331"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60331\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}