Forsyte IT Solutions
Forsyte IT Solutions
  • Why Guardian 365

When Your Device Management Platform Becomes the Weapon: Lessons from the 2026 Stryker Cyberattack

Share This Post

Security Alert

In early 2026, a cyberattack against a major US corporation resulted in attackers using legitimate Microsoft Intune administrative controls to remotely wipe thousands of managed devices — including personal BYOD devices belonging to employees. No custom malware was required. The attackers used the organization’s own tools against it.

For IT and security leaders in education and government, this attack is not an abstract corporate concern. It is a direct blueprint for how your own Unified Endpoint Management (UEM) infrastructure could be turned against your institution — disrupting operations, destroying data, and affecting thousands of students, employees, and constituents.

What Happened

In March 2026, a destructive cyberattack targeted a major US-based organization with government contracts. The attackers gained privileged administrative access to the victim’s Microsoft Intune environment — their centralized platform for managing laptops, mobile devices, and other endpoints across the organization.

Once inside the Intune control plane, the attackers issued mass remote wipe commands across the managed device fleet. The attack is consistent with a living-off-the-land (LOTL) technique: rather than deploying external malware, the attackers simply used the native, legitimate administrative capabilities of the platform to achieve a catastrophic destructive outcome.

The impact extended beyond corporate-owned devices. Personal devices enrolled in the company’s BYOD (Bring Your Own Device) program were also affected — employees lost access to their personal data because the organization’s MDM enrollment agreements granted the right to wipe enrolled devices during a security incident. When attackers inherit admin rights, they inherit all of those rights.

Why Education and Government Are High-Risk Targets

The threat landscape

State-sponsored and hacktivist threat actors have significantly escalated offensive cyber operations in 2026, driven by ongoing geopolitical tensions. US-based organizations with government contracts, public institutional profiles, or connections to critical infrastructure are actively targeted.

Education institutions and government agencies meet multiple targeting criteria simultaneously:

  • Political leverage value — attacks on schools and public agencies generate immediate public pressure and media attention
  • Large managed device footprints — school districts and state agencies often manage thousands of endpoints, making mass-wipe attacks disproportionately damaging
  • BYOD enrollment at scale — many districts and agencies manage employee- and student-owned devices, dramatically expanding wipe scope
  • Limited security staffing — fewer dedicated security engineers to implement and monitor hardening controls
  • High data sensitivity — student records, constituent PII, and government data carry significant regulatory and reputational stakes

How Intune Becomes a Weapon

Microsoft Intune is widely deployed in both K-12 and higher education environments, as well as across state and local government agencies. It is an excellent platform — but its power is the risk. An attacker with administrative access to Intune can:

  • Issue remote wipe or retire commands to any enrolled device — corporate, government-issued, or personal
  • Deploy malicious scripts or applications to managed endpoints
  • Relax compliance policies and security baselines across the entire device fleet
  • Extract device inventory, user identity data, and configuration information
  • Establish persistent access through scheduled tasks, PowerShell scripts, or malicious app packages that appear to originate from legitimate management infrastructure

Because all of these actions flow through native platform controls, they frequently bypass conventional endpoint security detections. By the time alerts fire, the damage may already be done.

A note on BYOD in education

Many school districts and universities enroll student and faculty personal devices into their MDM programs to manage app access and compliance. Standard MDM enrollment terms typically grant the institution the right to remotely wipe enrolled devices. In an attack scenario, an adversary who compromises Intune inherits those same rights — and may exercise them across every enrolled device, regardless of whether it is district-owned or a student’s personal laptop.

Reviewing BYOD enrollment policies and transitioning to Selective Wipe (which removes only corporate data, not personal content) is a meaningful risk reduction step that costs nothing to implement.

Seven Controls That Reduce Your Exposure

The following hardening actions are prioritized based on the techniques observed in this class of attack and best practice guidance from Microsoft and CISA. Several can be implemented immediately without additional licensing cost.

forsyte intune controls

One Critical Caveat

All of the above controls provide meaningful, layered protection — but it is worth stating clearly: a successful compromise of a Global Administrator account would render most of them largely ineffective. The controls above make your environment significantly harder to attack and significantly noisier to operate in. However, protecting the Global Administrator credential itself — with phishing-resistant MFA, strict conditional access, and privileged identity management — remains the foundational requirement.

If your institution has not reviewed Global Administrator credential hygiene recently, that review should happen before or alongside any other Intune hardening work.

What to Do This Week

If you manage Microsoft Intune in an education or government environment, three actions are worth prioritizing immediately:

  • Audit your Intune role assignments. Identify any Global Administrator or Intune Administrator accounts that have persistent, standing role assignments — especially service accounts or shared credentials.
  • Review your BYOD enrollment policy. Determine whether full device wipe rights over personal devices are explicitly documented and whether Selective Wipe is a viable operational alternative.
  • Verify your audit log pipeline. Confirm that Intune audit events are flowing to a SIEM or alerting platform, and that someone is responsible for reviewing high-impact events like bulk device actions and new role assignments.

Is your Intune environment protected against this attack class?

Our security team can assess your current Intune and Entra ID posture, identify gaps against the controls described in this article, and support implementation at no additional licensing cost for many of these changes.

Contact a member of our team. 

More To Explore

Schedule a Pen Test

The Guardian 365 Pen Test assesses your systems by simulating cyberattacks on internal resources, external resources, and web apps.

See identify configuration issues and vulnerabilities that external and internal attackers could use to exploit your systems. Sign up for a Guardian 365 Pen Test to enhance your security today!

Contact - Schedule a Pen Test
Name
Name
First
Last

EDUCATION LEADERS TALK SECURITY

You’re in the right place! Complete the form to hear the latest Guardian 365 security discussion featuring IT leaders from Spelman College and Spring Grove Area School District. You won’t want to miss this!

Guardian 365: Education Leaders Talk Security
Name
Name
First
Last

Cybersecurity Insurance Audit

Let us help you save money on your Cybersecurity Insurance by providing an audit of your current environment, and provide recommendations on how to reduce the cost of your insurance policy,

Contact - Cybersecurity Insurance
Name
Name
First
Last

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It’s a necessity. Let’s empower your team with Guardian 365! 

Request a Demo

At Forsyte Guardian 365, we believe in transparency and hands-on experiences. Complete the form to request your personalized demo. Remember, security is not a luxury. It's a necessity. Let's empower your team with Guardian 365! 

Request A Demo
Name
Name
First
Last

Get Started

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Talk to an Expert
Name
Name
First
Last

Expert Recovery Services for Security Breaches

If you are experiencing a security breach or have detected suspicious activity, get help now.

Contact - Recovery Services
Name
Name
First
Last