Scroll Top

When the Wiper Is the Product: Nation-state MDM Attacks and What Every Enterprise Needs to Know

hacker-using-laptop-and-glowing-world-map-with-glo-2026-01-11-08-46-32-utc

Iran’s most destructive cyber unit didn’t deploy malware to wipe 200,000 devices at a multi-billion dollar medical device manufacturer this week. They used Microsoft’s own MDM platform. The era of ‘no malware detected = no breach’ is over. 

On March 11, 2026, eleven days after U.S. and Israeli forces began Operation Epic Fury with strikes on Iranian military targets, Iran-linked hacking collective Handala executed one of the most operationally damaging cyberattacks in recent memory. The target: a $25 billion medical device manufacturer headquartered in Portage, Michigan. 

The attack was not ransomware. There were no known malicious executables used. The organization’s own security tools likely saw nothing unusual until it was too late. Handala wiped the company’s global device estate, including servers, laptops, and mobile phones, using Microsoft Intune – the same cloud-based MDM platform its IT team used for daily device management.  

This is the new shape of nation-state cyber warfare: no malware, no zero-days, just stolen credentials and a few API calls. 


What Happened?

The attack commenced at approximately 3:30 AM EDT on March 11, targeting a moment of minimal IT staffing. Within hours, employees across 79 countries found themselves completely locked out of corporate systems. The company’s Microsoft Entra ID login page was defaced with the Handala group’s logo. 

They proceeded to file a regulatory disclosure stating the company was working to restore operations, with the timeline for full recovery unknown. The company’s stock fell approximately 3.2% on the day. Ireland’s NCSC was notified because the company’s Cork hub was among the most severely affected locations. 

 

CRITICAL Classification Note 

  • This organization confirmed there was ‘no indication of ransomware or malware’ — because the destructive action was executed entirely via legitimate Microsoft tooling. 
  • This is a living-off-the-land (LotL) wiper attack, a category that bypasses most traditional endpoint and malware detection controls. 

 

Handala claimed to have wiped more than 200,000 servers, workstations, and mobile devices — and to have exfiltrated 50 terabytes of corporate data prior to the wipe. The data exfiltration claim remains unverified. Handala’s stated motive: retaliation for the February 28 airstrike on a school in Minab, Iran, in which over 170 people were killed. The group identified the company as a ‘Zionist-rooted corporation,’ likely referencing its acquisition of an Israeli company in 2019. 


The Attack Chain: How Legitimate Tools Become Weapons 

This attack is a masterclass in living-off-the-land tradecraft applied at destructive scale. Each step in the chain used legitimate Microsoft infrastructure: no custom implants, no exploit frameworks. 

 

Key Insight 

  • Every step in this attack chain used a capability Microsoft provides and intends to exist. The attacker’s weapon was administrative access, not malware. 
  • This is why identity and cloud audit telemetry is the only viable detection surface for this class of attack, not endpoint detection. 

Who Is Handala — and Who Is Really Behind Them 

Handala Hack Team emerged in late 2023 following the Hamas October 7 attacks. The group presents itself as a hacktivist collective, but Palo Alto Unit 42, IBM X-Force, and Falcon Feeds have assessed it as a front for Void Manticore, a destructive threat group directly affiliated with Iran’s Ministry of Intelligence and Security (MOIS). 

Void Manticore’s defining characteristic is an ‘opportunistic and quick-and-dirty’ operational tempo focused on maximum visible damage. Their 2026 campaign has included: 

  • The March 11 wiper attack (200,000+ devices) 
  • A claimed March 11 breach of Verifone payment systems 
  • Doxxing of Israeli Air Force officers (50+ individuals published) 
  • Targeting of oil and gas infrastructure in Jordan and Saudi Arabia 
  • Operations routed through Starlink IP ranges (AS14593) to obscure attribution 

Iran’s Broader Campaign: Multiple APT Groups Now Active

This MDM attack is one data point in a coordinated, multi-actor Iranian cyber campaign that accelerated immediately after the first U.S.-Israeli strikes on February 28. 

MuddyWater (Seedworm) | MOIS-affiliated 

Broadcom Symantec confirmed MuddyWater intrusions inside U.S. banks, airports, non-profits, and a defense/aerospace software company. The group deployed a new backdoor named Dindoor, built on the Deno JavaScript runtime. A second implant, Fakeset, was deployed at a U.S. airport and non-profit. Rclone was used to attempt data exfiltration to a Wasabi cloud storage bucket. 

Agrius (Pink Sandstorm) | MOIS-affiliated 

Agrius has been aggressively scanning internet-facing IP cameras using CVEs including CVE-2017-7921 and CVE-2023-6895. Researchers assess this as battle damage assessment (BDA) support for Iranian missile operations — surveilling strike aftermath in real time using compromised camera infrastructure across Kuwait, Jordan, and Bahrain. 

Charming Kitten, OilRig, Fox Kitten | IRGC/MOIS 

Signs of rapid retooling and renewed activity observed across multiple long-standing Iranian APT groups. These actors bring sustained, patient intrusion capabilities and are likely pre-positioning in enterprise environments for future operations. 

  Wiper Arsenal Context 

  • Iran has developed and deployed more than 15 distinct wiper malware families over the past decade ZeroCleare, Meteor, Dustman, DEADWOOD, Apostle, BFG Agonizer, MultiLayer, PartialWasher, and others. 
  • The March 11 attack represents a significant evolution: outsourcing the wipe to the victim’s own MDM platform eliminates the need to deploy any of these tools while delivering equivalent destructive impact. 

 


Industry Context: The Attacker’s Playbook Has Already Shifted 

This MDM attack did not happen in a vacuum. The industry’s three major 2025 threat reports all independently confirmed the same structural shift that enabled it: attackers have largely abandoned malware delivery in favor of credential theft and identity abuse. 

The picture is consistent: phishing is no longer primarily a direct compromise method; it has become the front end of a credential theft pipeline. When an attacker has valid admin credentials to your Intune tenant, they are your IT department. 


Detection Recommendations: Where to Look When There’s No Malware 

The critical principle for detecting an attack of this class is this: EDR telemetry will not catch it. No process was spawned on an endpoint. No file was written. The entire attack lived in cloud audit logs: Entra ID sign-in logs, Intune audit logs, and Azure AD activity logs. Detection must shift accordingly. 

Entra ID / Identity Layer 

  • Impossible travel or anomalous sign-ins to Intune Admin or Global Admin roles 
  • MFA prompt bombing / fatigue attempts on privileged accounts 
  • Bulk admin role assignments (Intune Admin, Device Management roles) 
  • Sign-ins from Starlink IP ranges (AS14593) 
  • Legacy authentication protocol usage (MFA bypass path) 

Microsoft Intune / MDM 

  • Retire or Wipe actions at scale or outside business hours 
  • Bulk device compliance policy modifications 
  • Graph API calls to /deviceManagement/managedDevices/{id}/wipe 
  • Intune admin portal access from new geography or IP 
  • New device configuration profiles pushed to large device groups 

Active Directory 

  • DC Sync activity from non-DC hosts (DRSUAPI replication requests) 
  • Kerberoasting / AS-REP roasting against service accounts 
  • Unusual LDAP enumeration of device and user objects at scale 

Behavioral / Cloud Audit 

  • Bulk Entra audit events: “Update device” / “Delete device” at high volume 
  • Admin accounts active between 12-4 AM local time 
  • Devices checking into Intune then immediately going offline 
  • Password spray: high unique account count, low per-account failure rate 

 

XDR-specific approach: Ingest Entra ID and Intune logs from Microsoft Graph API. Build an alert rule on bulk wipe events: filter Audit Logs where the Operation Name == “Wipe device” with a count threshold over a short rolling window. Baseline normal wipe volume, so your threshold is meaningful. 


What to Do Right Now 

Immediate Actions 

  • Audit all Entra ID Global Admin and Intune Administrator role assignments and remove any accounts that do not absolutely require that privilege. 
  • Enable Conditional Access policies that block legacy authentication and require phishing-resistant MFA (FIDO2 hardware keys) for all administrative roles. Standard TOTP-based MFA is bypassed by adversary-in-the-middle phishing kits at scale. 
  • Review Intune audit logs for baseline activity to understand what normal device wipe/retire volume looks like so you can alert on anomalies. 
  • Block or monitor Starlink IP ranges (AS14593) in Entra ID Conditional Access. Legitimate sign-ins from Starlink should be rare for enterprise accounts. 

Short-Term Actions 

  • Implement Privileged Identity Management (PIM) for the Intune Administrator role: require just-in-time elevation with manager approval, eliminating the standing admin access that enabled this attack. 
  • Restrict Microsoft Graph API access to device management endpoints to named, approved service principals only. Human accounts should not have programmatic wipe capability. 
  • Enable Microsoft Defender for Identity (if licensed) and configure alerts for DCSync, LDAP enumeration, and Kerberoasting – the early signals of an attacker moving toward domain dominance. 
  • Hunt for password spray patterns in Entra sign-in logs: high count of unique usernames, low per-account failure rate designed to stay under lockout thresholds. 
  • Verify patch status on all internet-facing edge devices: VPN concentrators, Citrix NetScaler, Fortinet, F5 BIG-IP. Iranian actors have a documented history of exploiting CVE-2019-19781, CVE-2022-1388, and CVE-2024-23113. 


A Final Note on Context 

It is worth noting that CISA is currently operating at approximately 38% staffing due to federal funding constraints. No official U.S. government advisory on the attack or Intune/MDM abuse TTPs had been published as of March 12, 2026. The absence of government guidance does not mean the threat is low; it means private-sector detection and intelligence sharing is carrying more weight than usual. 

Watch the following sources for emerging IOCs and updated guidance: Symantec Threat Intelligence, CrowdStrike Adversary Intelligence, Mandiant, Palo Alto Unit 42, and Ireland’s NCSC. File hashes as they are published, C2 infrastructure, and the confirmed initial access vector for this specific attack have not yet been publicly released. 

The geopolitical context remains highly dynamic. If kinetic operations continue under Operation Epic Fury, Iranian cyber actors, state-directed and proxy alike, will continue to seek retaliatory targets in Western critical infrastructure, healthcare, and financial services. Any organization with Israeli business ties, supply chain relationships, or dual-listed operations should treat this threat as active and immediate. 

Brian Almond

Director of Engineering Advanced Security at Presidio |  + posts
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.