Federal News
CISA Strengthens Cybersecurity After Iranian Attacks
March 24, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the FBI and Department of Justice, has issued urgent advisories and taken enforcement actions following a significant cyberattack on medical device manufacturer Stryker by Iranian-linked hackers. This attack exploited vulnerabilities in Microsoft Intune endpoint management systems, prompting federal agencies to mandate enhanced security controls such as phishing-resistant multi-factor authentication, least privilege access, and multi-admin approval processes. The FBI has seized domains linked to Iran's Ministry of Intelligence and Security and the pro-Iranian hacktivist group Handala, disrupting cyber-enabled psychological operations targeting U.S. entities. The Department of Defense's Defense Industrial Base is also identified as a key target, with recommendations to implement NIST SP 800-171 controls underpinning the CMMC verification program to mitigate Iranian cyber threats.
- Why this matters: Federal agencies are enforcing stronger cybersecurity requirements, especially for endpoint management systems, creating immediate demand for security solutions and compliance services.
- Defense contractors and healthcare suppliers should prioritize implementing NIST-based controls and Microsoft Intune security best practices to meet evolving federal expectations.
- Organizations managing sensitive government contracts must prepare for increased audits and potential contract conditions related to cybersecurity posture.
- Cybersecurity vendors and consulting firms can leverage this heightened focus to expand offerings around Zero Trust architectures, MFA, and real-time monitoring solutions.
Were all paying attention to the Stryker incident that broke last week, because there are implications there for communications technology and private information or corporate information that, even if its not defense Information, getting access to someones email and understanding the infrastructure of the company is very, very useful.
— Terry Kalka
Iran thought they could hide behind fake websites and keyboard threats to terrorize Americans and silence dissidents. This FBI will hunt down every actor behind these cowardly death threats and cyberattacks and will bring the full force of American law enforcement down on them.
— Kash Patel, FBI Director
The U.S. Attorneys Office is committed to collaborating with our law-enforcement partners to identify threats, shut them down, and hold bad actors accountable.
— Kelly O. Hayes, U.S. Attorney for the District of Maryland
Agencies
Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, Department of Justice, Department of Defense, National Institute of Standards and Technology
Vendors
Microsoft, Stryker, CrowdStrike, Palo Alto Networks, Summit 7
Contracts
$450 million,
Locations
Sources
- Experts warn Iranian hackers targeting US systems · KTXS · Mar 19
- Experts warn Iranian hackers targeting US systems · WPEC · Mar 20
- U.S. Government Sends Security Advisory After Major Cyberattack on U.S. Tech Company - NewsPress India · newspress.co.in · Mar 20
- US government sends 'Microsoft message' to companies after hackers brought down one of America's biggest company for days · MSN · Mar 22
- FBI seizes domains linked to Iran hackers after Stryker cyberattack · Axios · Mar 20