Video•Mar 13, 2026
How An Iranian Cyberattack Erased Thousand's Of Employee Devices
The video details a recent Iranian cyber operation that infiltrated the mobile device management (MDM) platform of medical‑equipment maker Striker, remotely erasing thousands of employee laptops and phones. The breach highlights how a nation‑state can weaponize corporate MDM tools, turning a standard BYOD (bring‑your‑own‑device) arrangement into a vector for mass data loss.
MDM systems give IT departments the ability to install software, enforce updates, and, if necessary, wipe devices. In a BYOD environment the same agent runs on personal hardware, granting the employer—and any attacker who compromises the console—full control over private data, email, and browsing history. Contracts may stipulate limited use, but the underlying code can still execute destructive commands, and a hacker does not respect contractual language.
The presenter cites a Reddit thread where dozens of Striker staff awoke to blank screens, confirming that the MDM command was used to purge personal devices. He advises workers to demand clarity on MDM permissions, back up critical files, and, where possible, use dedicated corporate hardware or inexpensive secondary devices to isolate work from personal life.
For businesses, the incident underscores the need to reassess BYOD policies, tighten MDM access controls, and communicate agent capabilities transparently. Employees, meanwhile, must treat any corporate‑installed software as a potential security risk and adopt segregation or robust backup strategies to mitigate personal loss.