​News You can USE!​




BLUF (Bottom Line Up Front)

Geopolitical cyber conflict has escalated into a destructive, targeted attack on the US medical technology supply chain, representing the most significant wartime cyber incident against the American commercial sector to date. Simultaneously, maritime threats persist in key choke points, with commercial vessels continuing to be hit by unidentified projectiles in the Arabian Gulf and Black Sea.


💻 Geopolitical Cyber / Critical Infrastructure

Incident: Destructive Attack on US Medical Technology Supply Chain

  • Date: March 11–12, 2026
  • Location: Global Operations (Headquartered in Michigan, US)
  • Key Actors: Handala (a.k.a. Void Manticore, Storm-842), a pro-Palestinian, Iran-aligned hacktivist group

A major cyberattack disrupted global network infrastructure at the US medical device company, Stryker. The breach involved the compromise of administrator-level credentials within the Microsoft Intune management console, enabling the threat actor to wipe or disable over 200,000 systems across 79 countries. The attack is considered a direct retaliation for geopolitical kinetic actions. The sustained disruption affects internal systems, electronic ordering, and potentially supply chains for surgical tools and implants.

Geolocation Context: The incident demonstrates the spillover of Middle Eastern geopolitical conflict directly onto US civilian critical industry, raising alarms across the healthcare sector globally.

Tactical Recommendations:

  1. Intune/MDM Auditing: Immediately audit all privileged access within Enterprise Mobility Management (EMM) solutions (e.g., Microsoft Intune) to detect unauthorized use of remote wipe functions.
  2. Credential Hardening: Implement mandatory hardware-backed Multi-Factor Authentication (MFA) for all administrator accounts managing critical network infrastructure and device wiping capabilities.
  3. Supply Chain Resilience: Review continuity plans for reliance on medical device suppliers and assess inventory buffer status for high-risk equipment reliant on Stryker or similar major providers.
Incident: Sustained Targeting of Western Critical Infrastructure

  • Date: January 2026 (Ongoing)
  • Location: North America and Europe
  • Key Actors: APT44 (a.k.a. Sandworm), a Russia-linked threat actor

Mandiant and Amazon reported sustained targeting of Western critical infrastructure via misconfigured network edge devices, VPNs, and collaboration platforms. APT44 is known for developing destructive tooling such as the ZeroLot wiper and retooled versions of the Industroyer malware.

⛵️ Maritime Events

Incident: Multiple Projectile Attacks on Commercial Vessels

  • Date: March 10–14, 2026
  • Location: Arabian Gulf, Strait of Hormuz, Gulf of Oman, Black Sea
  • Key Actors: Unknown Projectiles (Suspected State- or Proxy-Sponsored Attacks)

At least three commercial vessels were hit by unknown projectiles in the maritime domain surrounding the UAE and Iraq, causing fires and crew evacuations. The U.S. Maritime Administration (MARAD) issued a security advisory (2026-004) due to Iran’s continuing threat and attacks on commercial vessels in the region. Separately, a Greek-flagged tanker, the MARAN HOMER, was struck by a suspected drone or small missile off the Russian port of Novorossiysk in the Black Sea.

Geolocation Context: The high-risk area for attacks now spans the Northern Arabian Gulf, the Strait of Hormuz (a critical choke point), and the Gulf of Oman. The Black Sea incident suggests geopolitical maritime risk is widening to include critical Russian port approaches.

Tactical Recommendations:

  1. Increased Vigilance: U.S.-flagged vessels must comply with U.S. Coast Guard Maritime Security Directive 104-6 and report all suspicious activity immediately to UKMTO and the U.S. Fifth Fleet Battle Watch.
  2. Risk Assessment: Vessels scheduled for transit through the Arabian Gulf, SOH, or Gulf of Oman should assess recent port calls (particularly UAE and Iraqi ports) for elevated exposure risk before entering the regional threat environment.

👠 Crime or Organized Crime / Financial Crimes / Supply Chain Threats

Incident: Major Black-Market Drug Diversion Scheme

  • Date: March 16, 2026 (Sentencing)
  • Location: United States (Nationwide)
  • Key Actors: Owners and CEO of a Wholesale Pharmaceutical Company

Two pharmaceutical wholesale company owners received a combined sentence of 38 years for orchestrating a complex scheme that distributed over $92 million in black-market HIV drugs. The scheme corrupted the prescription drug supply chain and put vulnerable HIV-positive patients at risk.

Incident: Transnational Organized Crime Leader Arrested

  • Date: March 13, 2026
  • Location: United States (Arrest) / Chile (Charges)
  • Key Actors: Rafael Enrique Gamez Salas (Leader of ‘Los Piratas’/Tren de Aragua cell)

A Venezuelan national and alleged leader of ‘Los Piratas,’ the Chilean cell of the Venezuelan transnational criminal organization Tren de Aragua (TdA), was arrested in the US at the request of Chile. Salas faces charges including extortion, kidnapping resulting in homicide, and criminal association.

💥 Activism/Terrorism and DVE

Incident: ISIS Supporters Charged with Explosive Plot

  • Date: March 9, 2026 (Charges)
  • Location: New York City, US
  • Key Actors: Two alleged ISIS Supporters

Two individuals who allegedly supported ISIS were charged with attempting to detonate explosive devices during protests outside Gracie Mansion. This highlights the persistent threat of International Violent Extremists (IVE) attempting to utilize domestic social unrest as a cover for attacks.

Incident: Continued Anti-Government/Partisan Extremist Mobilization

  • Date: Ongoing (March 2026)
  • Location: United States
  • Key Actors: Partisan Political Extremists, Racially/Ethnically Motivated Violent Extremists (RMVE)

Analysis confirms that terrorist attacks and plots motivated by partisan political beliefs against government targets have nearly tripled in the last five years compared to the previous 25. Targets primarily include government officials, law enforcement, and infrastructure.

Tactical Recommendations:

  1. Insider Threat Mitigation: Given DVE focus on government and defense targets, ensure robust background checks and continuous monitoring programs for employees with access to sensitive infrastructure or data.
  2. Physical Security Posture: Increase security posture around facilities during planned or highly contentious political events, recognizing the vulnerability of government and law enforcement targets to ideologically motivated violence.