{"id":1267,"date":"2026-03-14T18:54:00","date_gmt":"2026-03-14T23:54:00","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1267"},"modified":"2026-03-14T18:54:00","modified_gmt":"2026-03-14T23:54:00","slug":"iranian-cyber-escalation-stryker-wiper-attack-2026","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/iranian-cyber-escalation-stryker-wiper-attack-2026\/","title":{"rendered":"Weaponizing IT: The 2026 Iranian Cyber Escalation &amp; Stryker Wiper Attack"},"content":{"rendered":"<p>&nbsp;<\/p>\n<article><!-- Header Block --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"40\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<p style=\"margin: 0 0 12px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 0.78em;font-weight: 900;letter-spacing: 3px;text-transform: uppercase;color: #ef9b37\">Critical Infrastructure Threat Alert | March 2026<\/p>\n<h1 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 500;margin: 0 0 20px 0;line-height: 1.3\">Weaponizing Our Own Tools: Inside the 2026 Iranian Cyber Escalation<\/h1>\n<p style=\"color: #d0dadf;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0;font-style: italic;border-left: 4px solid #ef3f37;padding-left: 20px;line-height: 1.6\">State-sponsored groups weaponize Microsoft Intune, deploy wiper malware, and execute Living off the Land attacks against critical infrastructure<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Threat Level Banner --><\/p>\n<table style=\"border: 3px solid #002f44\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"28\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.4em;font-weight: 900;margin: 0 0 10px 0\">\u26a0\ufe0f ACTIVE CAMPAIGNS: Handala Wiper &amp; MuddyWater Espionage<\/h3>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong>200,000+ devices wiped at Stryker Corporation (March 11, 2026).<\/strong> Iranian-linked threat actors Handala (Void Manticore) and MuddyWater (Seedworm) executing coordinated attacks against Western critical infrastructure, medical technology, finance, and defense sectors. <strong>Standard MFA and firewalls provide zero protection against these tactics.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Executive Summary --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">1. Executive Summary: The Death of the &#8220;Standard&#8221; Defense<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">If you think a basic firewall and a standard text-message MFA app are enough to keep state-sponsored hackers out of your network, <strong style=\"color: #ef3f37\">the events of March 2026 should be a massive wake-up call.<\/strong><\/p>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">Over the past two weeks, Iranian-linked cyber groups\u2014specifically <strong>Handala<\/strong> (also known as Void Manticore) and <strong>MuddyWater<\/strong> (also known as Seedworm)\u2014have executed some of the most devastating attacks we have ever seen against Western critical infrastructure, medical technology, financial institutions, and defense contractors.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Critical Insight Box --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin: 0 0 12px 0\">The Most Terrifying Part<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">These threat actors aren&#8217;t relying on custom-coded zero-day exploits. They are executing <strong style=\"color: #ef3f37\">&#8220;Living off the Land&#8221; (LotL)<\/strong> attacks: logging in with stolen credentials, hijacking our own IT management tools (Microsoft Intune, RMM platforms, PowerShell), and weaponizing them against us. Because the tools are legitimate and the credentials are valid, <strong>security software sees nothing wrong<\/strong> \u2014 until 200,000 devices suddenly receive a &#8220;factory reset&#8221; command.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">For <strong>Las Vegas businesses<\/strong>\u2014particularly those in 24\/7 hospitality, healthcare, defense supply chain, and logistics\u2014this represents an <strong style=\"color: #ef3f37\">existential threat.<\/strong> A destructive wiper attack doesn&#8217;t just steal data or demand ransom; it <strong>instantly paralyzes operations<\/strong>, effectively halting revenue, patient care, and guest services. There is no negotiation. There is no recovery unless you have air-gapped backups.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Technical Details --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">2. The Technical Details: Wipers and Silent Espionage<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">The March 2026 escalation is defined by two distinct, highly sophisticated campaigns running in parallel \u2014 one loud and destructive, one silent and patient:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Campaign 1: Stryker Wipe --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Campaign 1: The Stryker Wipe (Handala \/ Void Manticore)<\/h3>\n<p style=\"margin: 0 0 20px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\">On <strong style=\"color: #ef9b37\">March 11, 2026<\/strong>, the global medical technology giant <strong>Stryker Corporation<\/strong> was paralyzed by a pure destructive &#8220;wiper&#8221; attack. Handala did not ask for a ransom. They did not steal patient data for extortion. <strong>They simply erased over 200,000 laptops, servers, and mobile devices across 79 countries.<\/strong><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 12px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Step 1 \u2014 AitM Phishing (MFA Bypass)<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Attackers used <strong style=\"color: #ef9b37\">Adversary-in-the-Middle (AitM) phishing<\/strong> to trick employees into logging into a fake Microsoft login portal. The phishing site acted as a proxy \u2014 capturing the user&#8217;s password <em>and<\/em> the MFA token in real-time, then immediately forwarding both to the real Microsoft login to steal an authenticated session token. <strong>This bypasses SMS codes, authenticator app push notifications, and time-based one-time passwords (TOTP).<\/strong> The only MFA that resists this attack is FIDO2 hardware keys, which cryptographically verify the domain before authenticating.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Step 2 \u2014 Privilege Escalation to Global Admin<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Using the stolen session token, hackers escalated their privileges to <strong style=\"color: #ef9b37\">Global Administrators<\/strong> within Stryker&#8217;s <strong>Microsoft Entra ID (formerly Azure AD)<\/strong> and <strong>Microsoft Intune<\/strong> environment. Once they had Global Admin, they controlled the entire cloud identity infrastructure \u2014 all users, all devices, all policies.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Step 3 \u2014 Weaponizing Microsoft Intune<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Because <strong style=\"color: #2fb17e\">Microsoft Intune<\/strong> is a legitimate cloud-based Unified Endpoint Management (UEM) tool used to manage corporate devices \u2014 patching, policy enforcement, remote wiping \u2014 the hackers simply logged in as Global Admin and pushed a bulk <strong>&#8220;Factory Reset&#8221;<\/strong> command to every enrolled device worldwide. Security software (EDR, antivirus, SIEM) ignored it because it looked like a <em>legitimate IT administrator action<\/em>. Within hours, 200,000+ devices were bricked \u2014 laptops, tablets, medical workstations, executive phones. <strong>This is a Living off the Land (LotL) attack: using our own tools against us.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Campaign 2: MuddyWater --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Campaign 2: The Silent Infiltrators (MuddyWater \/ Seedworm)<\/h3>\n<p style=\"margin: 0 0 20px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\">Simultaneously, <strong style=\"color: #ef9b37\">MuddyWater<\/strong> (also tracked as Seedworm, TEMP.Zagros, Static Kitten) has been silently infiltrating U.S. banks, airports, defense suppliers, and logistics companies. Instead of loud destruction, they are focused on <strong>long-term espionage<\/strong> \u2014 stealing intellectual property, financial data, and operational intelligence.<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 12px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Stage 1 \u2014 Edge Device Exploitation<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">MuddyWater actively scans for and exploits <strong>unpatched internet-facing systems<\/strong> \u2014 particularly vulnerabilities listed on the <strong>CISA Known Exploited Vulnerabilities (KEV) catalog.<\/strong> Common targets include Fortinet FortiGate VPNs, Citrix NetScaler gateways, Ivanti Connect Secure, and Microsoft Exchange servers. Once they find an unpatched edge device, they gain remote code execution and establish initial access.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Stage 2 \u2014 Next-Gen Backdoors<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Once inside, they deploy new stealthy backdoors designed to evade detection:<br \/>\n\u2022 <strong style=\"color: #ef9b37\">&#8220;Dindoor&#8221;<\/strong> \u2014 A JavaScript-based backdoor running on the Deno runtime (a modern alternative to Node.js). Because Deno is legitimate developer tooling, security software typically doesn&#8217;t flag it.<br \/>\n\u2022 <strong style=\"color: #ef9b37\">&#8220;Fakeset&#8221;<\/strong> \u2014 A Python backdoor that uses legitimate Python interpreters already installed on systems (again, Living off the Land). Both backdoors communicate using HTTPS to blend with normal web traffic.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"12\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"rgba(255, 255, 255, 0.05)\"><strong style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin-bottom: 10px\">Stage 3 \u2014 Cloud Exfiltration<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: white\">Stolen data \u2014 financial records, customer databases, intellectual property, operational plans \u2014 is quietly funneled to <strong>legitimate cloud storage platforms<\/strong> like <strong>Wasabi, Backblaze, and AWS S3<\/strong>. This traffic blends perfectly with normal corporate internet usage (employees uploading files to cloud storage), making detection nearly impossible without deep packet inspection and behavioral analytics. The exfiltration can continue for months undetected.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Threat Actor Profiles --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">Threat Actor Profiles:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"20\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"padding: 25px;vertical-align: top;border-top: 3px solid #ef3f37\" bgcolor=\"white\" width=\"50%\"><strong style=\"color: #ef3f37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">Handala (Void Manticore)<\/strong><\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Attribution:<\/strong> Iranian state-sponsored<\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Objective:<\/strong> Destructive attacks, wiper deployment<\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Tactics:<\/strong> AitM phishing, Intune weaponization, credential harvesting<\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Recent Target:<\/strong> Stryker Corporation (200,000 devices wiped March 11, 2026)<\/p>\n<\/td>\n<td style=\"padding: 25px;vertical-align: top;border-top: 3px solid #ef9b37\" bgcolor=\"white\" width=\"50%\"><strong style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">MuddyWater (Seedworm)<\/strong><\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Attribution:<\/strong> Iranian MOIS (Ministry of Intelligence)<\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Objective:<\/strong> Long-term espionage, IP theft, surveillance<\/p>\n<p style=\"margin: 0 0 8px 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Tactics:<\/strong> VPN exploits, Dindoor\/Fakeset backdoors, cloud exfiltration<\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44;font-size: 0.95em\"><strong>Recent Targets:<\/strong> U.S. banks, airports, defense suppliers, logistics (ongoing)<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Risk Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">3. The Risk: Why Las Vegas CEOs Must Act Now<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\"><strong style=\"color: #ef3f37\">Why should a Las Vegas business care about state-sponsored attacks targeting medical technology companies or defense contractors?<\/strong> Because threat actors increasingly target the <strong>supply chain<\/strong> as the path of least resistance.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Risk Blocks --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.4em;font-weight: 900;margin: 0 0 12px 0\">\ud83d\udd17 Supply Chain Targeting<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">If you are a vendor, legal partner, IT contractor, HVAC provider, or logistics company for a major casino, defense contractor, hospital, or Strip property \u2014 <strong>you are the stepping stone.<\/strong> Iranian threat actors (and Russian, Chinese, North Korean counterparts) routinely compromise smaller, less-defended suppliers to leapfrog into their high-value clients. The 2013 Target breach started with an HVAC vendor. The 2023 MGM breach started with a help desk social engineering call. <strong>Your weak security becomes their entry point.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.4em;font-weight: 900;margin: 0 0 12px 0\">\ud83d\udc80 Wiper Attacks = Instant Business Death<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">A wiper attack like the one that hit Stryker is <strong>devastating to a 24\/7 operation.<\/strong> If the endpoints running your hotel check-in systems, medical carts, casino floor POS terminals, or logistics dispatch receive a rogue &#8220;factory reset&#8221; command \u2014 <strong>your entire business goes dark in seconds.<\/strong> There is no ransom negotiation. There is no recovery timeline unless you have air-gapped, immutable backups tested and ready. For Las Vegas hospitality with razor-thin operational margins, even 12 hours of downtime can trigger permanent customer loss and insurance exclusions.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.4em;font-weight: 900;margin: 0 0 12px 0\">\ud83c\udfaf Las Vegas as Critical Infrastructure<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Las Vegas isn&#8217;t just entertainment \u2014 it&#8217;s <strong>critical infrastructure.<\/strong> Nellis Air Force Base, defense contractors, logistics hubs serving the Southwest, and healthcare facilities supporting nearly 3 million residents and 40+ million annual visitors create a high-value target ecosystem. State-sponsored actors view disrupting Las Vegas as both economically damaging (tourism revenue) and strategically significant (defense operations). <strong>You are on the target list whether you know it or not.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- 72-Hour Checklist --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">4. The 72-Hour Mitigation Checklist<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">Standard cybersecurity hygiene is no longer sufficient. Based on the latest <strong>CISA and NIST frameworks<\/strong>, your IT leadership must execute the following <strong style=\"color: #ef3f37\">&#8220;Defense-in-Depth&#8221;<\/strong> strategies immediately:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 1 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"75\">\n<div style=\"background-color: #2fb17e;color: white;width: 58px;height: 58px;border-radius: 50%;font-family: 'Avenir', Arial, sans-serif;font-size: 1.9em;font-weight: 900;text-align: center;line-height: 58px\">1<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.45em;font-weight: 900;margin: 0 0 14px 0\">Upgrade to Phishing-Resistant MFA<\/h3>\n<p style=\"margin: 0 0 12px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">The Gap:<\/strong> Text-message codes and push-notification apps are <strong>trivially bypassed<\/strong> by Adversary-in-the-Middle (AitM) proxy attacks. The Stryker breach succeeded despite MFA being in place because they used SMS-based 2FA. AitM phishing captures the token in real-time and replays it before expiration.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">The Fix:<\/strong> Transition administrative accounts (Global Admin, Domain Admin, any account with elevated privileges) to <strong>FIDO2 hardware security keys<\/strong> (YubiKey 5 Series, Titan Security Key). FIDO2 cryptographically verifies the domain before authenticating \u2014 making phishing impossible. Alternatively, enforce strict <strong>Microsoft Entra Conditional Access policies<\/strong> that tie logins only to compliant, company-owned devices with managed EDR. <strong>Prioritize: Azure AD\/Entra admins, email, VPN, and any system with access to Intune, RMM, or cloud management tools.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"75\">\n<div style=\"background-color: #ef9b37;color: white;width: 58px;height: 58px;border-radius: 50%;font-family: 'Avenir', Arial, sans-serif;font-size: 1.9em;font-weight: 900;text-align: center;line-height: 58px\">2<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.45em;font-weight: 900;margin: 0 0 14px 0\">Lock Down IT Management Tools with JIT &amp; PIM<\/h3>\n<p style=\"margin: 0 0 12px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">The Gap:<\/strong> Global Admin accounts in Entra ID\/Intune\/Microsoft 365 have permanent &#8220;God Mode&#8221; access. A single compromised account can wipe every device, delete all data, and destroy backups. The Stryker attackers had Global Admin for hours before executing the wipe command \u2014 plenty of time to explore, escalate, and prepare.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">The Fix:<\/strong> Implement <strong>Just-in-Time (JIT) Access<\/strong> and <strong>Privileged Identity Management (PIM)<\/strong> in Microsoft Entra ID. Administrators should only have elevated rights for a few hours at a time, requiring secondary approval (from another admin or manager) to activate privileges. For mass commands in Intune or RMM platforms, require dual authorization \u2014 one person requests, another approves. <strong>Break the &#8220;always-on&#8221; admin model.<\/strong> Additionally, monitor for bulk device commands (factory reset, wipe, mass policy change) and alert immediately.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"75\">\n<div style=\"background-color: #ef3f37;color: white;width: 58px;height: 58px;border-radius: 50%;font-family: 'Avenir', Arial, sans-serif;font-size: 1.9em;font-weight: 900;text-align: center;line-height: 58px\">3<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.45em;font-weight: 900;margin: 0 0 14px 0\">Deploy Air-Gapped, Immutable Backups<\/h3>\n<p style=\"margin: 0 0 12px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">The Gap:<\/strong> If an attacker compromises your central cloud identity (Entra ID Global Admin), they will attempt to delete your cloud backups to maximize destruction. Many businesses discover this <em>after<\/em> a wiper attack \u2014 when they try to restore and find the backup repository also wiped. Traditional cloud-only backups stored in the same tenant are vulnerable.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">The Fix:<\/strong> Ensure your <strong>Backup and Disaster Recovery (BDR)<\/strong> platform is entirely <strong>air-gapped<\/strong> (physically or logically disconnected from the network) and <strong>immutable<\/strong> (meaning files cannot be edited or deleted, even by an administrator, for a set retention period \u2014 typically 30-90 days). Use platforms like <strong>Datto BCDR, Veeam with immutable Linux repos, or AWS S3 Glacier with Object Lock.<\/strong> Test restoration quarterly. For 24\/7 Las Vegas operations, your RTO (Recovery Time Objective) must be under 4 hours for critical systems.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- CMIT Protection --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">5. How CMIT Solutions Protects Your Network<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">At <strong style=\"color: #ef3f37\">CMIT Solutions of Las Vegas<\/strong>, we do not rely on single points of failure. We secure your environment by <strong>assuming breach<\/strong> \u2014 designing defenses that contain and detect threats even after initial compromise. We enforce <strong>Zero Trust architecture<\/strong>, manage complex Privileged Access controls, and provide <strong>24\/7 SOC monitoring<\/strong> to catch anomalous behavior\u2014like a massive device wipe command or a 100GB data push to an unknown cloud server\u2014before the damage is done.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Protection Services --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Zero Trust &amp; Advanced Threat Protection:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"14\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">FIDO2 Phishing-Resistant MFA Deployment:<\/strong> YubiKey implementation for executives and Global Admins, conditional access policies enforcing device compliance before authentication<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">Privileged Identity Management (PIM):<\/strong> Just-in-Time admin access, time-boxed elevation, dual authorization for mass commands in Intune\/RMM, automated de-escalation<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">24\/7 SOC with Behavioral Monitoring:<\/strong> US-based Security Operations Center watching for UEM anomalies (mass device wipes, bulk policy changes), cloud exfiltration to unusual destinations (Wasabi, Backblaze), LotL tool abuse (PowerShell, Deno, Python interpreters)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">Air-Gapped Immutable Backups:<\/strong> Datto BCDR with ransomware-proof storage, tested quarterly recovery drills, RTO under 4 hours for critical systems, offline backup verification<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">CISA KEV Vulnerability Management:<\/strong> Automated patching of edge devices (VPN, firewall, RDP) prioritizing Known Exploited Vulnerabilities catalog \u2014 eliminating MuddyWater&#8217;s primary entry vector<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">Network Segmentation:<\/strong> Zero Trust micro-segmentation isolating cloud management tools, critical systems, and production environments \u2014 containing lateral movement<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">Threat Intelligence Integration:<\/strong> Continuous monitoring of Cisco Talos, CISA alerts, and state-sponsored threat actor IOCs \u2014 proactive blocking of known Handala and MuddyWater infrastructure<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 7px 0\"><strong style=\"font-size: 1.1em\">Incident Response Planning:<\/strong> Pre-established wiper attack playbooks, tested recovery procedures, business continuity safeguards for 24\/7 Las Vegas operations<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Inline CTA --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border: 3px solid #ef3f37\" align=\"center\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 15px 0\">\u26a0\ufe0f Don&#8217;t Wait for Your IT Tools to Be Used Against You<\/h3>\n<p style=\"margin: 0 0 20px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.1em;line-height: 1.7;color: #002f44\">We can audit your MFA implementation, Privileged Identity Management, and backup immutability within 72 hours. Find out if you&#8217;re protected against Living off the Land attacks.<\/p>\n<p><a style=\"background-color: #ef3f37;color: white;padding: 17px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.15em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Critical Infrastructure Security Audit<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Main CTA --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"45\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td align=\"center\">\n<h2 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0\">Standard Defenses Are Dead. Deploy Zero Trust.<\/h2>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin: 0 0 25px 0;line-height: 1.6\">Phishing-resistant MFA, Privileged Identity Management, and air-gapped backups for Las Vegas critical infrastructure \u2014 from hospitality to defense supply chain.<\/p>\n<table style=\"margin: 0 auto 25px auto\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"border-radius: 50px;padding: 12px 28px\" bgcolor=\"#002f44\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: bold;color: white\">\ud83d\udcde <a style=\"color: white;text-decoration: none\" href=\"tel:702-725-2877\">702-725-2877<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 0 0 25px 0\"><a style=\"background-color: #002f44;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Schedule Zero Trust Assessment<\/a><\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;margin: 0\"><a style=\"color: white;text-decoration: underline\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Key Takeaways --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin-top: 0\">Key Takeaways:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"8\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"3%\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>March 2026 Iranian escalation<\/strong> \u2014 Handala wipes 200,000 Stryker devices, MuddyWater infiltrates U.S. banks\/defense<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Living off the Land attacks<\/strong> \u2014 weaponizing Microsoft Intune, PowerShell, legitimate cloud tools to evade detection<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>AitM phishing bypasses standard MFA<\/strong> \u2014 SMS codes and push notifications provide zero protection; FIDO2 is required<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Global Admin = God Mode vulnerability<\/strong> \u2014 permanent elevated access enables instant destruction<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>FIDO2 hardware keys<\/strong> \u2014 YubiKey for admins, phishing-resistant authentication that verifies domains cryptographically<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Just-in-Time admin access with PIM<\/strong> \u2014 time-boxed elevation, dual authorization for mass commands<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Air-gapped immutable backups<\/strong> \u2014 Datto BCDR or Veeam with ransomware-proof storage, tested quarterly<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>CMIT Solutions provides Zero Trust implementation<\/strong>, PIM configuration, and 24\/7 SOC monitoring \u2014 call 702-725-2877<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Source Attribution --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;font-weight: 900;margin: 0 0 10px 0\">6. Threat Intelligence Sources<\/h3>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 0 0 10px 0;font-style: italic\">Dive deeper into the technical Indicators of Compromise (IOCs) and mitigation strategies:<\/p>\n<ul style=\"margin: 0;padding-left: 20px;font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;line-height: 1.8\">\n<li><a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/blog.talosintelligence.com\/talos-developing-situation-in-the-middle-east\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Talos: Seedworm\/MuddyWater Tooling Update &amp; Dindoor\/Fakeset Backdoor Analysis<\/a><\/li>\n<li><a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/www.forrester.com\/blogs\/the-stryker-attack-enterprise-resiliency-plans-cant-ignore-uem\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester: The Stryker Attack &amp; UEM Resiliency &#8211; Lessons for Enterprise<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The most terrifying part of the recent Iranian cyber escalation? They aren&#8217;t always using complex malware. They are hijacking our own IT management tools, like Microsoft Intune, and using them to wipe our networks.<\/p>\n","protected":false},"author":1008,"featured_media":1268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1267"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1267\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1268"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}