In recent days, tension between the United States and Iran has escalated with direct military actions. Washington has resorted to Tomahawk cruise missiles launched from warships and fighters F-35 to attack Iranian strategic infrastructure. At the moment, there is no evidence that Tehran has managed to respond with military attacks on US territory. Its response, however, has been felt on another front: the attacks against energy facilities in the Gulf, like those of Ras Laffan, in Qatar. In parallel, the conflict is also being fought in a less visible terrain, cyberspace.
The information war. The photograph of the conflict begins to be completed when we look beyond the military level. Analysts cited by The Register They argue that Iran is turning more intensively to cyberspace to pressure the United States, an area in which it can operate with less direct exposure. In this context, the attack against Stryker is not interpreted as an isolated episode, but as an indication of a trend. “This is just the beginning,” said retired Gen. Ross Coffman.
A case already visible. The most recent example of this dynamic is offered by Stryker, a medical device manufacturer with a global presence. According to Reutersa cyberattack last week altered its internal operations and made it difficult to manage personalized inventory. The company confirmed that it had contained the incident, although the episode shows how this type of action can impact especially sensitive sectors, beyond the strictly technological field.
Beyond a specific interruption. Bloomberg notes that the impact on Stryker’s operations had an indirect impact on hospitals and patients, with surgeries that had to be rescheduled due to problems in the supply of specific material. This is a clear example of how the border between digital and physical can quickly blur.

The American Stryker specializes in surgical equipment, orthopedic implants and neurotechnology solutions
Civilian targets. Along the same lines as the analysts pointed out, the focus is not limited to public organizations. The aforementioned media reports that several voices agree that companies may be more exposed than government agencies, in part due to their unequal defenses. Targeting this type of offensive seeks to generate economic pressure and disruption without the need for a direct confrontation, they explain.
A historical case. A clear example is Stuxneta malware discovered in 2010 that managed to infiltrate the Natanz nuclear plant and manipulate its systems until it caused failures in about a thousand centrifuges. The code was designed specifically for that environment, acting stealthily for weeks while altering processes without being detected. Its authorship has never been officially confirmed, although it has been widely attributed to the United States and Israel.
When the damage is physical. The Stuxnet case helps to understand a key idea in this type of conflict. As we tell in a video from Xataka Presentahe malware He did not limit himself to infiltrating computer systems, but took control of the industrial controllers that regulated the centrifuges and altered their operation. First accelerating them and then slowing them down, he caused progressive wear until they became unusable.
A front that already leaves its mark. The scenario that is drawn is clear. While there is no evidence of a direct Iranian military attack inside the United States, the conflict is already having effects inside the United States through other means. The Stryker case shows how an intrusion can translate into real disruptions in sensitive sectors, with an impact on companies and patients.

GIPHY App Key not set. Please check settings