
Long-Term: The primary defense against this class of attack is treating SaaS management planes with the same rigor as on-premises infrastructure. That means:
Organizations should also layer identity threat detection and response atop these controls (i.e. monitoring for account abnormalities that may indicate malicious activity), as well as end-to-end phishing protection.
Short-Term: Defending against this attack starts with two controls: reviewing standing admin permissions in Intune and Entra ID, and enabling multi-admin approval for destructive actions like device wipe, retire, and delete. The latter stops a single compromised account from wiping an entire device fleet.
Microsoft Intune is a trusted platform. The admin account that issued the wipe was, from the perspective of every system involved, a legitimate, authenticated, authorized user.
The core of this incident is something most enterprises haven’t fully reckoned with: the gap between valid credentials and identity assurance. To Stryker systems, the attackers looked like a legitimate Stryker employee. That's the nature of how SaaS platforms extend trust today. A valid credential is a valid identity, and a valid identity can do whatever its permissions allow. The challenge does not stop at identity. As SaaS settings change and exceptions stack up, risky configurations quietly expand what an attacker can do.
Obsidian exists to close that gap: continuous visibility into enterprise application activity, privileged account monitoring, and cross-SaaS threat detection across the platforms where that implicit trust lives. And before an attacker ever reaches those platforms, Obsidian's browser extension cuts off the initial foothold, detecting and blocking the phishing attempts that turn a legitimate employee identity into an attacker's entry point.
Obsidian is also introducing a new Intune posture rule for mass-wipe risk.
Obsidian detects when Intune is misconfigured to allow single-admin approval for high-impact actions, before attackers exploit it. Enforcing a second approver before any destructive action closes a door attackers actively target.
.png)