- Moonshot Minute
- Posts
- A Ceasefire Won't Stop This Attack
A Ceasefire Won't Stop This Attack
One line of code did more damage than a cruise missile.
Earlier this month, a hacking group tied to Iranian intelligence walked through a digital door at Stryker Corp, one of the world's largest medical-technology companies, and flipped the lights off.
The hackers hit Stryker with a full-scale wipe.
Employee devices across multiple regions… erased. Internal systems… dark. Collaboration tools, enterprise infrastructure… gone.
According to reports, over 200,000 devices were wiped, and more than a week later, some employees still haven’t been able to return to work.
Hospitals and EMS providers paused Stryker's Lifenet system, the platform that lets paramedics transmit a patient's vital signs to the ER before the ambulance arrives. This led to surgeries being delayed and emergency response chains fractured.
A company that supports more than 150 million patients across 61 countries was brought to its knees by lines of code. Not a single bullet needed to be fired.
The group that claimed responsibility, Handala, linked to Iranian intelligence, framed it as retaliation for a U.S. military strike in Minab, Iran, one that reportedly hit an elementary school.
A nation-state actor didn't fire a warhead at a military base. They shut down the systems that keep people alive on operating tables.
And the stock market's response? Cybersecurity stocks are trading at discounted valuations.
That disconnect, between what's happening in the real world and what the market is pricing in, is exactly where fortunes are made.
The Battlefield Has Already Shifted
Modern warfare is very different today. It’s shifted beyond the physical locations where the kinetic war is being waged.
It's inside your hospital. Your power grid. Your water treatment plant.
We've been conditioned to think of war in terms of aircraft carriers and cruise missiles. But the Iran conflict is revealing something the defense establishment has known for years.
The next Pearl Harbor won't come from the sky. It'll come through a fiber-optic cable.
The evidence is already here.
Iran has listed several major U.S. tech companies, including IBM and Palantir, as potential targets for future cyberattacks.
Following Israel's military strikes in 2025, cyberattacks targeting Israel surged 700%, according to cybersecurity firm Radware.
Iran launched what it calls the "Great Epic" cyber campaign, part of a broader ideological framework called the "Cyber Islamic Resistance."
The Center for Strategic and International Studies has documented Iranian wiper attacks, distributed denial-of-service attacks against U.S. banks, election-interference campaigns, and the exploitation of industrial-control systems across Israel and the Persian Gulf.
This is state-sponsored digital warfare operating at an industrial scale.
The Infrastructure Is Held Together with Duct Tape
I grew up in a household where we didn't have much. My parents immigrated to this country with nothing, and every dollar was accounted for.
One thing my father drilled into me was you don't wait for the roof to leak before you fix it. You inspect it when the sun is shining.
America's critical infrastructure is a leaking roof in a hurricane.
Sixteen vital sectors are classified as critical infrastructure: energy, water, healthcare, transportation, financial services, and more.
Between 50% and 85% of these systems are privately owned, according to the Cybersecurity and Infrastructure Security Agency. And fragmented ownership leads to inconsistent security standards.
And many of these systems run legacy software that vendors no longer support. They can't be patched or updated, so they're sitting there, waiting.
In 2024, Check Point Research documented 1,162 cyberattacks on U.S. utilities. A 75% increase year-over-year.
The North American Electric Reliability Corporation warned that points of vulnerability on the electric grid were growing by roughly 60 per day as digitization accelerates.
Iran has historically targeted exactly these kinds of systems, financial services, water utilities, transportation networks, and healthcare facilities.
In December 2024, Iranian hacktivists caused water overflow and system outages at U.S. water systems by exploiting Israeli-made components in municipal water infrastructure.
You don't need a $13 billion aircraft carrier when a laptop and a zero-day exploit can shut down a city's water supply.
The Supply Chain Is the Achilles Heel
If the Stryker attack was a warning shot, the next volley could be catastrophic, and it won't necessarily come through a direct hit on a single company.
Remember SolarWinds in 2019/2020?
Russian intelligence actors compromised a single software update and gained access to numerous U.S. government agencies and private companies simultaneously.
All it took was one vendor to attack thousands of victims. The playbook is as simple as it is effective… don't attack the castle. Attack the company that delivers the food.
Since then, large-scale supply-chain compromises have nearly quadrupled.
Today's digital ecosystems are so interconnected that a single compromised vendor can cascade across entire industries. Cloud providers, software update mechanisms, third-party integrations, every connection point is a potential entry.
And AI-powered tools now enable attackers to automate reconnaissance, probe exposed servers, and identify vulnerabilities in minutes rather than weeks.
This means the speed of attack has outpaced the speed of defense.
I say this with some authority.
I started writing code at around 11 years old, and back then, learning to code meant reading literal volumes of technical manuals cover to cover. No YouTube. No Stack Overflow. Just you and the book.
By the time I was on Wall Street, I was part of a team responsible for updating legacy systems to address the infamous “Y2K bug”.
What I worked on was the kind of old-school IBM infrastructure running COBOL and JCL that most people have never heard of, but that the entire financial system depended on back then and still, to this day, depends on.
I've seen the guts of these machines. And what terrifies me is that many of the systems running America's critical infrastructure today aren't much different from what I was patching 25-30 years ago. They were old then, but they're ancient now. And they're connected to everything.
And now the part that keeps me up at night…
Analysts expect that autonomous AI agents could handle up to 40% of enterprise tasks by the end of 2026.
Each of those digital AI agents needs authentication, access permissions, and monitoring. Every single one is a new attack surface. We're building an army of digital workers and handing each one a set of keys to the building, while the people trying to break in are using the same AI tools to find the unlocked windows.
The threat is accelerating faster than most boardrooms or portfolios are prepared for.
🚀 Get Moonshot Alerts Instantly
Markets move in minutes. Your inbox can’t keep up.
Join the Moonshot VIP Text Service and get real-time alerts, portfolio updates, and first-move intelligence directly to your phone.
Be first to know. Anywhere.
The Market Is Pricing This Completely Wrong
Now here's where my contrarian instincts start firing.
You'd think with all of this, a major wartime cyberattack on U.S. soil, a 75% surge in utility attacks, state-sponsored hacking campaigns, and crumbling infrastructure, that cybersecurity stocks would be trading at a premium.
They're not. They're on sale.
I've been doing this long enough to know that the best opportunities show up when fear and price move in opposite directions.
When the threat is escalating, but the market is looking the other way, that's the gap where real money is made.
One of the most respected institutional research groups I follow, a veteran outfit that's been calling paradigm shifts since the 1980s, just flagged cybersecurity as a contrarian buy.
Not only that, they added a specific AI-native cybersecurity company to their index.
Their cumulative portfolio returns have crushed the S&P 500 over the past decade. When they say the market is mispricing something, I pay attention.
Especially because I see the thesis is straightforward. America is acutely vulnerable to cyberattacks on critical infrastructure.
The risk of an all-out cyberwar is rising. And the companies best positioned to defend against these attacks are trading like the threat doesn't exist.
I've seen this movie before. Gold before the breakout. Bitcoin before the institutions showed up. European financials before the capital rotation. The crowd was somewhere else every single time.
Right now, the crowd is watching oil prices and missile strikes. They're watching the Strait of Hormuz and LNG shipping rates. And look, those are real stories and I’m watching them as well…
But the war that could do the most damage to your daily life, the one that could shut down your hospital, your power grid, your bank, is being fought in silence, through code.
And the companies defending against it are sitting at discounted valuations.
Where The Smart Money Is Moving
There's one company that stands out to me right now. I'm not going to name it here, that's for Moonshot Premium members, but I'll tell you exactly why it's on my radar.
This company just crossed the $1 billion revenue mark, growing over 20% year-over-year. It hit operating profitability for the first time in its history.
Its AI-powered platform runs autonomous threat prevention, detection, and response across endpoints, cloud workloads, and identity systems.
In a world where AI is being weaponized by attackers, this company is deploying AI on the defense side, and it's winning. Its AI security agent is now included in over half of all new licenses sold.
65% of its enterprise customers are using three or more of its solutions, up from 39% a year ago.
As I look at the evidence, it’s pointing to a platform becoming a cybersecurity backbone.
And here's the kicker, it trades at roughly 4 times forward sales. Its largest competitor, which is growing at nearly the same rate, trades at 19 times.
The institutional research group I mentioned earlier just added this company to one of their best-performing indexes. The same index that has outperformed the S&P 500 over the past decade.
Premium members will get the full breakdown on Wednesday: the name, my buy price, the entry strategy, and the specific catalysts I'm watching.
If you're not a Premium member yet, now might be a good time to fix that.
🚀 Get Moonshot Alerts Instantly
Markets move in minutes. Your inbox can’t keep up.
Join the Moonshot VIP Text Service and get real-time alerts, portfolio updates, and first-move intelligence directly to your phone.
Be first to know. Anywhere.
The One Thing You Should Do Now
Start paying attention to what the market is ignoring.
The biggest gains I've ever made came from watching where the crowd wasn't looking.
Right now, the crowd is fixated on oil tankers and missile trajectories while a different kind of war, quieter, cheaper, and potentially more devastating to your daily life, is escalating in the background.
The most dangerous wars are the ones you can't see.
Iran just proved that a cyberattack can do more immediate damage to American lives than a conventional missile strike, and the market is pricing cybersecurity like it's peacetime.
That gap between reality and price is your edge.
Don't waste it.
Double D
P.S. Here’s a screenshot of the current Moonshot Minute Portfolio. I’ve blurred out the tickers since that information is only for Premium Members, but you can see how we’ve done so far:
🔓 Premium Content Begins Here 🔒
In today's Premium Section, I'm naming the tungsten company I think is the most asymmetric critical-minerals play on the planet. Then, on Wednesday, I’ll reveal my top cybersecurity pick. It’s an asymmetric play on this quickly growing threat.
I hope you’ve been paying attention because many of our picks are currently beating the S&P by up to 4-to-1 this year.
Most financial newsletters charge $500, $1,000, even $5,000 per year. Why? Because they know they can.
I don’t.
I built my wealth the old-fashioned way, not by selling subscriptions.
That’s why I priced this at $25/month, or $250/year.
Not because it’s low quality, but because I don’t need to charge the typical prices other newsletters charge.
One good trade, idea, or concept could pay for your next decade of subscriptions.
The question isn’t ‘Why is this so cheap?’ The question is, ‘Why would I charge more?’
P.S. If this newsletter were $1,000 per year, you’d have to think about it.
You’d weigh your options. You’d analyze the risk.
But it’s $25 a month.
That’s the price of a bad lunch decision.
And remember, just one good idea could pay for your subscription for a decade.
