Ingram Micro admits ransomware raid exposed staff records
Briefly

Ingram Micro admits ransomware raid exposed staff records
"The letter also confirmed the attack took place on July 2, and that Ingram Micro detected it a day later, before shutting its systems down. "Promptly upon detecting the issue, we began taking steps to contain and remediate the unauthorized activity, including proactively taking certain systems offline and implementing other mitigation measures. We also initiated an investigation with the assistance of leading cybersecurity experts and notified law enforcement.""
"Ingram Micro disclosed that a July 2025 ransomware attack compromised the personal data of tens of thousands of employees. The distributor's filing with the attorney general's office in Maine confirmed the total number of affected people as 42,521. A letter is being sent to each explaining that employee and job applicant records were affected. Basic personal information such as names, contact information, and dates of birth were exposed, as were identity document numbers such as those for passports, driver's licences, and Social Security numbers."
On July 2, 2025, a ransomware attack on Ingram Micro compromised personal and employment records for 42,521 people, including employees and job applicants. Ingram Micro detected the intrusion a day later and shut systems down to contain the incident. Exposed data included names, contact details, dates of birth, passport and driver’s licence numbers, Social Security numbers, and work-related evaluations. Ingram Micro engaged cybersecurity experts, notified law enforcement, and sent letters to affected individuals. Ransomware group SafePay claimed responsibility and allegedly stole 3.5 TB of files. The outage disrupted MSP operations, hindered order processing, and prompted customer criticism of communications.
Read at Theregister
Unable to calculate read time
[
|
]