Ingram Micro Recovers from Ransomware Attack, Restores Operations

Edward Zhou
Edward Zhou

CEO & Founder

 
July 17, 2025 3 min read

Ingram Micro Ransomware Attack

Ingram Micro
Ingram Micro reported a ransomware incident on July 4 that targeted its internal systems. The company took affected systems offline immediately after discovering the ransomware. Ingram Micro stated, “The Company also launched an investigation with the assistance of leading cybersecurity experts and notified law enforcement.” The company is working to restore operations while apologizing for disruptions experienced by customers and vendor partners.

Ingram Micro reported $48 billion in sales last fiscal year, operating as a key connector between organizations and technology manufacturers. The attack was noted to be linked to the SafePay ransomware gang, which has been responsible for multiple attacks, including on other organizations such as government contractor Conduent.

Further details from cybersecurity expert Rebecca Moody indicate that SafePay has conducted 238 attacks, averaging 111 GB of stolen data per incident.

Links:

Progress on Restoring Operations

As of July 5, Ingram Micro announced it could again process and ship orders electronically across all business regions following the ransomware attack. The company confirmed that its systems were remediated with the help of third-party cybersecurity vendors, and partners could place orders via email and phone.

Ingram Micro's update emphasized that their teams were making progress in restoring functionalities, stating, “We believe the unauthorized access to our systems in connection with the incident is contained and the affected systems remediated.” The company has faced criticism from partners for the time taken to restore operations, and many had to source products from other distributors.

Links:

Operational Challenges and Updates

Ingram Micro Xvantage
Ingram Micro is working on restoring its transactional business, which was disrupted by the ransomware attack linked to SafePay. The company operates a digital platform called Ingram Micro Xvantage, which includes order tracking and personalized recommendations. While subscription orders are being processed, limitations still exist for hardware and technology orders.

The company has communicated ongoing updates about the status of its operations and confirmed that it filed with the Securities and Exchange Commission regarding the incident.

Links:

Erie Insurance Network Outage Recovery

Erie Insurance Logo
Erie Insurance has restored full business operations following a month-long network outage. The company confirmed that there is “no evidence” of any data breach during this incident. The insurer stated, “Key services and systems have been safely and securely restored,” and local agents and customer care teams are back to serving customers.

The network outage initiated by Erie was aimed at containing a potential threat. The company previously faced two class-action lawsuits alleging a ransomware group accessed their network, but their recent announcement indicated no such breaches occurred.

Links:

Explore our services or contact us for more information. For inquiries, please visit our website.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article