


Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality
Jul 14, 2025 am 12:02 AMIngram Micro is slowly regaining stability following a major cyber attack that caused widespread system disruptions.
In a recent update, the company mentioned it has been restoring systems and introducing enhanced security measures after the breach.
It stated that order processing has resumed in most global regions, though certain areas still face restrictions, particularly regarding tech hardware orders.
"Ingram Micro is happy to announce that operations have resumed in all business regions. Our teams are working efficiently to continue supporting our partners and customers," the firm stated.
"Currently, we are capable of handling and shipping orders placed via EDI or electronic means, as well as through phone or email across all business units."
The last areas to return to normal operations include Austria, Canada, Singapore, the Nordic countries, and those served by its Miami Export branch.
Previously restored regions where orders could be processed—though with some limitations on hardware—include Brazil, China, France, Germany, India, Italy, Portugal, Spain, and the UK.
For subscription-related orders, the company advises customers to reach out to Unified Support.
Since the attack, Ingram Micro has taken certain systems offline and implemented additional protective actions.
"Thanks to these steps and the help of external cybersecurity specialists, we believe unauthorized access related to this incident has been stopped and affected systems have been addressed," the statement read.
"We are continuing our investigation into the full extent of the incident and what data may have been impacted."
What occurred during the Ingram Micro cyber attack?
Ingram Micro first disclosed the cyber incident last week, with the SafePay ransomware group taking credit for the attack.
According to reports, SafePay allegedly gained entry through the company’s GlobalProtect virtual private network (VPN).
This group is an emerging force in the ransomware landscape, having attracted attention recently. SafePay uses a “double extortion” strategy, both encrypting systems and stealing sensitive information.
This method increases pressure on victims by threatening public data leaks and operational shutdowns.
Research conducted by Halcyon shows that SafePay has been leveraging an updated version of LockBit's late-2022 code.
The group utilizes various tactics, techniques, and procedures, such as exploiting known vulnerabilities in widely used enterprise software to gain initial access. Once inside, they use legitimate remote administration tools for persistence and credential-theft utilities like Mimikatz.
Halcyon’s analysis of SafePay highlighted that despite being relatively new to the ransomware scene, the group exhibits "a notable level of technical expertise and operational consistency."
This, according to the report, implies that the group "may be led by seasoned cybercriminals."
Don’t forget to follow php.cn on Google News for all the latest updates, expert insights, and in-depth coverage.
The above is the detailed content of Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Like it or not, artificial intelligence has become part of daily life. Many devices — including electric razors and toothbrushes — have become AI-powered," using machine learning algorithms to track how a person uses the device, how the devi

A new artificial intelligence (AI) model has demonstrated the ability to predict major weather events more quickly and with greater precision than several of the most widely used global forecasting systems.This model, named Aurora, has been trained u

The more precisely we attempt to make AI models function, the greater their carbon emissions become — with certain prompts generating up to 50 times more carbon dioxide than others, according to a recent study.Reasoning models like Anthropic's Claude

Artificial intelligence (AI) models can threaten and blackmail humans when there’s a conflict between the model's objectives and user decisions, according to a new study.Published on 20 June, the research conducted by the AI firm Anthropic gave its l

The major concern with big tech experimenting with artificial intelligence (AI) isn't that it might dominate humanity. The real issue lies in the persistent inaccuracies of large language models (LLMs) such as Open AI's ChatGPT, Google's Gemini, and

The more advanced artificial intelligence (AI) becomes, the more it tends to "hallucinate" and provide false or inaccurate information.According to research by OpenAI, its most recent and powerful reasoning models—o3 and o4-mini—exhibited h

Artificial intelligence (AI) reasoning models aren't quite as capable as they appear. In reality, their performance breaks down completely when tasks become too complex, according to researchers at Apple.Reasoning models like Anthropic's Claude, Open

The UK’s National Crime Agency (NCA) has arrested four individuals suspected of involvement in the cyber attacks targeting Marks and Spencer (M&S), Co-op, and Harrods.According to a statement, the suspects include two 19-year-old men, a 17-year-o
