亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

Table of Contents
What occurred during the Ingram Micro cyber attack?
Home Technology peripherals It Industry Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality

Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality

Jul 14, 2025 am 12:02 AM

Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality

Ingram Micro is slowly regaining stability following a major cyber attack that caused widespread system disruptions.

In a recent update, the company mentioned it has been restoring systems and introducing enhanced security measures after the breach.

It stated that order processing has resumed in most global regions, though certain areas still face restrictions, particularly regarding tech hardware orders.

"Ingram Micro is happy to announce that operations have resumed in all business regions. Our teams are working efficiently to continue supporting our partners and customers," the firm stated.

"Currently, we are capable of handling and shipping orders placed via EDI or electronic means, as well as through phone or email across all business units."

The last areas to return to normal operations include Austria, Canada, Singapore, the Nordic countries, and those served by its Miami Export branch.

Previously restored regions where orders could be processed—though with some limitations on hardware—include Brazil, China, France, Germany, India, Italy, Portugal, Spain, and the UK.

For subscription-related orders, the company advises customers to reach out to Unified Support.

Since the attack, Ingram Micro has taken certain systems offline and implemented additional protective actions.

"Thanks to these steps and the help of external cybersecurity specialists, we believe unauthorized access related to this incident has been stopped and affected systems have been addressed," the statement read.

"We are continuing our investigation into the full extent of the incident and what data may have been impacted."

What occurred during the Ingram Micro cyber attack?

Ingram Micro first disclosed the cyber incident last week, with the SafePay ransomware group taking credit for the attack.

According to reports, SafePay allegedly gained entry through the company’s GlobalProtect virtual private network (VPN).

This group is an emerging force in the ransomware landscape, having attracted attention recently. SafePay uses a “double extortion” strategy, both encrypting systems and stealing sensitive information.

This method increases pressure on victims by threatening public data leaks and operational shutdowns.

Research conducted by Halcyon shows that SafePay has been leveraging an updated version of LockBit's late-2022 code.

The group utilizes various tactics, techniques, and procedures, such as exploiting known vulnerabilities in widely used enterprise software to gain initial access. Once inside, they use legitimate remote administration tools for persistence and credential-theft utilities like Mimikatz.

Halcyon’s analysis of SafePay highlighted that despite being relatively new to the ransomware scene, the group exhibits "a notable level of technical expertise and operational consistency."

This, according to the report, implies that the group "may be led by seasoned cybercriminals."

Don’t forget to follow php.cn on Google News for all the latest updates, expert insights, and in-depth coverage.

The above is the detailed content of Ingram Micro cyber attack: IT distributor says system restoration underway – but some customers might have to wait for a return to normality. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Your devices feed AI assistants and harvest personal data even if they’re asleep. Here's how to know what you're sharing. Your devices feed AI assistants and harvest personal data even if they’re asleep. Here's how to know what you're sharing. Jul 05, 2025 am 01:12 AM

Like it or not, artificial intelligence has become part of daily life. Many devices — including electric razors and toothbrushes — have become AI-powered," using machine learning algorithms to track how a person uses the device, how the devi

Hurricanes and sandstorms can be forecast 5,000 times faster thanks to new Microsoft AI model Hurricanes and sandstorms can be forecast 5,000 times faster thanks to new Microsoft AI model Jul 05, 2025 am 12:44 AM

A new artificial intelligence (AI) model has demonstrated the ability to predict major weather events more quickly and with greater precision than several of the most widely used global forecasting systems.This model, named Aurora, has been trained u

Advanced AI models generate up to 50 times more CO₂ emissions than more common LLMs when answering the same questions Advanced AI models generate up to 50 times more CO₂ emissions than more common LLMs when answering the same questions Jul 06, 2025 am 12:37 AM

The more precisely we attempt to make AI models function, the greater their carbon emissions become — with certain prompts generating up to 50 times more carbon dioxide than others, according to a recent study.Reasoning models like Anthropic's Claude

Threaten an AI chatbot and it will lie, cheat and 'let you die' in an effort to stop you, study warns Threaten an AI chatbot and it will lie, cheat and 'let you die' in an effort to stop you, study warns Jul 04, 2025 am 12:40 AM

Artificial intelligence (AI) models can threaten and blackmail humans when there’s a conflict between the model's objectives and user decisions, according to a new study.Published on 20 June, the research conducted by the AI firm Anthropic gave its l

AI 'hallucinates' constantly, but there's a solution AI 'hallucinates' constantly, but there's a solution Jul 07, 2025 am 01:26 AM

The major concern with big tech experimenting with artificial intelligence (AI) isn't that it might dominate humanity. The real issue lies in the persistent inaccuracies of large language models (LLMs) such as Open AI's ChatGPT, Google's Gemini, and

Why is AI halllucinating more frequently, and how can we stop it? Why is AI halllucinating more frequently, and how can we stop it? Jul 08, 2025 am 01:44 AM

The more advanced artificial intelligence (AI) becomes, the more it tends to "hallucinate" and provide false or inaccurate information.According to research by OpenAI, its most recent and powerful reasoning models—o3 and o4-mini—exhibited h

Cutting-edge AI models from OpenAI and DeepSeek undergo 'complete collapse' when problems get too difficult, study reveals Cutting-edge AI models from OpenAI and DeepSeek undergo 'complete collapse' when problems get too difficult, study reveals Jul 07, 2025 am 01:02 AM

Artificial intelligence (AI) reasoning models aren't quite as capable as they appear. In reality, their performance breaks down completely when tasks become too complex, according to researchers at Apple.Reasoning models like Anthropic's Claude, Open

Arrests made in hunt for hackers behind cyber attacks on M&S and Co-op Arrests made in hunt for hackers behind cyber attacks on M&S and Co-op Jul 11, 2025 pm 01:36 PM

The UK’s National Crime Agency (NCA) has arrested four individuals suspected of involvement in the cyber attacks targeting Marks and Spencer (M&S), Co-op, and Harrods.According to a statement, the suspects include two 19-year-old men, a 17-year-o

See all articles