Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ingram Micro Restores Systems Impacted by Ransomware

Posted on July 10, 2025July 10, 2025 By CWS

IT big Ingram Micro says it has restored all providers that had been disrupted by a ransomware assault over the weekend.

The outages began on Friday afternoon, with quite a few prospects complaining of being unable to put orders or entry the corporate’s administration portals.

Over the weekend, the tech big confirmed that it had disconnected inner techniques to comprise a ransomware assault, and mentioned it was implementing mitigation and restoration measures.

Following a sequence of updates describing its progress in bringing the affected techniques and providers again on-line, the corporate introduced Tuesday that the incident was contained and remediated.

Beginning Monday, the IT big had been slowly restoring numerous techniques throughout completely different international locations and areas, and on Wednesday it introduced that every one operations have been restored.

“Ingram Micro is happy to report that we are actually operational throughout all international locations and areas the place we transact enterprise,” the corporate mentioned.

“Our groups are actually in a position to course of and ship orders obtained through EDI, or electronically, in addition to by cellphone or e mail throughout all of our enterprise areas,” it added.

“Our groups proceed to carry out at a swift tempo to serve and assist our prospects and vendor companions. We’re grateful for the assist we’ve obtained from our prospects and trade colleagues,” the corporate mentioned.Commercial. Scroll to proceed studying.

Ingram Micro has not shared particulars on whether or not any information was exfiltrated from its techniques, however mentioned it was nonetheless trying into the scope of the incident and into doubtlessly compromised information.

The SafePlay ransomware group, which is allegedly chargeable for the assault, has stored mum on the incident and it’s unclear whether or not any information was certainly stolen and if the hackers tried to extort Ingram Micro.

Contacted by SecurityWeek, an Ingram Micro spokesperson avoided offering info on the attackers.

Associated: Chain IQ, UBS Information Stolen in Ransomware Assault

Associated: Krispy Kreme Confirms Information Breach After Ransomware Assault

Associated: Fog Ransomware Assault Employs Uncommon Instruments

Security Week News Tags:Impacted, Ingram, Micro, Ransomware, Restores, Systems

Post navigation

Previous Post: Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner
Next Post: eSIM Hack Allows for Cloning, Spying 

Related Posts

Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Security Week News
Controversial Firms Cellebrite and Corellium Announce $200 Million Acquisition Deal Security Week News
CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
MIND Raises $30 Million for Data Loss Prevention Security Week News
Malicious NPM Packages Disguised as Express Utilities Allow Attackers to Wipe Systems Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News