Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantage™, our AI-powered digital platform, we offer what we believe to be the industry’s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.

Ingram Micro A.I CyberSecurity Scoring

Ingram Micro

Company Details

Linkedin ID:

ingram-micro

Employees number:

28,560

Number of followers:

583,296

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

ingrammicro.com

IP Addresses:

0

Company ID:

ING_5511879

Scan Status:

In-progress

AI scoreIngram Micro Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreIngram Micro Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ingram Micro Company CyberSecurity News & History

Past Incidents
8
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Ingram MicroBreach8541/2026NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Ingram Micro Data Breach Exposes PII of 42,000 Individuals On January 21, 2026, Ingram Micro Inc., a global technology distributor, disclosed a cybersecurity incident that compromised the personal data of approximately 42,000 individuals. An unauthorized actor accessed the company’s network, potentially acquiring sensitive personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (such as Social Security, driver’s license, and passport numbers), and employment-related records like work evaluations. The breach is currently under investigation by Lynch Carpenter LLP, a national class action law firm, which is reviewing potential legal claims on behalf of affected individuals. Ingram Micro has not yet provided further details on the timeline of the breach or the methods used by the attacker. This incident adds to a growing list of data breaches exposing sensitive personal and professional information, raising concerns about the security of third-party vendors handling large volumes of PII. Affected individuals may face heightened risks of identity theft and fraud as a result.

Ingram MicroRansomware10057/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Ingram Micro Suffers Ransomware Attack, Disrupting Software Licensing and Operations Ingram Micro, a global technology and electronics distribution giant based in Irvine, California, confirmed a ransomware attack on July 5 that disrupted its network and impacted software licensing services. The incident has prevented customers from using or provisioning certain products reliant on Ingram’s systems, as reported by *TechCrunch*. The company acknowledged the attack in a July 5 statement, stating it was working to restore affected systems. An Ingram spokesperson later directed inquiries to the initial release, indicating no further updates were available at the time. The outage has had financial repercussions, with Ingram Micro’s stock closing down 7.5% at $20.20 per share on the day of the announcement, reducing its market cap to $4.7 billion. With over $54 billion in annual sales, Ingram Micro plays a critical role in the global supply chain for technology products. The attack highlights ongoing vulnerabilities in cybersecurity for major distribution and logistics firms, though the full extent of the impact on operations and customer data remains unclear.

Ingram MicroRansomware10057/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Ingram Micro, a major U.S.-based technology distributor and managed services provider, suffered a ransomware attack starting on Thursday, leading to a prolonged outage of its website and core network systems. The disruption has halted order processing, causing delays in software licensing and preventing customers from accessing or provisioning critical products tied to Ingram’s infrastructure. The attack, attributed to the SafePay ransomware gang (though unconfirmed by the company), has forced Ingram Micro to alert shareholders ahead of market opening. While no data breach details have been publicly confirmed, ransomware groups often exfiltrate sensitive data before encrypting systems, raising concerns about potential data leaks or financial extortion. The outage has crippled operations for Ingram’s global clientele, including smaller businesses reliant on its IT services, risking financial losses, reputational damage, and operational paralysis until systems are restored. The incident underscores the severe impact of ransomware on supply chains and third-party service providers.

Ingram MicroRansomware10057/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Ingram Micro Confirms Ransomware Attack Disrupting Internal Systems Global IT product distributor Ingram Micro has confirmed a ransomware attack that disrupted its operations over the U.S. holiday weekend. The company proactively took certain internal systems offline to contain the breach and strengthen its defenses, though it has not disclosed whether any data was exfiltrated. Speculation about the incident began after Ingram Micro’s website went offline unexpectedly, raising concerns about a potential cyberattack. The company later acknowledged the ransomware intrusion in a statement on its investor relations website. While the exact threat actor behind the attack remains unconfirmed, the incident highlights the ongoing risk of ransomware targeting critical supply chain and distribution networks. No further details on the scope of the breach or potential impact on customers have been released.

Ingram MicroBreach10056/2025ConduentConduent
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Conduent, a New Jersey-based business process outsourcing firm, suffered the largest known health data breach of 2025, exposing sensitive healthcare records. The incident triggered multiple post-hack lawsuits and regulatory investigations, with severe reputational and financial repercussions. The breach compromised personal and medical data of countless individuals, leading to potential identity theft, fraud, and legal liabilities. The fallout includes operational disruptions, loss of client trust, and escalating compliance penalties. Given the scale of the breach affecting healthcare data it poses long-term risks to affected patients, including exposure of protected health information (PHI) and potential misuse by malicious actors. The company faces mounting legal costs, reputational damage, and possible contractual terminations from partners wary of further vulnerabilities. The breach underscores systemic failures in cybersecurity governance, amplifying scrutiny from regulators and stakeholders.

Ingram MicroVulnerability8543/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Weekly Cybersecurity Breach Roundup: DOGE Data Exposure, CIRO Phishing Attack, and Rising Threats This week’s cybersecurity landscape saw multiple high-profile incidents, including unauthorized data sharing by the U.S. Department of Government Efficiency (DOGE), a massive phishing breach in Canada, and a surge in critical vulnerabilities. ### U.S. DOGE Staff Exposed Social Security Data via Unauthorized Cloudflare Server Federal prosecutors confirmed that staff from Elon Musk’s Department of Government Efficiency (DOGE) uploaded sensitive Social Security Administration (SSA) data to an unauthorized Cloudflare server in March 2025. The breach, first reported by a whistleblower in August, involved employees sharing data via third-party links between March 7 and 17. The SSA remains uncertain whether the data was removed from Cloudflare. The incident is part of ongoing litigation over DOGE’s activities at the SSA, which critics claim wasted $21.7 billion. Prosecutors also revealed that a DOGE employee signed an agreement with a political advocacy group seeking voter fraud evidence, potentially linking SSA data to voter rolls. Two DOGE employees were referred to the U.S. Office of Special Counsel for possible Hatch Act violations, which prohibit federal employees from partisan activities. Additionally, a DOGE team member sent an encrypted file believed to contain names and addresses of 1,000 individuals to the Department of Homeland Security and a DOGE advisor at the Department of Labor. The SSA has been unable to decrypt the file. Another DOGE employee continued accessing the "Numident" database containing Social Security card applications and death records despite a court order revoking access. ### Canadian Investment Regulatory Organization (CIRO) Phishing Breach Affects 750,000 Investors The Canadian Investment Regulatory Organization (CIRO) disclosed a phishing attack in August 2025 that exposed sensitive data of approximately 750,000 investors. Compromised information includes names, contact details, dates of birth, Social Insurance numbers, government-issued IDs, investment account numbers, and account statements. CIRO confirmed that login credentials, passwords, and security questions were not accessed. ### UK NCSC Warns of Rising Russia-Aligned Hacktivist DDoS Attacks The UK’s National Cyber Security Centre (NCSC) issued an alert about increased denial-of-service (DDoS) attacks by Russian-aligned hacktivist groups, including NoName057(16). Targets include government bodies, local authorities, and critical infrastructure operators. The NCSC advised organizations to strengthen defenses with traffic filtering, web application firewalls, and rate-limiting policies. ### Ingram Micro Ransomware Attack Exposes 42,000 Employee Records IT distributor Ingram Micro suffered a July 2025 ransomware attack by the SafePay gang, which stole 3.5 terabytes of data, including names, birthdates, Social Security numbers, passport details, and employment records. The breach affected 42,521 individuals. Ingram took systems offline to contain the attack, causing service disruptions before restoring operations by July 9. SafePay later published the stolen data after Ingram refused to pay the ransom. ### CVE Disclosures Surge 21% in 2025 Vulnerability disclosures reached 48,185 in 2025 a 20.6% increase from the previous year with 3,984 critical and 15,003 high-severity flaws. December alone accounted for 5,500 CVEs, while February 26 saw a record 793 disclosures in a single day. Nearly 30% of exploited vulnerabilities were weaponized within one day of disclosure, and 25.8% lacked analysis in the National Vulnerability Database, complicating mitigation efforts. ### SK Telecom Challenges $91 Million Data Leak Fine South Korea’s SK Telecom is contesting a $91 million fine the largest ever imposed by the country’s privacy watchdog after a 2025 data breach exposed all 23 million of its mobile subscribers. The delayed disclosure led to a broader investigation, prompting SK Telecom to offer free USIM replacements. A ransomware group, CoinbaseCartel, later claimed responsibility, alleging it stole source code, project files, and AWS keys via a compromised Bitbucket account. ### Critical Chainlit Vulnerabilities Expose AI Data and Cloud Infrastructure Security researchers at Zafran Labs disclosed two critical flaws in the open-source AI framework Chainlit (CVE-2026-22218 and CVE-2026-22219). The vulnerabilities allow arbitrary file reads and server-side request forgery (SSRF), enabling attackers to access sensitive data, including AI prompts and credentials, and probe internal networks. Chainlit released patches to address the issues. ### North Korean Hackers Abuse Microsoft VS Code for Malware Delivery North Korean threat actors expanded their "Contagious Interview" campaign, using Microsoft Visual Studio Code to execute malware via malicious Git repositories. Victims are tricked into opening projects that automatically run attacker-controlled commands, deploying the EtherRAT macOS trojan. The group has also leveraged developer-friendly platforms like Vercel for command-and-control infrastructure.

Ingram MicroRansomware10051/2025SalesforceSalesforce
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services In 2025, ransomware evolved from isolated IT disruptions into a systemic risk, threatening national supply chains, essential services, and entire industries. Cybersecurity Ventures projects the global cost of ransomware will surge to $275 billion annually by 2031, driven by downtime, data loss, recovery efforts, and lost productivity not just ransom payments. A recent SOCRadar analysis highlighted the top 10 ransomware attacks of 2025, each exposing vulnerabilities across sectors: 1. Salesforce Ecosystem – A SaaS supply chain blind spot exploited for widespread disruption. 2. Oracle E-Business Suite – A zero-day attack leveraging supply chain extortion. 3. Jaguar Land Rover – Britain’s costliest cyberattack, crippling automotive operations. 4. Ingram Micro – A ransomware strike paralyzing global IT distribution. 5. Co-operative Group – A sustained siege on the UK retail sector. 6. PowerSchool – Large-scale extortion targeting the education sector. 7. Synnovis – Healthcare disruption with confirmed patient harm. 8. DaVita – Ransomware striking critical healthcare infrastructure. 9. Asahi Group – Manufacturing halts exposing IT-OT convergence risks. 10. Collins Aerospace – Ransomware grounding European airports. Key patterns emerged across these incidents: - Initial access frequently relied on stolen credentials or social engineering rather than sophisticated exploits. - Supply chain vulnerabilities amplified impact, turning single breaches into cascading failures. - Data theft and operational paralysis often outweighed encryption as the primary damage driver. - Delayed consequences such as regulatory penalties or confirmed human harm surfaced months after the attacks. The incidents underscore ransomware’s growing role as a strategic threat, with far-reaching consequences beyond financial losses.

Ingram MicroBreach8546/2024NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 Individuals U.S.-based IT distributor Ingram Micro disclosed a data security incident from last year that compromised the personal information of more than 40,000 individuals. The breach, which occurred in 2024, exposed sensitive data, though specific details about the type of information affected and the attack vector remain undisclosed. Ingram Micro, a major provider of technology products and services, serves businesses globally, making the incident particularly notable for its potential impact on downstream partners and customers. The company has not released further technical or forensic details about the breach, including whether it resulted from a cyberattack, misconfiguration, or insider threat. The disclosure follows a pattern of high-profile breaches in recent months, including incidents at Minnesota’s Department of Human Services (affecting over 300,000 individuals) and Canada’s CIRO (impacting 750,000 investors). While the full scope of the Ingram Micro breach’s consequences is still unclear, such incidents underscore ongoing risks to supply chain security and the protection of personally identifiable information (PII).

Ingram Micro Inc.: Ingram Micro Data Breach Claims Investigated by Lynch Carpenter
Breach
Severity: 85
Impact: 4
Seen: 1/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Ingram Micro Data Breach Exposes PII of 42,000 Individuals On January 21, 2026, Ingram Micro Inc., a global technology distributor, disclosed a cybersecurity incident that compromised the personal data of approximately 42,000 individuals. An unauthorized actor accessed the company’s network, potentially acquiring sensitive personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (such as Social Security, driver’s license, and passport numbers), and employment-related records like work evaluations. The breach is currently under investigation by Lynch Carpenter LLP, a national class action law firm, which is reviewing potential legal claims on behalf of affected individuals. Ingram Micro has not yet provided further details on the timeline of the breach or the methods used by the attacker. This incident adds to a growing list of data breaches exposing sensitive personal and professional information, raising concerns about the security of third-party vendors handling large volumes of PII. Affected individuals may face heightened risks of identity theft and fraud as a result.

Ingram Micro: Ingram Micro Hit by Ransomware
Ransomware
Severity: 100
Impact: 5
Seen: 7/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Ingram Micro Suffers Ransomware Attack, Disrupting Software Licensing and Operations Ingram Micro, a global technology and electronics distribution giant based in Irvine, California, confirmed a ransomware attack on July 5 that disrupted its network and impacted software licensing services. The incident has prevented customers from using or provisioning certain products reliant on Ingram’s systems, as reported by *TechCrunch*. The company acknowledged the attack in a July 5 statement, stating it was working to restore affected systems. An Ingram spokesperson later directed inquiries to the initial release, indicating no further updates were available at the time. The outage has had financial repercussions, with Ingram Micro’s stock closing down 7.5% at $20.20 per share on the day of the announcement, reducing its market cap to $4.7 billion. With over $54 billion in annual sales, Ingram Micro plays a critical role in the global supply chain for technology products. The attack highlights ongoing vulnerabilities in cybersecurity for major distribution and logistics firms, though the full extent of the impact on operations and customer data remains unclear.

Ingram Micro
Ransomware
Severity: 100
Impact: 5
Seen: 7/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Ingram Micro, a major U.S.-based technology distributor and managed services provider, suffered a ransomware attack starting on Thursday, leading to a prolonged outage of its website and core network systems. The disruption has halted order processing, causing delays in software licensing and preventing customers from accessing or provisioning critical products tied to Ingram’s infrastructure. The attack, attributed to the SafePay ransomware gang (though unconfirmed by the company), has forced Ingram Micro to alert shareholders ahead of market opening. While no data breach details have been publicly confirmed, ransomware groups often exfiltrate sensitive data before encrypting systems, raising concerns about potential data leaks or financial extortion. The outage has crippled operations for Ingram’s global clientele, including smaller businesses reliant on its IT services, risking financial losses, reputational damage, and operational paralysis until systems are restored. The incident underscores the severe impact of ransomware on supply chains and third-party service providers.

Ingram Micro: Ingram Micro confirms it has been hit by ransomware
Ransomware
Severity: 100
Impact: 5
Seen: 7/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Ingram Micro Confirms Ransomware Attack Disrupting Internal Systems Global IT product distributor Ingram Micro has confirmed a ransomware attack that disrupted its operations over the U.S. holiday weekend. The company proactively took certain internal systems offline to contain the breach and strengthen its defenses, though it has not disclosed whether any data was exfiltrated. Speculation about the incident began after Ingram Micro’s website went offline unexpectedly, raising concerns about a potential cyberattack. The company later acknowledged the ransomware intrusion in a statement on its investor relations website. While the exact threat actor behind the attack remains unconfirmed, the incident highlights the ongoing risk of ransomware targeting critical supply chain and distribution networks. No further details on the scope of the breach or potential impact on customers have been released.

Conduent
Breach
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Supply Chain Source: ConduentConduent
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Conduent, a New Jersey-based business process outsourcing firm, suffered the largest known health data breach of 2025, exposing sensitive healthcare records. The incident triggered multiple post-hack lawsuits and regulatory investigations, with severe reputational and financial repercussions. The breach compromised personal and medical data of countless individuals, leading to potential identity theft, fraud, and legal liabilities. The fallout includes operational disruptions, loss of client trust, and escalating compliance penalties. Given the scale of the breach affecting healthcare data it poses long-term risks to affected patients, including exposure of protected health information (PHI) and potential misuse by malicious actors. The company faces mounting legal costs, reputational damage, and possible contractual terminations from partners wary of further vulnerabilities. The breach underscores systemic failures in cybersecurity governance, amplifying scrutiny from regulators and stakeholders.

Chainlit, Ingram Micro, U.S. Department of Government Efficiency, Canadian Investment Regulatory Organization and SK Telecom: Breach Roundup: DOGE Uploaded Social Security Data to Cloud
Vulnerability
Severity: 85
Impact: 4
Seen: 3/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Weekly Cybersecurity Breach Roundup: DOGE Data Exposure, CIRO Phishing Attack, and Rising Threats This week’s cybersecurity landscape saw multiple high-profile incidents, including unauthorized data sharing by the U.S. Department of Government Efficiency (DOGE), a massive phishing breach in Canada, and a surge in critical vulnerabilities. ### U.S. DOGE Staff Exposed Social Security Data via Unauthorized Cloudflare Server Federal prosecutors confirmed that staff from Elon Musk’s Department of Government Efficiency (DOGE) uploaded sensitive Social Security Administration (SSA) data to an unauthorized Cloudflare server in March 2025. The breach, first reported by a whistleblower in August, involved employees sharing data via third-party links between March 7 and 17. The SSA remains uncertain whether the data was removed from Cloudflare. The incident is part of ongoing litigation over DOGE’s activities at the SSA, which critics claim wasted $21.7 billion. Prosecutors also revealed that a DOGE employee signed an agreement with a political advocacy group seeking voter fraud evidence, potentially linking SSA data to voter rolls. Two DOGE employees were referred to the U.S. Office of Special Counsel for possible Hatch Act violations, which prohibit federal employees from partisan activities. Additionally, a DOGE team member sent an encrypted file believed to contain names and addresses of 1,000 individuals to the Department of Homeland Security and a DOGE advisor at the Department of Labor. The SSA has been unable to decrypt the file. Another DOGE employee continued accessing the "Numident" database containing Social Security card applications and death records despite a court order revoking access. ### Canadian Investment Regulatory Organization (CIRO) Phishing Breach Affects 750,000 Investors The Canadian Investment Regulatory Organization (CIRO) disclosed a phishing attack in August 2025 that exposed sensitive data of approximately 750,000 investors. Compromised information includes names, contact details, dates of birth, Social Insurance numbers, government-issued IDs, investment account numbers, and account statements. CIRO confirmed that login credentials, passwords, and security questions were not accessed. ### UK NCSC Warns of Rising Russia-Aligned Hacktivist DDoS Attacks The UK’s National Cyber Security Centre (NCSC) issued an alert about increased denial-of-service (DDoS) attacks by Russian-aligned hacktivist groups, including NoName057(16). Targets include government bodies, local authorities, and critical infrastructure operators. The NCSC advised organizations to strengthen defenses with traffic filtering, web application firewalls, and rate-limiting policies. ### Ingram Micro Ransomware Attack Exposes 42,000 Employee Records IT distributor Ingram Micro suffered a July 2025 ransomware attack by the SafePay gang, which stole 3.5 terabytes of data, including names, birthdates, Social Security numbers, passport details, and employment records. The breach affected 42,521 individuals. Ingram took systems offline to contain the attack, causing service disruptions before restoring operations by July 9. SafePay later published the stolen data after Ingram refused to pay the ransom. ### CVE Disclosures Surge 21% in 2025 Vulnerability disclosures reached 48,185 in 2025 a 20.6% increase from the previous year with 3,984 critical and 15,003 high-severity flaws. December alone accounted for 5,500 CVEs, while February 26 saw a record 793 disclosures in a single day. Nearly 30% of exploited vulnerabilities were weaponized within one day of disclosure, and 25.8% lacked analysis in the National Vulnerability Database, complicating mitigation efforts. ### SK Telecom Challenges $91 Million Data Leak Fine South Korea’s SK Telecom is contesting a $91 million fine the largest ever imposed by the country’s privacy watchdog after a 2025 data breach exposed all 23 million of its mobile subscribers. The delayed disclosure led to a broader investigation, prompting SK Telecom to offer free USIM replacements. A ransomware group, CoinbaseCartel, later claimed responsibility, alleging it stole source code, project files, and AWS keys via a compromised Bitbucket account. ### Critical Chainlit Vulnerabilities Expose AI Data and Cloud Infrastructure Security researchers at Zafran Labs disclosed two critical flaws in the open-source AI framework Chainlit (CVE-2026-22218 and CVE-2026-22219). The vulnerabilities allow arbitrary file reads and server-side request forgery (SSRF), enabling attackers to access sensitive data, including AI prompts and credentials, and probe internal networks. Chainlit released patches to address the issues. ### North Korean Hackers Abuse Microsoft VS Code for Malware Delivery North Korean threat actors expanded their "Contagious Interview" campaign, using Microsoft Visual Studio Code to execute malware via malicious Git repositories. Victims are tricked into opening projects that automatically run attacker-controlled commands, deploying the EtherRAT macOS trojan. The group has also leveraged developer-friendly platforms like Vercel for command-and-control infrastructure.

Co-operative Group, Ingram Micro, Salesforce, Jaguar Land Rover, Oracle, Synnovis and DaVita: Top 10 Ransomware Attacks Over The Past Year
Ransomware
Severity: 100
Impact: 5
Seen: 1/2025
Blog:
Supply Chain Source: SalesforceSalesforce
Rankiteo Explanation
Attack threatening the organization's existence

Description: Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services In 2025, ransomware evolved from isolated IT disruptions into a systemic risk, threatening national supply chains, essential services, and entire industries. Cybersecurity Ventures projects the global cost of ransomware will surge to $275 billion annually by 2031, driven by downtime, data loss, recovery efforts, and lost productivity not just ransom payments. A recent SOCRadar analysis highlighted the top 10 ransomware attacks of 2025, each exposing vulnerabilities across sectors: 1. Salesforce Ecosystem – A SaaS supply chain blind spot exploited for widespread disruption. 2. Oracle E-Business Suite – A zero-day attack leveraging supply chain extortion. 3. Jaguar Land Rover – Britain’s costliest cyberattack, crippling automotive operations. 4. Ingram Micro – A ransomware strike paralyzing global IT distribution. 5. Co-operative Group – A sustained siege on the UK retail sector. 6. PowerSchool – Large-scale extortion targeting the education sector. 7. Synnovis – Healthcare disruption with confirmed patient harm. 8. DaVita – Ransomware striking critical healthcare infrastructure. 9. Asahi Group – Manufacturing halts exposing IT-OT convergence risks. 10. Collins Aerospace – Ransomware grounding European airports. Key patterns emerged across these incidents: - Initial access frequently relied on stolen credentials or social engineering rather than sophisticated exploits. - Supply chain vulnerabilities amplified impact, turning single breaches into cascading failures. - Data theft and operational paralysis often outweighed encryption as the primary damage driver. - Delayed consequences such as regulatory penalties or confirmed human harm surfaced months after the attacks. The incidents underscore ransomware’s growing role as a strategic threat, with far-reaching consequences beyond financial losses.

Ingram Micro: Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 People
Breach
Severity: 85
Impact: 4
Seen: 6/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 Individuals U.S.-based IT distributor Ingram Micro disclosed a data security incident from last year that compromised the personal information of more than 40,000 individuals. The breach, which occurred in 2024, exposed sensitive data, though specific details about the type of information affected and the attack vector remain undisclosed. Ingram Micro, a major provider of technology products and services, serves businesses globally, making the incident particularly notable for its potential impact on downstream partners and customers. The company has not released further technical or forensic details about the breach, including whether it resulted from a cyberattack, misconfiguration, or insider threat. The disclosure follows a pattern of high-profile breaches in recent months, including incidents at Minnesota’s Department of Human Services (affecting over 300,000 individuals) and Canada’s CIRO (impacting 750,000 investors). While the full scope of the Ingram Micro breach’s consequences is still unclear, such incidents underscore ongoing risks to supply chain security and the protection of personally identifiable information (PII).

Ailogo

Ingram Micro Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Ingram Micro

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Ingram Micro has 40.12% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Ingram Micro has 15.25% fewer incidents than the average of all companies with at least one recorded incident.

Incident Types Ingram Micro vs IT Services and IT Consulting Industry Avg (This Year)

Ingram Micro reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — Ingram Micro (X = Date, Y = Severity)

Ingram Micro cyber incidents detection timeline including parent company and subsidiaries

Ingram Micro Company Subsidiaries

SubsidiaryImage

Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantage™, our AI-powered digital platform, we offer what we believe to be the industry’s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.

Loading...
similarCompanies

Ingram Micro Similar Companies

Unlocking financial technology. Bringing the world’s money into harmony. At FIS, we advance the way the world pays, banks, and invests. With decades of expertise, we provide financial technology solutions to financial institutions, businesses, and developers. Headquartered in Jacksonville, Florida,

Oracle

We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’

Insights you can act on. Founded in 1976, CGI is among the largest IT and business consulting services firms in the world. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across hundreds of locations worldwide, we provide comprehensive, scalable and susta

FPT Software

FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. Embracing an AI-first approach, FPT Software enables breakthrough speed, scalability and quali

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation s

TELUS Digital

TELUS Digital crafts unique and enduring experiences for customers and employees, and creates future-focused digital transformations that stand the test of time. We are the brand behind the brands. Our global team members are both passionate ambassadors of our clients’ products and services, and vis

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to

Engineering Group

Engineering Group is the Digital Transformation Company, leader in Italy and expanding its global footprint, with around 14,000 associates and with over 80 offices spread across Europe, the United States, and South America and global delivery. The Engineering Group, consisting of over 70 companies

Sogeti

Part of the Capgemini Group, Sogeti makes business value through technology for organizations that need to implement innovation at speed and want a local partner with global scale. With a hands-on culture and close proximity to its clients, Sogeti implements solutions that will help organizations wo

newsone

Ingram Micro CyberSecurity News

March 11, 2026 07:00 AM
Ingram Micro Launches EMEA Unified Services Centre to Accelerate Cloud, Data & AI, and Cybersecurity outcomes for Partners

Ingram Micro, a leading global technology distributor and platform company, today announced the launch of its EMEA Unified Services Centre,...

March 02, 2026 08:00 AM
Ingram Micro Reports Continued Strong 2025 Net Sales Growth, Up 11.5% for Fiscal Fourth Quarter and Up 9.5% for Fiscal Year, With Operating Expense Efficiency and Robust Cash Flow Generation

Fiscal Fourth Quarter 2025 Fourth quarter net sales of $14.9 billion – above high end of guidance range – up 11.5% from the prior-year…...

February 24, 2026 08:00 AM
Keeper Security expands Ingram Micro partnership in Singapore

Keeper Security will leverage Ingram Micro's distribution network to broaden availability of Privileged Access Management in Singapore.

February 09, 2026 08:00 AM
Arctic Wolf expands Malaysia operations with Ingram Micro and Anon Security

Arctic Wolf has officially launched Managed Detection and Response (MDR) in Malaysia, partnering with Ingram Micro Malaysia and Anon...

January 22, 2026 08:26 AM
Ingram Micro Data Breach Impacts Staff, Applicants

Ingram Micro, one of the world's largest IT distributors, has confirmed that sensitive personal data was leaked following a ransomware attack that disrupted...

January 21, 2026 08:00 AM
Ingram Micro Data Breach Claims Investigated by Lynch Carpenter

PITTSBURGH, Jan. 21, 2026 (GLOBE NEWSWIRE) -- Ingram Micro Inc. (“Ingram Micro”),1 recently announced a cybersecurity incident,...

January 20, 2026 08:00 AM
Ingram Micro Says July Ransomware Attack Hit 42,000 People

Ingram Micro has written to over 42,000 people informing them they were caught up in its July 2025 ransomware attack.

January 20, 2026 08:00 AM
Ingram Micro data breach affects 42,000 individuals

Ingram Micro reports that 42521 people were affected by the SafePay group's ransomware attack in July 2025. Personal data stolen.

January 20, 2026 08:00 AM
Ingram Micro data breach exposes personal information of 42,000 individuals

The cybersecurity incident was detected on July 3, 2025, prompting Ingram Micro to launch an investigation with the assistance of...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ingram Micro CyberSecurity History Information

Official Website of Ingram Micro

The official website of Ingram Micro is http://www.ingrammicro.com.

Ingram Micro’s AI-Generated Cybersecurity Score

According to Rankiteo, Ingram Micro’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.

How many security badges does Ingram Micro’ have ?

According to Rankiteo, Ingram Micro currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Ingram Micro been affected by any supply chain cyber incidents ?

According to Rankiteo, Ingram Micro has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:

  • Conduent (Incident ID: CON5792357110725)
  • Salesforce (Incident ID: THEINGSALJAGORASYNDAV1769095448)
Does Ingram Micro have SOC 2 Type 1 certification ?

According to Rankiteo, Ingram Micro is not certified under SOC 2 Type 1.

Does Ingram Micro have SOC 2 Type 2 certification ?

According to Rankiteo, Ingram Micro does not hold a SOC 2 Type 2 certification.

Does Ingram Micro comply with GDPR ?

According to Rankiteo, Ingram Micro is not listed as GDPR compliant.

Does Ingram Micro have PCI DSS certification ?

According to Rankiteo, Ingram Micro does not currently maintain PCI DSS compliance.

Does Ingram Micro comply with HIPAA ?

According to Rankiteo, Ingram Micro is not compliant with HIPAA regulations.

Does Ingram Micro have ISO 27001 certification ?

According to Rankiteo,Ingram Micro is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ingram Micro

Ingram Micro operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Ingram Micro

Ingram Micro employs approximately 28,560 people worldwide.

Subsidiaries Owned by Ingram Micro

Ingram Micro presently has no subsidiaries across any sectors.

Ingram Micro’s LinkedIn Followers

Ingram Micro’s official LinkedIn profile has approximately 583,296 followers.

NAICS Classification of Ingram Micro

Ingram Micro is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Ingram Micro’s Presence on Crunchbase

No, Ingram Micro does not have a profile on Crunchbase.

Ingram Micro’s Presence on LinkedIn

Yes, Ingram Micro maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ingram-micro.

Cybersecurity Incidents Involving Ingram Micro

As of March 28, 2026, Rankiteo reports that Ingram Micro has experienced 8 cybersecurity incidents.

Number of Peer and Competitor Companies

Ingram Micro has an estimated 39,818 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ingram Micro ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach, Vulnerability and Ransomware.

What was the total financial impact of these incidents on Ingram Micro ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $275.09 billion.

How does Ingram Micro detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with system shutdown to limit spread, and remediation measures with restoring systems to resume order processing, and communication strategy with public disclosure to shareholders, communication strategy with brief statements to media, and law enforcement notified with likely (given nation-state involvement in f5 breach), and third party assistance with lynch carpenter llp (investigating potential legal claims), and incident response plan activated with ingram micro (systems taken offline), incident response plan activated with ciro (disclosure), and containment measures with ingram micro took systems offline, containment measures with sk telecom offered free usim replacements, and remediation measures with chainlit released patches for cve-2026-22218 and cve-2026-22219, and recovery measures with ingram micro restored operations by july 9, 2025, and communication strategy with ciro disclosed breach in august 2025, communication strategy with sk telecom contested fine, and recovery measures with working to restore affected systems, and communication strategy with initial statement on july 5, no further updates, and incident response plan activated with proactively took certain internal systems offline, and containment measures with took certain internal systems offline, and remediation measures with strengthened defenses, and communication strategy with acknowledged the ransomware intrusion in a statement on its investor relations website..

Incident Details

Can you provide details on each incident ?

Incident : ransomware

Title: Ransomware Attack on Ingram Micro Causes Major Outage

Description: Ingram Micro, a U.S. technology distributing giant and managed services provider, experienced a ransomware attack that caused an ongoing outage. The attack began on Thursday, leading to the shutdown of the company’s website and much of its network. The outage is affecting software licensing, preventing customers from using or provisioning some products that rely on Ingram’s systems. The SafePay ransomware gang is reportedly responsible, though no major group has officially taken credit. Ingram Micro is working to restore systems to resume order processing.

Date Detected: 2024-02-15T00:00:00Z

Date Publicly Disclosed: 2024-02-19T00:00:00Z

Type: ransomware

Threat Actor: SafePay ransomware gang (reported)

Motivation: financial extortion (presumed)

Incident : Cybercrime

Title: Conduent Health Data Breach and F5 Nation-State Hack

Description: The incident involves two major cybersecurity events: (1) The largest known health data breach of 2025 affecting Conduent, a New Jersey-based business process outsourcing firm, leading to lawsuits and investigations. (2) A suspected nation-state hack of cybersecurity vendor F5, involving the theft of source code, with federal response complicated by the U.S. government shutdown. Additionally, there is a noted rise in targeting of Western critical infrastructure by nation-state attackers and hacktivist groups.

Type: Cybercrime

Threat Actor: Nation-state attackers (suspected in F5 breach)Hacktivist groups (targeting critical infrastructure)

Motivation: Espionage (F5 source code theft)Financial gain (Conduent breach)Activism (hacktivist attacks on critical infrastructure)

Incident : Data Breach

Title: Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 Individuals

Description: U.S.-based IT distributor Ingram Micro disclosed a data security incident from last year that compromised the personal information of more than 40,000 individuals. The breach, which occurred in 2024, exposed sensitive data, though specific details about the type of information affected and the attack vector remain undisclosed. The company has not released further technical or forensic details about the breach, including whether it resulted from a cyberattack, misconfiguration, or insider threat.

Date Detected: 2024

Type: Data Breach

Incident : Data Breach

Title: Ingram Micro Data Breach Exposes PII of 42,000 Individuals

Description: On January 21, 2026, Ingram Micro Inc., a global technology distributor, disclosed a cybersecurity incident that compromised the personal data of approximately 42,000 individuals. An unauthorized actor accessed the company’s network, potentially acquiring sensitive personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (such as Social Security, driver’s license, and passport numbers), and employment-related records like work evaluations.

Date Publicly Disclosed: 2026-01-21

Type: Data Breach

Incident : Ransomware

Title: Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services

Description: In 2025, ransomware evolved from isolated IT disruptions into a systemic risk, threatening national supply chains, essential services, and entire industries. The top 10 ransomware attacks of 2025 exposed vulnerabilities across sectors, including SaaS supply chain blind spots, zero-day attacks, and sustained sieges on critical infrastructure.

Date Publicly Disclosed: 2025

Type: Ransomware

Attack Vector: Stolen credentialsSocial engineeringSupply chain vulnerabilities

Vulnerability Exploited: Zero-daySaaS supply chain blind spotsIT-OT convergence risks

Motivation: Financial gainExtortionOperational disruption

Incident : Data Breach

Title: Weekly Cybersecurity Breach Roundup: DOGE Data Exposure, CIRO Phishing Attack, and Rising Threats

Description: This week’s cybersecurity landscape saw multiple high-profile incidents, including unauthorized data sharing by the U.S. Department of Government Efficiency (DOGE), a massive phishing breach in Canada, and a surge in critical vulnerabilities.

Date Detected: 2025-08-01

Date Publicly Disclosed: 2025-08-01

Type: Data Breach

Attack Vector: Unauthorized Cloud StoragePhishingRansomwareDDoSMalicious Git Repositories

Vulnerability Exploited: CVE-2026-22218CVE-2026-22219

Threat Actor: NoName057(16)SafePay gangNorth Korean HackersCoinbaseCartel

Motivation: PoliticalFinancial GainEspionageHacktivism

Incident : ransomware

Title: Ingram Micro Suffers Ransomware Attack, Disrupting Software Licensing and Operations

Description: Ingram Micro, a global technology and electronics distribution giant, confirmed a ransomware attack on July 5 that disrupted its network and impacted software licensing services. The incident has prevented customers from using or provisioning certain products reliant on Ingram’s systems.

Date Detected: 2024-07-05

Date Publicly Disclosed: 2024-07-05

Type: ransomware

Incident : ransomware

Title: Ingram Micro Ransomware Attack

Description: Global IT product distributor Ingram Micro confirmed a ransomware attack that disrupted its operations over the U.S. holiday weekend. The company proactively took certain internal systems offline to contain the breach and strengthen its defenses, though it has not disclosed whether any data was exfiltrated.

Type: ransomware

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen credentialsSocial engineering and Compromised Bitbucket account (SK Telecom).

Impact of the Incidents

What was the impact of each incident ?

Incident : ransomware ING1802018100325

Systems Affected: websitenetwork infrastructureorder processing systemssoftware licensing systems

Downtime: {'start': '2024-02-15T00:00:00Z', 'end': None, 'duration': 'ongoing (as of 2024-02-19)'}

Operational Impact: halted order processingdisrupted software licensing for customersprevented provisioning of products relying on Ingram’s systems

Brand Reputation Impact: potential damage due to prolonged outage and ransomware association

Incident : Cybercrime CON5792357110725

Data Compromised: Health data (conduent breach), Source code (f5 breach)

Operational Impact: Federal response delayed due to U.S. government shutdown (F5 breach)

Brand Reputation Impact: Significant (Conduent facing lawsuits and investigations)

Legal Liabilities: Lawsuits filed against Conduent

Incident : Data Breach ING1769002251

Data Compromised: Personal information of over 40,000 individuals

Identity Theft Risk: High

Incident : Data Breach ING1769038099

Data Compromised: Personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (Social Security, driver’s license, passport numbers), and employment-related records

Brand Reputation Impact: Raised concerns about the security of third-party vendors handling large volumes of PII

Legal Liabilities: Potential legal claims being reviewed by Lynch Carpenter LLP

Identity Theft Risk: Heightened risks of identity theft and fraud

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Financial Loss: $275 billion annually by 2031 (projected global cost)

Systems Affected: SaaS platformsIT distribution networksHealthcare infrastructureManufacturing OT systemsAviation systems

Downtime: True

Operational Impact: Crippling automotive operationsParalyzing global IT distributionHealthcare disruption with confirmed patient harmManufacturing haltsGrounding of European airports

Revenue Loss: True

Incident : Data Breach THEINGDEPCIRTIM1769124673

Financial Loss: $91 million (proposed fine for SK Telecom)

Data Compromised: Social security data, Personal identifiable information (pii), Investment account details, Employee records, Ai prompts and credentials

Systems Affected: Cloudflare serverCIRO systemsIngram Micro systemsSK Telecom systemsChainlit AI framework

Downtime: Ingram Micro systems taken offline (restored by July 9, 2025)

Operational Impact: Service disruptionsDelayed regulatory disclosures

Brand Reputation Impact: SK TelecomCIROIngram Micro

Legal Liabilities: Hatch Act violations (DOGE)Regulatory fines (SK Telecom)

Identity Theft Risk: ['High (SSN, passport details, government IDs)']

Incident : ransomware ING1770920806

Systems Affected: software licensing services, network

Operational Impact: disrupted operations, prevented customers from using or provisioning certain products

Incident : ransomware ING1771976571

Systems Affected: internal systems

Operational Impact: disrupted operations

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $34.39 billion.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Health Data (Conduent), Source Code (F5), , Personal information, sensitive data, Personally identifiable information (PII), Social Security Data, Pii, Investment Account Details, Employee Records, Ai Prompts And Credentials and .

Which entities were affected by each incident ?

Incident : ransomware ING1802018100325

Entity Name: Ingram Micro

Entity Type: technology distributor, managed services provider

Industry: technology distribution and IT services

Location: California, United States

Size: large (global operations)

Customers Affected: corporate customers (especially smaller businesses relying on Ingram’s cloud/IT services)

Incident : Cybercrime CON5792357110725

Entity Name: Conduent

Entity Type: Business Process Outsourcing (BPO) Firm

Industry: Healthcare / Outsourcing

Location: New Jersey, USA

Incident : Cybercrime CON5792357110725

Entity Name: F5

Entity Type: Cybersecurity Vendor

Industry: Technology / Security

Location: USA

Incident : Cybercrime CON5792357110725

Entity Name: U.S. Federal Government

Entity Type: Government

Industry: Public Sector

Location: USA

Incident : Cybercrime CON5792357110725

Entity Name: Western Critical Infrastructure Sectors

Entity Type: Critical Infrastructure

Industry: Multiple (e.g., Energy, Healthcare, Transportation)

Location: Western countries

Incident : Data Breach ING1769002251

Entity Name: Ingram Micro

Entity Type: IT Distributor

Industry: Technology/IT Distribution

Location: U.S.

Customers Affected: 40,000+ individuals

Incident : Data Breach ING1769038099

Entity Name: Ingram Micro Inc.

Entity Type: Company

Industry: Technology Distribution

Location: Global

Customers Affected: 42,000

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Salesforce Ecosystem

Entity Type: SaaS

Industry: Technology

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Oracle E-Business Suite

Entity Type: Enterprise Software

Industry: Technology

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Jaguar Land Rover

Entity Type: Automotive

Industry: Manufacturing

Location: UK

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Ingram Micro

Entity Type: IT Distribution

Industry: Technology

Location: Global

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Co-operative Group

Entity Type: Retail

Industry: Retail

Location: UK

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: PowerSchool

Entity Type: Education Software

Industry: Education

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Synnovis

Entity Type: Healthcare Services

Industry: Healthcare

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: DaVita

Entity Type: Healthcare

Industry: Healthcare

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Asahi Group

Entity Type: Manufacturing

Industry: Manufacturing

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entity Name: Collins Aerospace

Entity Type: Aerospace

Industry: Aviation

Location: Europe

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entity Name: U.S. Department of Government Efficiency (DOGE)

Entity Type: Government Agency

Industry: Government

Location: United States

Size: Large

Customers Affected: Unknown (SSA data exposed)

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entity Name: Canadian Investment Regulatory Organization (CIRO)

Entity Type: Regulatory Body

Industry: Finance

Location: Canada

Size: Large

Customers Affected: 750,000 investors

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entity Name: Ingram Micro

Entity Type: IT Distributor

Industry: Technology

Location: Global

Size: Large

Customers Affected: 42,521 employees

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entity Name: SK Telecom

Entity Type: Telecommunications

Industry: Telecom

Location: South Korea

Size: Large

Customers Affected: 23 million subscribers

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entity Name: Chainlit

Entity Type: Open-Source AI Framework

Industry: Technology

Location: Global

Size: Small/Medium

Customers Affected: Unknown

Incident : ransomware ING1770920806

Entity Name: Ingram Micro

Entity Type: corporation

Industry: technology and electronics distribution

Location: Irvine, California

Size: over $54 billion in annual sales

Customers Affected: customers reliant on Ingram’s systems for software licensing

Incident : ransomware ING1771976571

Entity Name: Ingram Micro

Entity Type: IT product distributor

Industry: Technology/Distribution

Location: Global

Response to the Incidents

What measures were taken in response to each incident ?

Incident : ransomware ING1802018100325

Incident Response Plan Activated: True

Containment Measures: system shutdown to limit spread

Remediation Measures: restoring systems to resume order processing

Communication Strategy: public disclosure to shareholdersbrief statements to media

Incident : Cybercrime CON5792357110725

Law Enforcement Notified: Likely (given nation-state involvement in F5 breach)

Incident : Data Breach ING1769038099

Third Party Assistance: Lynch Carpenter LLP (investigating potential legal claims)

Incident : Data Breach THEINGDEPCIRTIM1769124673

Incident Response Plan Activated: ['Ingram Micro (systems taken offline)', 'CIRO (disclosure)']

Containment Measures: Ingram Micro took systems offlineSK Telecom offered free USIM replacements

Remediation Measures: Chainlit released patches for CVE-2026-22218 and CVE-2026-22219

Recovery Measures: Ingram Micro restored operations by July 9, 2025

Communication Strategy: CIRO disclosed breach in August 2025SK Telecom contested fine

Incident : ransomware ING1770920806

Recovery Measures: working to restore affected systems

Communication Strategy: initial statement on July 5, no further updates

Incident : ransomware ING1771976571

Incident Response Plan Activated: proactively took certain internal systems offline

Containment Measures: took certain internal systems offline

Remediation Measures: strengthened defenses

Communication Strategy: acknowledged the ransomware intrusion in a statement on its investor relations website

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Ingram Micro (systems taken offline), CIRO (disclosure), , proactively took certain internal systems offline.

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Lynch Carpenter LLP (investigating potential legal claims).

Data Breach Information

What type of data was compromised in each breach ?

Incident : ransomware ING1802018100325

Data Exfiltration: suspected (common tactic for ransomware gangs, but unconfirmed)

Data Encryption: likely (ransomware attack)

Incident : Cybercrime CON5792357110725

Type of Data Compromised: Health data (conduent), Source code (f5)

Sensitivity of Data: High (health data and proprietary source code)

Data Exfiltration: Confirmed (F5 source code theft)

Personally Identifiable Information: Likely (health data breach)

Incident : Data Breach ING1769002251

Type of Data Compromised: Personal information, sensitive data

Number of Records Exposed: 40,000+

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach ING1769038099

Type of Data Compromised: Personally identifiable information (PII)

Number of Records Exposed: 42,000

Sensitivity of Data: High (government-issued IDs, employment records)

Personally Identifiable Information: Names, contact details, dates of birth, Social Security numbers, driver’s license numbers, passport numbers, employment-related records

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Data Encryption: True

Incident : Data Breach THEINGDEPCIRTIM1769124673

Type of Data Compromised: Social security data, Pii, Investment account details, Employee records, Ai prompts and credentials

Number of Records Exposed: 750,000 (CIRO), 42,521 (Ingram Micro), 23 million (SK Telecom)

Sensitivity of Data: High (SSN, passport details, government IDs, financial records)

Data Exfiltration: 3.5 TB (Ingram Micro)Unknown (DOGE, SK Telecom)

Data Encryption: ['File encrypted by DOGE employee (undecryptable)']

Personally Identifiable Information: Names, birthdates, SSN, passport details, government IDs

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: restoring systems to resume order processing, , Chainlit released patches for CVE-2026-22218 and CVE-2026-22219, , strengthened defenses.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by system shutdown to limit spread, , ingram micro took systems offline, sk telecom offered free usim replacements, and took certain internal systems offline.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : ransomware ING1802018100325

Ransomware Strain: SafePay (reported)

Data Encryption: True

Data Exfiltration: suspected

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Ransom Demanded: True

Data Encryption: True

Data Exfiltration: True

Incident : Data Breach THEINGDEPCIRTIM1769124673

Ransom Paid: No (Ingram Micro)

Ransomware Strain: SafePay

Data Encryption: Yes (Ingram Micro)

Data Exfiltration: Yes (3.5 TB stolen by SafePay)

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Ingram Micro restored operations by July 9, 2025, , working to restore affected systems.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Cybercrime CON5792357110725

Legal Actions: Lawsuits filed against Conduent

Incident : Data Breach ING1769038099

Legal Actions: Potential class action lawsuit being reviewed

Incident : Data Breach THEINGDEPCIRTIM1769124673

Regulations Violated: Hatch Act (DOGE), South Korea Privacy Laws (SK Telecom),

Fines Imposed: ['$91 million proposed (SK Telecom)']

Legal Actions: Litigation over DOGE activities at SSA,

Regulatory Notifications: CIRO disclosed breach in August 2025

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuits filed against Conduent, Potential class action lawsuit being reviewed, Litigation over DOGE activities at SSA, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Lessons Learned: Ransomware has evolved into a systemic risk with cascading impacts on supply chains, critical services, and industries. Initial access often relies on stolen credentials or social engineering, and supply chain vulnerabilities amplify the impact. Data theft and operational paralysis are primary damage drivers, with delayed consequences such as regulatory penalties or human harm.

What recommendations were made to prevent future incidents ?

Incident : Data Breach THEINGDEPCIRTIM1769124673

Recommendations: Strengthen DDoS defenses (traffic filtering, WAFs, rate-limiting), Patch critical vulnerabilities promptly (e.g., Chainlit), Avoid unauthorized cloud storage for sensitive data, Enhance monitoring of third-party access to sensitive databasesStrengthen DDoS defenses (traffic filtering, WAFs, rate-limiting), Patch critical vulnerabilities promptly (e.g., Chainlit), Avoid unauthorized cloud storage for sensitive data, Enhance monitoring of third-party access to sensitive databasesStrengthen DDoS defenses (traffic filtering, WAFs, rate-limiting), Patch critical vulnerabilities promptly (e.g., Chainlit), Avoid unauthorized cloud storage for sensitive data, Enhance monitoring of third-party access to sensitive databasesStrengthen DDoS defenses (traffic filtering, WAFs, rate-limiting), Patch critical vulnerabilities promptly (e.g., Chainlit), Avoid unauthorized cloud storage for sensitive data, Enhance monitoring of third-party access to sensitive databases

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Ransomware has evolved into a systemic risk with cascading impacts on supply chains, critical services, and industries. Initial access often relies on stolen credentials or social engineering, and supply chain vulnerabilities amplify the impact. Data theft and operational paralysis are primary damage drivers, with delayed consequences such as regulatory penalties or human harm.

References

Where can I find more information about each incident ?

Incident : ransomware ING1802018100325

Source: Bleeping Computer

Incident : ransomware ING1802018100325

Source: Ingram Micro public statement (2024-02-19)

Date Accessed: 2024-02-19

Incident : Cybercrime CON5792357110725

Source: ISMG Editors' Panel

Incident : Cybercrime CON5792357110725

Source: Midnight in the War Room (documentary preview)

Incident : Data Breach ING1769002251

Source: Cyber Incident Description

Incident : Data Breach ING1769038099

Source: Incident disclosure

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Source: SOCRadar analysis

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Source: Cybersecurity Ventures

Incident : Data Breach THEINGDEPCIRTIM1769124673

Source: Whistleblower Report

Incident : Data Breach THEINGDEPCIRTIM1769124673

Source: UK NCSC Alert

Incident : Data Breach THEINGDEPCIRTIM1769124673

Source: Zafran Labs Disclosure

Incident : ransomware ING1770920806

Source: TechCrunch

Incident : ransomware ING1771976571

Source: Ingram Micro investor relations website

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Bleeping Computer, and Source: Ingram Micro public statement (2024-02-19)Date Accessed: 2024-02-19, and Source: ISMG Editors' Panel, and Source: Midnight in the War Room (documentary preview), and Source: Cyber Incident Description, and Source: Incident disclosure, and Source: SOCRadar analysis, and Source: Cybersecurity Ventures, and Source: Whistleblower Report, and Source: UK NCSC Alert, and Source: Zafran Labs Disclosure, and Source: TechCrunch, and Source: Ingram Micro investor relations website.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : ransomware ING1802018100325

Investigation Status: ongoing

Incident : Cybercrime CON5792357110725

Investigation Status: Ongoing (Conduent lawsuits and F5 breach response delayed by government shutdown)

Incident : Data Breach ING1769038099

Investigation Status: Ongoing

Incident : Data Breach THEINGDEPCIRTIM1769124673

Investigation Status: Ongoing (DOGE, SK Telecom, CIRO)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure To Shareholders, Brief Statements To Media, Ciro Disclosed Breach In August 2025, Sk Telecom Contested Fine, initial statement on July 5, no further updates and acknowledged the ransomware intrusion in a statement on its investor relations website.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : ransomware ING1802018100325

Stakeholder Advisories: Shareholders Notified Before U.S. Market Opening On 2024-02-19.

Incident : Data Breach THEINGDEPCIRTIM1769124673

Stakeholder Advisories: UK NCSC advised organizations to strengthen DDoS defenses

Customer Advisories: CIRO notified affected investors; SK Telecom offered USIM replacements

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Shareholders Notified Before U.S. Market Opening On 2024-02-19, UK NCSC advised organizations to strengthen DDoS defenses and CIRO notified affected investors; SK Telecom offered USIM replacements.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Cybercrime CON5792357110725

High Value Targets: F5 Source Code, Conduent Health Data,

Data Sold on Dark Web: F5 Source Code, Conduent Health Data,

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Entry Point: Stolen Credentials, Social Engineering,

Incident : Data Breach THEINGDEPCIRTIM1769124673

Entry Point: Compromised Bitbucket account (SK Telecom)

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Ransomware THEINGSALJAGORASYNDAV1769095448

Root Causes: Supply Chain Vulnerabilities, Stolen Credentials, Social Engineering, It-Ot Convergence Risks,

Incident : Data Breach THEINGDEPCIRTIM1769124673

Root Causes: Unauthorized Cloud Storage (Doge), Phishing Attack (Ciro), Ransomware (Ingram Micro), Unpatched Vulnerabilities (Chainlit), Malicious Git Repositories (North Korean Hackers),

Corrective Actions: Patch Management (Chainlit), Enhanced Access Controls (Doge, Ciro), Ddos Mitigation Strategies (Uk Organizations),

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Lynch Carpenter LLP (investigating potential legal claims).

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch Management (Chainlit), Enhanced Access Controls (Doge, Ciro), Ddos Mitigation Strategies (Uk Organizations), .

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an SafePay ransomware gang (reported), Nation-state attackers (suspected in F5 breach)Hacktivist groups (targeting critical infrastructure) and NoName057(16)SafePay gangNorth Korean HackersCoinbaseCartel.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-02-15T00:00:00Z.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-07-05.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Health data (Conduent breach), Source code (F5 breach), , Personal information of over 40,000 individuals, Personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (Social Security, driver’s license, passport numbers), and employment-related records, , Social Security data, Personal Identifiable Information (PII), Investment account details, Employee records, AI prompts and credentials and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was websitenetwork infrastructureorder processing systemssoftware licensing systems and SaaS platformsIT distribution networksHealthcare infrastructureManufacturing OT systemsAviation systems and Cloudflare serverCIRO systemsIngram Micro systemsSK Telecom systemsChainlit AI framework and and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Lynch Carpenter LLP (investigating potential legal claims).

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were system shutdown to limit spread, Ingram Micro took systems offlineSK Telecom offered free USIM replacements and took certain internal systems offline.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Source code (F5 breach), Health data (Conduent breach), Personal information of over 40,000 individuals, Employee records, Investment account details, Personal Identifiable Information (PII), AI prompts and credentials, Social Security data, Personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (Social Security, driver’s license, passport numbers) and and employment-related records.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 23.9M.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was True.

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was No (Ingram Micro).

Regulatory Compliance

What was the highest fine imposed for a regulatory violation ?

Highest Fine Imposed: The highest fine imposed for a regulatory violation was $91 million proposed (SK Telecom), .

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuits filed against Conduent, Potential class action lawsuit being reviewed, Litigation over DOGE activities at SSA, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Ransomware has evolved into a systemic risk with cascading impacts on supply chains, critical services, and industries. Initial access often relies on stolen credentials or social engineering, and supply chain vulnerabilities amplify the impact. Data theft and operational paralysis are primary damage drivers, with delayed consequences such as regulatory penalties or human harm.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance monitoring of third-party access to sensitive databases, Avoid unauthorized cloud storage for sensitive data, Patch critical vulnerabilities promptly (e.g., Chainlit), Strengthen DDoS defenses (traffic filtering, WAFs and rate-limiting).

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are TechCrunch, ISMG Editors' Panel, Cybersecurity Ventures, Ingram Micro investor relations website, Zafran Labs Disclosure, Ingram Micro public statement (2024-02-19), UK NCSC Alert, Midnight in the War Room (documentary preview), Bleeping Computer, Whistleblower Report, Cyber Incident Description, Incident disclosure and SOCRadar analysis.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was shareholders notified before U.S. market opening on 2024-02-19, UK NCSC advised organizations to strengthen DDoS defenses, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an CIRO notified affected investors; SK Telecom offered USIM replacements.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Compromised Bitbucket account (SK Telecom).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Supply chain vulnerabilitiesStolen credentialsSocial engineeringIT-OT convergence risks, Unauthorized cloud storage (DOGE)Phishing attack (CIRO)Ransomware (Ingram Micro)Unpatched vulnerabilities (Chainlit)Malicious Git repositories (North Korean hackers).

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patch management (Chainlit)Enhanced access controls (DOGE, CIRO)DDoS mitigation strategies (UK organizations).

cve

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.

Risk Information
cvss4
Base: 5.8
Severity: HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ingram-micro' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge