Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantage™, our AI-powered digital platform, we offer what we believe to be the industry’s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.

Ingram Micro A.I CyberSecurity Scoring

Ingram Micro

Company Details

Linkedin ID:

ingram-micro

Employees number:

28,560

Number of followers:

583,296

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

ingrammicro.com

IP Addresses:

Scan still pending

Company ID:

ING_5511879

Scan Status:

In-progress

AI scoreIngram Micro Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreIngram Micro Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ingram-micro.jpeg
Ingram Micro IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ingram Micro

Critical
Current Score
100
C (Critical)
01000
8 incidents
-194.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

MARCH 2026
100
FEBRUARY 2026
100
JANUARY 2026
100
Breach
21 Jan 2026 • Ingram Micro Inc.: Ingram Micro Data Breach Claims Investigated by Lynch Carpenter
Ingram Micro Data Breach Exposes PII of 42,000 Individuals

**Ingram Micro Data Breach Exposes PII of 42,000 Individuals** On January 21, 2026, Ingram Micro Inc., a global technology distributor, disclosed a cybersecurity incident that compromised the personal data of approximately 42,000 individuals. An unauthorized actor accessed the company’s network, potentially acquiring sensitive personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (such as Social Security, driver’s license, and passport numbers), and employment-related records like work evaluations. The breach is currently under investigation by Lynch Carpenter LLP, a national class action law firm, which is reviewing potential legal claims on behalf of affected individuals. Ingram Micro has not yet provided further details on the timeline of the breach or the methods used by the attacker. This incident adds to a growing list of data breaches exposing sensitive personal and professional information, raising concerns about the security of third-party vendors handling large volumes of PII. Affected individuals may face heightened risks of identity theft and fraud as a result.

100
critical Already minimum
ING1769038099
Data Breach
Data Compromised: Personally identifiable information (PII), including names, contact details, dates of birth, government-issued IDs (Social Security, driver’s license, passport numbers), and employment-related records Brand Reputation Impact: Raised concerns about the security of third-party vendors handling large volumes of PII Legal Liabilities: Potential legal claims being reviewed by Lynch Carpenter LLP Identity Theft Risk: Heightened risks of identity theft and fraud
Third Party Assistance: Lynch Carpenter LLP (investigating potential legal claims)
Type Of Data Compromised: Personally identifiable information (PII) Number Of Records Exposed: 42,000 Sensitivity Of Data: High (government-issued IDs, employment records) Personally Identifiable Information: Names, contact details, dates of birth, Social Security numbers, driver’s license numbers, passport numbers, employment-related records
Legal Actions: Potential class action lawsuit being reviewed
['Ongoing']
DECEMBER 2025
100
NOVEMBER 2025
100
OCTOBER 2025
100
SEPTEMBER 2025
100
AUGUST 2025
100
JULY 2025
284
Ransomware
07 Jul 2025 • Ingram Micro: Ingram Micro Hit by Ransomware
Ingram Micro Suffers Ransomware Attack, Disrupting Software Licensing and Operations

**Ingram Micro Suffers Ransomware Attack, Disrupting Software Licensing and Operations** Ingram Micro, a global technology and electronics distribution giant based in Irvine, California, confirmed a ransomware attack on July 5 that disrupted its network and impacted software licensing services. The incident has prevented customers from using or provisioning certain products reliant on Ingram’s systems, as reported by *TechCrunch*. The company acknowledged the attack in a July 5 statement, stating it was working to restore affected systems. An Ingram spokesperson later directed inquiries to the initial release, indicating no further updates were available at the time. The outage has had financial repercussions, with Ingram Micro’s stock closing down 7.5% at $20.20 per share on the day of the announcement, reducing its market cap to $4.7 billion. With over $54 billion in annual sales, Ingram Micro plays a critical role in the global supply chain for technology products. The attack highlights ongoing vulnerabilities in cybersecurity for major distribution and logistics firms, though the full extent of the impact on operations and customer data remains unclear.

100
critical -184
ING1770920806
ransomware
Systems Affected: software licensing services, network Operational Impact: disrupted operations, prevented customers from using or provisioning certain products
Recovery Measures: working to restore affected systems Communication Strategy: initial statement on July 5, no further updates
Ransomware
07 Jul 2025 • Ingram Micro
Ransomware Attack on Ingram Micro Causes Major Outage

Ingram Micro, a major U.S.-based technology distributor and managed services provider, suffered a **ransomware attack** starting on **Thursday**, leading to a **prolonged outage** of its website and core network systems. The disruption has **halted order processing**, causing delays in software licensing and preventing customers from accessing or provisioning critical products tied to Ingram’s infrastructure. The attack, attributed to the **SafePay ransomware gang** (though unconfirmed by the company), has forced Ingram Micro to alert shareholders ahead of market opening. While no data breach details have been publicly confirmed, ransomware groups often **exfiltrate sensitive data** before encrypting systems, raising concerns about potential **data leaks or financial extortion**. The outage has **crippled operations** for Ingram’s global clientele, including smaller businesses reliant on its IT services, risking **financial losses, reputational damage, and operational paralysis** until systems are restored. The incident underscores the severe impact of ransomware on supply chains and third-party service providers.

100
critical -184
ING1802018100325
ransomware system outage data breach (suspected)
financial extortion (presumed)
website network infrastructure order processing systems software licensing systems Start: 2024-02-15T00:00:00Z Duration: ongoing (as of 2024-02-19) halted order processing disrupted software licensing for customers prevented provisioning of products relying on Ingram’s systems Brand Reputation Impact: potential damage due to prolonged outage and ransomware association
system shutdown to limit spread restoring systems to resume order processing public disclosure to shareholders brief statements to media
Data Exfiltration: suspected (common tactic for ransomware gangs, but unconfirmed) Data Encryption: likely (ransomware attack)
['ongoing']
shareholders notified before U.S. market opening on 2024-02-19
JULY 2025
447
Ransomware
06 Jul 2025 • Ingram Micro: Ingram Micro confirms it has been hit by ransomware
Ingram Micro Ransomware Attack

**Ingram Micro Confirms Ransomware Attack Disrupting Internal Systems** Global IT product distributor Ingram Micro has confirmed a ransomware attack that disrupted its operations over the U.S. holiday weekend. The company proactively took certain internal systems offline to contain the breach and strengthen its defenses, though it has not disclosed whether any data was exfiltrated. Speculation about the incident began after Ingram Micro’s website went offline unexpectedly, raising concerns about a potential cyberattack. The company later acknowledged the ransomware intrusion in a statement on its investor relations website. While the exact threat actor behind the attack remains unconfirmed, the incident highlights the ongoing risk of ransomware targeting critical supply chain and distribution networks. No further details on the scope of the breach or potential impact on customers have been released.

100
critical -347
ING1771976571
ransomware
Systems Affected: internal systems Operational Impact: disrupted operations
Incident Response Plan Activated: proactively took certain internal systems offline Containment Measures: took certain internal systems offline Remediation Measures: strengthened defenses Communication Strategy: acknowledged the ransomware intrusion in a statement on its investor relations website
JUNE 2025
494
Breach
16 Jun 2025 • Conduent
Conduent Health Data Breach and F5 Nation-State Hack

Conduent, a New Jersey-based business process outsourcing firm, suffered the largest known health data breach of 2025, exposing sensitive healthcare records. The incident triggered multiple post-hack lawsuits and regulatory investigations, with severe reputational and financial repercussions. The breach compromised personal and medical data of countless individuals, leading to potential identity theft, fraud, and legal liabilities. The fallout includes operational disruptions, loss of client trust, and escalating compliance penalties. Given the scale of the breach—affecting healthcare data—it poses long-term risks to affected patients, including exposure of protected health information (PHI) and potential misuse by malicious actors. The company faces mounting legal costs, reputational damage, and possible contractual terminations from partners wary of further vulnerabilities. The breach underscores systemic failures in cybersecurity governance, amplifying scrutiny from regulators and stakeholders.

443
critical -51
CON5792357110725
Cybercrime Cyberwarfare / Nation-State Attacks Data Breach
Espionage (F5 source code theft) Financial gain (Conduent breach) Activism (hacktivist attacks on critical infrastructure)
Health data (Conduent breach) Source code (F5 breach) Operational Impact: Federal response delayed due to U.S. government shutdown (F5 breach) Brand Reputation Impact: Significant (Conduent facing lawsuits and investigations) Legal Liabilities: Lawsuits filed against Conduent
Law Enforcement Notified: Likely (given nation-state involvement in F5 breach)
Health data (Conduent) Source code (F5) Sensitivity Of Data: High (health data and proprietary source code) Data Exfiltration: Confirmed (F5 source code theft) Personally Identifiable Information: Likely (health data breach)
Legal Actions: Lawsuits filed against Conduent
['Ongoing (Conduent lawsuits and F5 breach response delayed by government shutdown)']
F5 source code Conduent health data
MAY 2025
491
APRIL 2025
485
MARCH 2025
483
Vulnerability
01 Mar 2025 • Chainlit, Ingram Micro, U.S. Department of Government Efficiency, Canadian Investment Regulatory Organization and SK Telecom: Breach Roundup: DOGE Uploaded Social Security Data to Cloud
Weekly Cybersecurity Breach Roundup: DOGE Data Exposure, CIRO Phishing Attack, and Rising Threats

**Weekly Cybersecurity Breach Roundup: DOGE Data Exposure, CIRO Phishing Attack, and Rising Threats** This week’s cybersecurity landscape saw multiple high-profile incidents, including unauthorized data sharing by the U.S. Department of Government Efficiency (DOGE), a massive phishing breach in Canada, and a surge in critical vulnerabilities. ### **U.S. DOGE Staff Exposed Social Security Data via Unauthorized Cloudflare Server** Federal prosecutors confirmed that staff from Elon Musk’s Department of Government Efficiency (DOGE) uploaded sensitive Social Security Administration (SSA) data to an unauthorized Cloudflare server in March 2025. The breach, first reported by a whistleblower in August, involved employees sharing data via third-party links between March 7 and 17. The SSA remains uncertain whether the data was removed from Cloudflare. The incident is part of ongoing litigation over DOGE’s activities at the SSA, which critics claim wasted $21.7 billion. Prosecutors also revealed that a DOGE employee signed an agreement with a political advocacy group seeking voter fraud evidence, potentially linking SSA data to voter rolls. Two DOGE employees were referred to the U.S. Office of Special Counsel for possible Hatch Act violations, which prohibit federal employees from partisan activities. Additionally, a DOGE team member sent an encrypted file believed to contain names and addresses of 1,000 individuals to the Department of Homeland Security and a DOGE advisor at the Department of Labor. The SSA has been unable to decrypt the file. Another DOGE employee continued accessing the "Numident" database containing Social Security card applications and death records despite a court order revoking access. ### **Canadian Investment Regulatory Organization (CIRO) Phishing Breach Affects 750,000 Investors** The Canadian Investment Regulatory Organization (CIRO) disclosed a phishing attack in August 2025 that exposed sensitive data of approximately 750,000 investors. Compromised information includes names, contact details, dates of birth, Social Insurance numbers, government-issued IDs, investment account numbers, and account statements. CIRO confirmed that login credentials, passwords, and security questions were not accessed. ### **UK NCSC Warns of Rising Russia-Aligned Hacktivist DDoS Attacks** The UK’s National Cyber Security Centre (NCSC) issued an alert about increased denial-of-service (DDoS) attacks by Russian-aligned hacktivist groups, including NoName057(16). Targets include government bodies, local authorities, and critical infrastructure operators. The NCSC advised organizations to strengthen defenses with traffic filtering, web application firewalls, and rate-limiting policies. ### **Ingram Micro Ransomware Attack Exposes 42,000 Employee Records** IT distributor Ingram Micro suffered a July 2025 ransomware attack by the SafePay gang, which stole 3.5 terabytes of data, including names, birthdates, Social Security numbers, passport details, and employment records. The breach affected 42,521 individuals. Ingram took systems offline to contain the attack, causing service disruptions before restoring operations by July 9. SafePay later published the stolen data after Ingram refused to pay the ransom. ### **CVE Disclosures Surge 21% in 2025** Vulnerability disclosures reached 48,185 in 2025 a 20.6% increase from the previous year with 3,984 critical and 15,003 high-severity flaws. December alone accounted for 5,500 CVEs, while February 26 saw a record 793 disclosures in a single day. Nearly 30% of exploited vulnerabilities were weaponized within one day of disclosure, and 25.8% lacked analysis in the National Vulnerability Database, complicating mitigation efforts. ### **SK Telecom Challenges $91 Million Data Leak Fine** South Korea’s SK Telecom is contesting a $91 million fine the largest ever imposed by the country’s privacy watchdog after a 2025 data breach exposed all 23 million of its mobile subscribers. The delayed disclosure led to a broader investigation, prompting SK Telecom to offer free USIM replacements. A ransomware group, CoinbaseCartel, later claimed responsibility, alleging it stole source code, project files, and AWS keys via a compromised Bitbucket account. ### **Critical Chainlit Vulnerabilities Expose AI Data and Cloud Infrastructure** Security researchers at Zafran Labs disclosed two critical flaws in the open-source AI framework Chainlit (CVE-2026-22218 and CVE-2026-22219). The vulnerabilities allow arbitrary file reads and server-side request forgery (SSRF), enabling attackers to access sensitive data, including AI prompts and credentials, and probe internal networks. Chainlit released patches to address the issues. ### **North Korean Hackers Abuse Microsoft VS Code for Malware Delivery** North Korean threat actors expanded their "Contagious Interview" campaign, using Microsoft Visual Studio Code to execute malware via malicious Git repositories. Victims are tricked into opening projects that automatically run attacker-controlled commands, deploying the EtherRAT macOS trojan. The group has also leveraged developer-friendly platforms like Vercel for command-and-control infrastructure.

473
critical -10
THEINGDEPCIRTIM1769124673
Data Breach Phishing Ransomware DDoS Vulnerability Exploitation
Unauthorized Cloud Storage Phishing Ransomware DDoS Malicious Git Repositories
CVE-2026-22218 CVE-2026-22219
Political Financial Gain Espionage Hacktivism
Financial Loss: $91 million (proposed fine for SK Telecom) Social Security data Personal Identifiable Information (PII) Investment account details Employee records AI prompts and credentials Cloudflare server CIRO systems Ingram Micro systems SK Telecom systems Chainlit AI framework Downtime: Ingram Micro systems taken offline (restored by July 9, 2025) Service disruptions Delayed regulatory disclosures SK Telecom CIRO Ingram Micro Hatch Act violations (DOGE) Regulatory fines (SK Telecom) High (SSN, passport details, government IDs)
Ingram Micro (systems taken offline) CIRO (disclosure) Ingram Micro took systems offline SK Telecom offered free USIM replacements Chainlit released patches for CVE-2026-22218 and CVE-2026-22219 Ingram Micro restored operations by July 9, 2025 CIRO disclosed breach in August 2025 SK Telecom contested fine
Social Security data PII Investment account details Employee records AI prompts and credentials 750,000 (CIRO) 42,521 (Ingram Micro) 23 million (SK Telecom) Sensitivity Of Data: High (SSN, passport details, government IDs, financial records) 3.5 TB (Ingram Micro) Unknown (DOGE, SK Telecom) File encrypted by DOGE employee (undecryptable) Names, birthdates, SSN, passport details, government IDs
Hatch Act (DOGE) South Korea Privacy Laws (SK Telecom) $91 million proposed (SK Telecom) Litigation over DOGE activities at SSA CIRO disclosed breach in August 2025
Strengthen DDoS defenses (traffic filtering, WAFs, rate-limiting) Patch critical vulnerabilities promptly (e.g., Chainlit) Avoid unauthorized cloud storage for sensitive data Enhance monitoring of third-party access to sensitive databases
Ongoing (DOGE, SK Telecom, CIRO)
CIRO notified affected investors; SK Telecom offered USIM replacements
UK NCSC advised organizations to strengthen DDoS defenses
Entry Point: Compromised Bitbucket account (SK Telecom) Data Sold On Dark Web: Alleged by CoinbaseCartel (SK Telecom)
Unauthorized cloud storage (DOGE) Phishing attack (CIRO) Ransomware (Ingram Micro) Unpatched vulnerabilities (Chainlit) Malicious Git repositories (North Korean hackers) Patch management (Chainlit) Enhanced access controls (DOGE, CIRO) DDoS mitigation strategies (UK organizations)
JANUARY 2025
741
Ransomware
01 Jan 2025 • Co-operative Group, Ingram Micro, Salesforce, Jaguar Land Rover, Oracle, Synnovis and DaVita: Top 10 Ransomware Attacks Over The Past Year
Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services

**Ransomware in 2025: A Systemic Threat Disrupting Global Supply Chains and Critical Services** In 2025, ransomware evolved from isolated IT disruptions into a systemic risk, threatening national supply chains, essential services, and entire industries. Cybersecurity Ventures projects the global cost of ransomware will surge to **$275 billion annually by 2031**, driven by downtime, data loss, recovery efforts, and lost productivity not just ransom payments. A recent **SOCRadar analysis** highlighted the **top 10 ransomware attacks of 2025**, each exposing vulnerabilities across sectors: 1. **Salesforce Ecosystem** – A SaaS supply chain blind spot exploited for widespread disruption. 2. **Oracle E-Business Suite** – A zero-day attack leveraging supply chain extortion. 3. **Jaguar Land Rover** – Britain’s costliest cyberattack, crippling automotive operations. 4. **Ingram Micro** – A ransomware strike paralyzing global IT distribution. 5. **Co-operative Group** – A sustained siege on the UK retail sector. 6. **PowerSchool** – Large-scale extortion targeting the education sector. 7. **Synnovis** – Healthcare disruption with **confirmed patient harm**. 8. **DaVita** – Ransomware striking critical healthcare infrastructure. 9. **Asahi Group** – Manufacturing halts exposing IT-OT convergence risks. 10. **Collins Aerospace** – Ransomware grounding European airports. **Key patterns emerged** across these incidents: - **Initial access** frequently relied on **stolen credentials or social engineering** rather than sophisticated exploits. - **Supply chain vulnerabilities** amplified impact, turning single breaches into cascading failures. - **Data theft and operational paralysis** often outweighed encryption as the primary damage driver. - **Delayed consequences** such as regulatory penalties or confirmed human harm surfaced months after the attacks. The incidents underscore ransomware’s growing role as a **strategic threat**, with far-reaching consequences beyond financial losses.

471
critical -270
THEINGSALJAGORASYNDAV1769095448
Ransomware
Stolen credentials Social engineering Supply chain vulnerabilities
Zero-day SaaS supply chain blind spots IT-OT convergence risks
Financial gain Extortion Operational disruption
Financial Loss: $275 billion annually by 2031 (projected global cost) SaaS platforms IT distribution networks Healthcare infrastructure Manufacturing OT systems Aviation systems Crippling automotive operations Paralyzing global IT distribution Healthcare disruption with confirmed patient harm Manufacturing halts Grounding of European airports
Ransomware has evolved into a systemic risk with cascading impacts on supply chains, critical services, and industries. Initial access often relies on stolen credentials or social engineering, and supply chain vulnerabilities amplify the impact. Data theft and operational paralysis are primary damage drivers, with delayed consequences such as regulatory penalties or human harm.
Stolen credentials Social engineering
Supply chain vulnerabilities Stolen credentials Social engineering IT-OT convergence risks
JUNE 2024
793
Breach
16 Jun 2024 • Ingram Micro: Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 People
Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 Individuals

**Ingram Micro Data Breach Exposes Sensitive Information of Over 40,000 Individuals** U.S.-based IT distributor Ingram Micro disclosed a data security incident from last year that compromised the personal information of more than 40,000 individuals. The breach, which occurred in 2024, exposed sensitive data, though specific details about the type of information affected and the attack vector remain undisclosed. Ingram Micro, a major provider of technology products and services, serves businesses globally, making the incident particularly notable for its potential impact on downstream partners and customers. The company has not released further technical or forensic details about the breach, including whether it resulted from a cyberattack, misconfiguration, or insider threat. The disclosure follows a pattern of high-profile breaches in recent months, including incidents at Minnesota’s Department of Human Services (affecting over 300,000 individuals) and Canada’s CIRO (impacting 750,000 investors). While the full scope of the Ingram Micro breach’s consequences is still unclear, such incidents underscore ongoing risks to supply chain security and the protection of personally identifiable information (PII).

734
critical -59
ING1769002251
Data Breach
Data Compromised: Personal information of over 40,000 individuals Identity Theft Risk: High
Type Of Data Compromised: Personal information, sensitive data Number Of Records Exposed: 40,000+ Sensitivity Of Data: High Personally Identifiable Information: Yes

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for Ingram Micro is 100, which corresponds to a Critical rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2026 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for January 2026 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 100.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 447.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 494.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 491.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 485.

Over the past 12 months, the average per-incident point impact on Ingram Micro’s A.I Rankiteo Cyber Score has been -194.0 points.

You can access Ingram Micro’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/ingram-micro.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view Ingram Micro’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/ingram-micro.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.