Company Details
ingram-micro
28,653
565,711
5415
http://www.ingrammicro.com
0
ING_5511879
In-progress

Ingram Micro Company CyberSecurity Posture
http://www.ingrammicro.comIngram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantage™, our AI-powered digital platform, we offer what we believe to be the industry’s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.
Company Details
ingram-micro
28,653
565,711
5415
http://www.ingrammicro.com
0
ING_5511879
In-progress
Between 0 and 549

Ingram Micro Global Score (TPRM)XXXX

Description: The cybercriminals claiming responsibility for Ingram Micro's ransomware attack put a deadline on leaking its data nearly a month after the raid. The SafePay ransomware group posted Ingram Micro to its leak blog on July 29, saying it intends to release 3.5 TB of company data on August 1. In typical double extortion ransomware scenarios, attackers post information about the victim to a leak blog as a pressure tactic. The idea is to heighten publicity about the attack, encouraging the victim to pay the attacker's extortion demands. Ingram Micro confirms ransomware behind multi-day outage.
Description: Ingram Micro, a major U.S.-based technology distributor and managed services provider, suffered a **ransomware attack** starting on **Thursday**, leading to a **prolonged outage** of its website and core network systems. The disruption has **halted order processing**, causing delays in software licensing and preventing customers from accessing or provisioning critical products tied to Ingram’s infrastructure. The attack, attributed to the **SafePay ransomware gang** (though unconfirmed by the company), has forced Ingram Micro to alert shareholders ahead of market opening. While no data breach details have been publicly confirmed, ransomware groups often **exfiltrate sensitive data** before encrypting systems, raising concerns about potential **data leaks or financial extortion**. The outage has **crippled operations** for Ingram’s global clientele, including smaller businesses reliant on its IT services, risking **financial losses, reputational damage, and operational paralysis** until systems are restored. The incident underscores the severe impact of ransomware on supply chains and third-party service providers.
Description: Ingram Micro Holding Corporation experienced a significant cybersecurity incident where a ransomware attack disrupted its global operations. The attack, identified on July 5, 2025, affected critical internal systems including order processing, inventory management, and customer relationship functions. The malware encrypted files and employed sophisticated evasion techniques, impacting millions of downstream customers. Ingram Micro responded swiftly, taking affected systems offline and implementing containment protocols to prevent further data encryption. The recovery process included system reimaging and enhanced monitoring solutions to mitigate future risks.


Ingram Micro has 455.56% more incidents than the average of same-industry companies with at least one recorded incident.
Ingram Micro has 368.75% more incidents than the average of all companies with at least one recorded incident.
Ingram Micro reported 3 incidents this year: 0 cyber attacks, 3 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Ingram Micro cyber incidents detection timeline including parent company and subsidiaries

Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a highly diversified base of business-to-business technology experts. Through Ingram Micro Xvantage™, our AI-powered digital platform, we offer what we believe to be the industry’s first comprehensive business-to-consumer-like experience, integrating hardware and cloud subscriptions, personalized recommendations, instant pricing, order tracking, and billing automation. We also provide a broad range of technology services, including financing, specialized marketing, and lifecycle management, as well as technical pre- and post-sales professional support. Learn more at www.ingrammicro.com.


ITC Infotech is a global technology solution and services leader providing business-friendly solutions, that enable future-readiness for clients. We seamlessly bring together digital expertise, strong industry-specific alliances, and deep domain expertise from ITC Group businesses. Our solutions and

We are one of the world's leading consultancies in technological services for companies and the public sector. With headquarters in Spain and presence in more than 100 countries, we combine experience in AI, data, cloud and cybersecurity to help companies and organizations generate a positive impact

SoftwareOne is a leading global software and cloud solutions provider that is redefining how companies build, buy and manage everything in the cloud. By helping clients to migrate and modernize their workloads and applications – and in parallel, to navigate and optimize the resulting software and cl

With its headquarters in Munich, Germany, Allianz Technology is Allianz's global IT service provider and delivers IT solutions that drive the group's digitalization. With more than 13,000 employees in more than 20 countries around the world, Allianz Technology is tasked to run, optimize, transform,

NCS, a subsidiary of Singtel Group, is a leading technology services firm with presence in Asia Pacific and partners with governments and enterprises to advance communities through technology. Combining the experience and expertise of its 13,000-strong team across 57 specialisations, NCS provides di
As No. 1, we inspire people in the connected world. With the latest technologies and innovations, together we have the opportunity to shape the future. To do this, we are and act trustworthy, committed and curious. Are you with us? Join us on this exciting journey and work with us or in one of the

Almaviva is synonymous with digital innovation. Proven experience, unique skills, ongoing research and in-depth knowledge of a range of public and private market sectors are what make it the leading Italian Group in Information & Communications Technology. Almaviva leads the Country growth and take
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic
We automate, digitize and transform the way people bank and shop. We offer proven expertise and comprehensive portfolios in cutting-edge product technology, multi-vendor software and service excellence for financial and retail customers. Consumer behavior is changing rapidly; people are empowered a
.png)
“Right now, we sit in the middle of a $5 trillion global ecosystem,” said Ingram Micro CEO Paul Bay from the stage at its One conference. “...
Ingram Micro CEO Paul Bay talked about the state of the channel and the ransomware attack that hit the distributor earlier this year during...
Digital AV Magazine, portal especializado en información sobre tecnologías y tendencias en audio y video en entornos profesionales.
Ingram Micro CEO Paul Bay shared that the Xvantage platform helped the distributor overcome its ransomware attack more quickly.
Distributor Ingram Micro has added US-based cybersecurity company AlgoSec to its line-up of suppliers. Through the collaboration, Ingram...
Ingram Micro has added cybersecurity outfit AlgoSec to its vendor line-up, strengthening partner solutions to secure hybrid cloud networks...
Ingram Micro partners with AlgoSec to enhance cybersecurity for hybrid and multi-cloud environments in Australia and New Zealand,...
Last month's ransomware attack on Ingram Micro, a multibillion-dollar global technology distributor, was a reminder of not only the...
If you were affected by the Ingram Micro data breach, you may be entitled to compensation.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ingram Micro is http://www.ingrammicro.com.
According to Rankiteo, Ingram Micro’s AI-generated cybersecurity score is 440, reflecting their Critical security posture.
According to Rankiteo, Ingram Micro currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ingram Micro is not certified under SOC 2 Type 1.
According to Rankiteo, Ingram Micro does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ingram Micro is not listed as GDPR compliant.
According to Rankiteo, Ingram Micro does not currently maintain PCI DSS compliance.
According to Rankiteo, Ingram Micro is not compliant with HIPAA regulations.
According to Rankiteo,Ingram Micro is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ingram Micro operates primarily in the IT Services and IT Consulting industry.
Ingram Micro employs approximately 28,653 people worldwide.
Ingram Micro presently has no subsidiaries across any sectors.
Ingram Micro’s official LinkedIn profile has approximately 565,711 followers.
Ingram Micro is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Ingram Micro has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ingram-micro.
Yes, Ingram Micro maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ingram-micro.
As of November 30, 2025, Rankiteo reports that Ingram Micro has experienced 3 cybersecurity incidents.
Ingram Micro has an estimated 36,626 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with taking affected systems offline, containment measures with preventing lateral movement, and remediation measures with comprehensive system reimaging, remediation measures with backup restoration, and recovery measures with implementation of enhanced monitoring solutions, and enhanced monitoring with implementation of enhanced monitoring solutions, and containment measures with ingram micro previously said it had contained the incident, and remediation measures with restored global business operations, remediation measures with restored some of its lesser-used websites, and communication strategy with ingram micro's public information page update, communication strategy with complaints about communications, and and containment measures with system shutdown to limit spread, and remediation measures with restoring systems to resume order processing, and communication strategy with public disclosure to shareholders, communication strategy with brief statements to media..
Title: Ransomware Attack on Ingram Micro Holding Corporation
Description: Ingram Micro Holding Corporation suffered a significant ransomware attack that disrupted its global operations and affected millions of downstream customers. The attack targeted critical internal systems, and the company took immediate containment measures to prevent further data encryption.
Date Detected: 2025-07-05
Type: Ransomware
Attack Vector: Undisclosed attack vectorsDLL side-loading techniquesProcess hollowing techniques
Motivation: Financial gain
Title: Ingram Micro Ransomware Attack
Description: Cybercriminals claiming responsibility for Ingram Micro's ransomware attack put a deadline on leaking its data nearly a month after the raid.
Date Publicly Disclosed: 2023-07-29
Type: Ransomware
Threat Actor: SafePay ransomware group
Motivation: Extortion
Title: Ransomware Attack on Ingram Micro Causes Major Outage
Description: Ingram Micro, a U.S. technology distributing giant and managed services provider, experienced a ransomware attack that caused an ongoing outage. The attack began on Thursday, leading to the shutdown of the company’s website and much of its network. The outage is affecting software licensing, preventing customers from using or provisioning some products that rely on Ingram’s systems. The SafePay ransomware gang is reportedly responsible, though no major group has officially taken credit. Ingram Micro is working to restore systems to resume order processing.
Date Detected: 2024-02-15T00:00:00Z
Date Publicly Disclosed: 2024-02-19T00:00:00Z
Type: ransomware
Threat Actor: SafePay ransomware gang (reported)
Motivation: financial extortion (presumed)
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: Order processingInventory managementCustomer relationship functions
Downtime: ['Four days']
Operational Impact: Global operations disruption

Data Compromised: 3.5 tb of company data
Operational Impact: Global business operations disruptedWebsites offline
Customer Complaints: ["Complaints about the company's communications"]
Brand Reputation Impact: Publicity about the attack

Systems Affected: websitenetwork infrastructureorder processing systemssoftware licensing systems
Downtime: {'start': '2024-02-15T00:00:00Z', 'end': None, 'duration': 'ongoing (as of 2024-02-19)'}
Operational Impact: halted order processingdisrupted software licensing for customersprevented provisioning of products relying on Ingram’s systems
Brand Reputation Impact: potential damage due to prolonged outage and ransomware association

Entity Name: Ingram Micro Holding Corporation
Entity Type: Technology distribution company
Industry: Technology
Location: Global
Customers Affected: Millions of downstream customers

Entity Name: Ingram Micro
Entity Type: Company
Industry: Technology
Location: Global

Entity Name: Ingram Micro
Entity Type: technology distributor, managed services provider
Industry: technology distribution and IT services
Location: California, United States
Size: large (global operations)
Customers Affected: corporate customers (especially smaller businesses relying on Ingram’s cloud/IT services)

Containment Measures: Taking affected systems offlinePreventing lateral movement
Remediation Measures: Comprehensive system reimagingBackup restoration
Recovery Measures: Implementation of enhanced monitoring solutions
Enhanced Monitoring: Implementation of enhanced monitoring solutions

Containment Measures: Ingram Micro previously said it had contained the incident
Remediation Measures: Restored global business operationsRestored some of its lesser-used websites
Communication Strategy: Ingram Micro's public information page updateComplaints about communications

Incident Response Plan Activated: True
Containment Measures: system shutdown to limit spread
Remediation Measures: restoring systems to resume order processing
Communication Strategy: public disclosure to shareholdersbrief statements to media

Data Encryption: ['Files encryption across certain internal systems']

Data Exfiltration: 3.5 TB of company data

Data Exfiltration: suspected (common tactic for ransomware gangs, but unconfirmed)
Data Encryption: likely (ransomware attack)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Comprehensive system reimaging, Backup restoration, , Restored global business operations, Restored some of its lesser-used websites, , restoring systems to resume order processing, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by taking affected systems offline, preventing lateral movement, , ingram micro previously said it had contained the incident, , system shutdown to limit spread and .

Data Encryption: ['Files encryption across certain internal systems']

Ransom Paid: Did not pay up
Ransomware Strain: SafePay
Data Exfiltration: ['3.5 TB of company data']

Ransomware Strain: SafePay (reported)
Data Encryption: True
Data Exfiltration: suspected
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Implementation of enhanced monitoring solutions, .

Source: The Register

Source: Bleeping Computer

Source: Ingram Micro public statement (2024-02-19)
Date Accessed: 2024-02-19
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: Bleeping Computer, and Source: Ingram Micro public statement (2024-02-19)Date Accessed: 2024-02-19.

Investigation Status: ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Ingram Micro'S Public Information Page Update, Complaints About Communications, Public Disclosure To Shareholders and Brief Statements To Media.

Stakeholder Advisories: Shareholders Notified Before U.S. Market Opening On 2024-02-19.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Shareholders Notified Before U.S. Market Opening On 2024-02-19.

High Value Targets: Order Processing, Inventory Management, Customer Relationship Functions,
Data Sold on Dark Web: Order Processing, Inventory Management, Customer Relationship Functions,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Implementation Of Enhanced Monitoring Solutions, .
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident were an SafePay ransomware group and SafePay ransomware gang (reported).
Most Recent Incident Detected: The most recent incident detected was on 2025-07-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-19T00:00:00Z.
Most Significant Data Compromised: The most significant data compromised in an incident were 3.5 TB of company data and .
Most Significant System Affected: The most significant system affected in an incident was Order processingInventory managementCustomer relationship functions and websitenetwork infrastructureorder processing systemssoftware licensing systems.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Taking affected systems offlinePreventing lateral movement, Ingram Micro previously said it had contained the incident and system shutdown to limit spread.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was 3.5 TB of company data.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was ['Did not pay up'].
Most Recent Source: The most recent source of information about an incident are The Register, Bleeping Computer and Ingram Micro public statement (2024-02-19).
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was shareholders notified before U.S. market opening on 2024-02-19, .
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.