CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence May 02, 2026

Ingram Micro Up and Running After Ransomware Attack - Dark Reading

Dark Reading Archived May 02, 2026 ✓ Full text saved

Ingram Micro Up and Running After Ransomware Attack Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    Threat IntelligenceCyberattacks & Data BreachesCybersecurity OperationsIoTNewsIngram Micro Up and Running After Ransomware AttackCustomers were the first to notice the disruption on the distributor's website when they couldn't place orders online.Kristina Beek,Associate Editor,Dark ReadingJuly 10, 20251 Min ReadSource: onathan Weiss via Alamy Stock PhotoNEWS BRIEFIngram Micro confirmed it suffered a ransomware attack over the July 4 holiday weekend, and that its website is once again operational in all countries and regions where it operates."Our teams continue to perform at a swift pace to serve and support our customers and vendor partners," said the IT distributor giant. "We are grateful for the support we've received from our customers and industry colleagues."Customers were the first to find the IT distributor's websites down, unable to place any online orders.The ransomware was initially identified on certain internal systems at Ingram, so the company took some of its systems offline and implemented mitigation measures. Ingram also initiated an investigation alongside third-party experts.Ingram Micro also filed an 8-K form with the US Securities and Exchange Commission following the attack and apologized to customers and partners for the disruption.It still remains unclear which ransomware gang is responsible for the attack, though Bleeping Computer reported that the ransom note sent to Ingram Micro allegedly is from SafePay. At press time, the attacker had made no mention of Ingram Micro on its Dark Web leak site.Read more about:News BriefsAbout the AuthorKristina BeekAssociate Editor, Dark ReadingKristina Beek is an associate editor at Dark Reading, where she covers a wide range of cybersecurity topics and spearheads video-related content. She is the creator and host of the Heard It From a CISO video series, where she interviews CISOs, directors, and other industry strategists to provide insights into the ever-evolving cybersecurity landscape. In addition to her editorial work, Kristina manages Dark Reading's social media channels and contributes to the platform's video coverage.Kristina graduated from North Carolina State University in 2021 with a degree in Political Science, concentrating in law and justice, and a minor in English. During her time at NC State, she honed her writing skills by contributing opinion pieces to the university's newspaper. After graduation, she began her career as a content editor before joining Dark Reading.Currently based in Washington, DC, you can find Kristina reading, taking walks in Georgetown, and wandering the museums surrounding the National Mall.See more from Kristina BeekWant more Dark Reading stories in your Google search results?Add Us NowMore InsightsIndustry ReportsHow Enterprises Are Developing Secure ApplicationsHow Enterprises Are Harnessing Emerging Technologies in CybersecurityDitch the Data Center: Understanding Flexible Cloud Infrastructure Security Management2025 State of MalwareSysdig 2025 Cloud-Native Security and Usage ReportAccess More ResearchWebinarsHow Well Can You See What's in Your Cloud?Implementing CTEM: Beyond Vulnerability ManagementDefending Against AI-Powered Attacks: The Evolution of Adversarial Machine LearningZero Trust Architecture for Cloud environments: Implementation RoadmapTips for Managing Cloud Security in a Hybrid Environment?More WebinarsEditor's ChoiceСloud SecurityNavigating the Unique Security Risks of Asia's Digital Supply ChainNavigating the Unique Security Risks of Asia's Digital Supply ChainbyAlexander CulafiApr 15, 20263 Min ReadWant more Dark Reading stories in your Google search results?Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.SubscribeWebinarsHow Well Can You See What's in Your Cloud?Thurs, June 4, 2026 at 1:00pm ESTImplementing CTEM: Beyond Vulnerability ManagementThurs, May 21, 2026 at 1pm ESTDefending Against AI-Powered Attacks: The Evolution of Adversarial Machine LearningMon, May 11, 2026 at 1:00pm ETZero Trust Architecture for Cloud environments: Implementation RoadmapTues, May 12, 2026 at 1pm ESTTips for Managing Cloud Security in a Hybrid Environment?Thurs, May 7, 2026 at 1pm ESTMore WebinarsBlack Hat Asia | Marina Bay Sands, SingaporeExperience cutting-edge cybersecurity insights in this four-day event. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass.GET YOUR PASS
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    May 02, 2026
    Archived
    May 02, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗