In early July 2025, Ingram Micro was hit by a ransomware attack that crippled its global operations.
The intrusion began when the SafePay group gained access through compromised GlobalProtect VPN credentials, moving laterally across systems before deploying payloads that encrypted core platforms including Xvantage and Impulse.
Employees found ransom notes on July 3. Within hours, Ingram Micro took its systems offline to contain the spread. Disrupting order processing and fulfillment worldwide.
SafePay claimed to have stolen 3.5 terabytes of data and later published portions of it after the company refused to pay.
By July 9, operations resumed, but the impact was extensive. More than 23 million personal and enterprise records were compromised, including contact, address, and identification data.
That information is now confirmed to be circulating on dark web leak forums and DataBreach.com.
Ingram Micro is one of the world's largest business-to-business (B2B) distributors of technology products and services. The company operates behind the scenes for tens of thousands of other organizations (including computer retailers, managed IT providers, and major hardware and software brands) supplying them with equipment, cloud services, and logistics support.
If you received a notice connected to the Ingram Micro breach but don't recall doing business with them directly, that's normal. Your personal information was likely stored by a vendor or service provider that partners with Ingram Micro. Examples include:
In short, Ingram Micro sits deep in the supply chain. That's why individuals who never interacted with the company directly can still appear in a breach involving its data systems.
A financially motivated group active since 2024.
The breach disrupted thousands of vendor and reseller channels tied to Ingram Micro's supply chain.
If you've been notified, or even suspect exposure, take these actions now:
If you believe your information may be part of this breach,or want confirmation across other datasets,