Preloader Image

Ingram Micro is gradually getting back on its feet after a recent cyber attack severely disrupted systems.

In an update, the company said that it’s been recovering systems and implementing new security protocols and processes in the wake of the incident.

The firm revealed it can now receive and process orders once again in most regions of the world, although in some countries there are still limitations when it comes to hardware and other technology orders.

“Ingram Micro is pleased to report that we are now operational across all countries and regions where we transact business. Our teams continue to perform at a swift pace to serve and support our customers and vendor partners,” the company said in a statement.

“Our teams are now able to process and ship orders received via EDI, or electronically, as well as by phone or email across all of our business regions.”

The latest regions to get back to normal are Austria, Canada, Singapore, and the Nordics, as well as the countries supported by its Miami Export business.

The company was already able to process orders for customers in Brazil, China, France, Germany, India, Italy, Portugal, Spain and the UK, albeit with limitations on hardware purchases.

As for subscription orders, the company said customers should contact Unified Support.

Since the attack, the company has been taking some systems offline and implementing other mitigation measures.

“Based on these measures and the assistance of third-party cybersecurity experts, we believe the unauthorized access to our systems in connection with the incident is contained and the affected systems remediated,” it said.

“Our investigation into the scope of the incident and affected data is ongoing.”

What happened with the Ingram Micro cyber attack?

Ingram Micro first revealed it had been hit by a cyber incident last week, with responsibility for the attack claimed by the SafePay ransomware group.

SafePay is believed to have breached the IT distributor via its GlobalProtect virtual private network (VPN) platform, according to reports.

The ransomware group is an up-and-coming outfit that’s been making waves in the industry for some time now. SafePay employs a ‘double extortion’ model, encrypting systems while exfiltrating sensitive data.

This technique is used largely to increase the attacker’s leverage through the threat of public exposure and operational disruption.

Research from Halcyon found that SafePay has been using a modified version of LockBit’s late-2022 code.

It uses a wide range of tactics, techniques, and procedures, including exploiting known vulnerabilities in widely used enterprise software to gain initial access. It then exploits legitimate remote management tools for persistence combined with credential-harvesting tools such as Mimikatz.

Halcyon’s investigation into SafePay noted that, despite its newcomer status in the ransomware scene, the group “demonstrates a surprising level of technical maturity and operational discipline”.

This, the company added, suggests it “may be run by experienced threat actors”.

Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.

MORE FROM ITPRO

TOPICS