US Federal Contractor Sedgwick Confirms Cyberattack

The digital supply chain for government services has once again proven a prime target for cybercriminals, with this latest incident underscoring vulnerabilities inherent in third-party contractor relationships. Claims administration giant Sedgwick has officially confirmed that its federal contracting arm, Sedgwick Government Solutions, is managing a cybersecurity incident. This confirmation follows a New Year’s Eve announcement from the TridentLocker ransomware gang, which publicly claimed responsibility for the attack and asserted it had exfiltrated 3.4 gigabytes of data. The targeted subsidiary is a critical partner for the U.S. government, providing claims and risk management services to some of the nation’s most sensitive agencies, including the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). Other high-profile clients include Immigration and Customs Enforcement (ICE) and the Department of Labor.

The Company’s Official Response and Containment Measures

In response, Sedgwick immediately initiated its established incident response protocols to mitigate damage and secure its digital environment. The company engaged external cybersecurity specialists to conduct a thorough investigation and notified law enforcement agencies. A crucial detail released by the firm is that the security compromise was strictly confined to an “isolated file transfer system.” This containment was possible because the network of Sedgwick Government Solutions is segmented from the broader corporate network of its parent company. This architectural separation proved effective in preventing the attackers from moving laterally to compromise other Sedgwick systems. The company also stated its investigation found no evidence that threat actors gained access to its core claims management servers. Consequently, the incident has not disrupted its operational capabilities, and the firm continues to serve its government clients without interruption.

A Broader Trend of Targeting Government Contractors

The attack on Sedgwick Government Solutions was not an isolated event but an illustration of a dangerous trend where cybercriminals increasingly target federal contractors. These vendors are often perceived as a softer entry point into the more fortified networks of U.S. government agencies, making them high-value targets. The group behind this breach, TridentLocker, represented a new player in the ransomware landscape. The gang first surfaced in November, quickly seeking to make a name for itself with high-profile attacks. Before targeting the U.S. contractor, TridentLocker had also claimed responsibility for a cyberattack on the Belgian postal service, signaling its international reach. This incident underscored the critical importance of supply chain security and the need for rigorous cybersecurity vetting for all government contractors. It served as a potent reminder that even with network segmentation, specialized systems remained vulnerable entry points.

Advertisement

You Might Also Like

Advertisement
shape

Get our content freshly delivered to your inbox. Subscribe now ->

Receive the latest, most important information on cybersecurity.
shape shape