Sedgwick Cyber Incident Involving TridentLocker Ransomware

Related

CISOs to Watch in German Manufacturing

Germany’s manufacturing sector is highly diversified, spanning chemicals, pharmaceuticals,...

CISOs to Watch in German Automotive

Germany’s automotive industry is at the forefront of electrification,...

CISO Diaries: Andrew Wilder on Building Cyber Maturity at Scale

Cybersecurity leadership often looks decisive from the outside, but...

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

Share

What happened

Sedgwick cyber incident involving TridentLocker ransomware occurred when the TridentLocker ransomware gang claimed it breached Sedgwick Government Solutions on New Year’s Eve and exfiltrated approximately 3.4 GB of data from an isolated file transfer system used by the federal contractor subsidiary. Sedgwick confirmed the incident and activated its incident response protocols, engaging external cybersecurity experts and notifying law enforcement. The subsidiary supports federal agencies including DHS, ICE, CBP, USCIS, DOL, and CISA. The company states that the broader Sedgwick enterprise and core systems remain segmented and unaffected, with no evidence of access to claims management servers. 

Who is affected

Sedgwick Government Solutions’ federal clients and partners are directly affected by this security incident, raising concerns about potential exposure of sensitive operational information. Other Sedgwick units claim no impact, though the incident underscores risk for contractors serving high-security government customers. 

Why CISOs should care

Ransomware groups are increasingly targeting government contractors due to access to sensitive data and downstream impact. CISOs should prioritize segmentation between business units and ensure rapid response capabilities for third-party breaches that could affect trust and compliance. 

3 practical actions

  1. Review Segmentation Controls: Validate network and system isolation between subsidiaries and core corporate assets.

  2. Test Incident Response: Exercise breach response plans with key vendors and third parties.

  3. Enhance Vendor Oversight: Tighten security performance expectations and monitoring for contractors and MSPs.