general🌍AmericasThe Record
Sedgwick Government Solutions Confirms Ransomware Attack
Friday, January 2, 2026
What
The TridentLocker ransomware gang claimed an attack on Sedgwick Government Solutions, stealing 3.4 gigabytes of data from an isolated file transfer system. This incident is significant due to SGS's role in providing claims and risk management services to numerous U.S. federal agencies.
Where
Sedgwick Government Solutions, affecting services to U.S. federal agencies (DHS, CISA, etc.), municipal agencies in all 50 states, Smithsonian, and Port Authority of NY/NJ.
When
Disclosed around New Year's Eve, 2023.
Key Factors
- •The TridentLocker ransomware gang, a new group emerging in November, claimed responsibility for the attack and data exfiltration.
- •Sedgwick confirmed the incident was contained to an isolated file transfer system within its government subsidiary, with no impact on wider Sedgwick systems or claims management servers.
- •The compromised subsidiary provides critical claims and risk management services to various U.S. federal and municipal agencies, highlighting supply chain risk.
Takeaways
- →Organizations, especially government contractors, must implement robust network segmentation and incident response plans to contain and mitigate ransomware attacks.
- →Federal agencies should review their third-party risk management protocols for contractors handling sensitive data or critical services.
Read Full Article
Opens original article on The Record