Global claims management firm Sedgwick has been hit by a ransomware attack attributed to the TridentLocker group. This incident exemplifies the modern double-extortion strategy, where attackers prioritize data theft before the final encryption stage. The threat actors claim to have exfiltrated sensitive data specifically from systems related to Sedgwick's government services division, a tactic calculated to increase leverage by threatening the public release of regulated data. The attack on Sedgwick highlights the significant risk faced by service providers who are custodians of valuable third-party information, making them prime targets for sophisticated ransomware operations focused on data exfiltration as a primary objective.
The TridentLocker ransomware group has targeted Sedgwick, a major player in the claims management industry. The choice of victim is strategic; organizations like Sedgwick process and store vast quantities of sensitive information, including personally identifiable information (PII), financial data, and protected health information (PHI) on behalf of their clients, which in this case includes government entities. This makes the stolen data highly valuable for extortion.
The attack methodology is described as "breach-then-encrypt." This is a multi-stage process:
This double-extortion tactic ensures that even if the victim has viable backups, they are still under immense pressure to pay the ransom to prevent the public leak of stolen data.
While specific TTPs for this incident have not been released, attacks of this nature typically involve a series of common steps.
T1190 - Exploit Public-Facing Application: A likely vector for initial access into a large enterprise.T1078 - Valid Accounts: Use of stolen credentials to gain initial or expanded access.T1048 - Exfiltration Over Alternative Protocol: Data is often exfiltrated using common protocols like FTP, or to cloud storage services to blend in with normal traffic.T1567 - Exfiltration Over Web Service: Uploading stolen data to legitimate cloud storage providers.T1486 - Data Encrypted for Impact: The final stage of the attack, where ransomware is deployed to encrypt files across the network.T1657 - Financial Theft: The ultimate goal of the ransomware operation is financial gain through extortion.The impact on Sedgwick and its clients could be substantial. The encryption of systems supporting government services can cause major operational disruptions, preventing the processing of claims and other essential functions. The exfiltration of sensitive government-related data triggers significant regulatory and contractual obligations, including data breach notifications under laws like HIPAA or state-level regulations. The reputational damage from such a breach can be long-lasting, eroding client trust. The cost of incident response, system restoration, potential ransom payment, regulatory fines, and legal fees can be financially crippling.
Early detection is key to thwarting a double-extortion attack before the encryption phase.
D3-NTA: Network Traffic Analysis to baseline normal network traffic and alert on deviations. Use D3-UBA: User Behavior Analysis to spot accounts being used for reconnaissance or data staging.D3-BR: Backup and Recovery.M1030 - Network Segmentation.Sedgwick confirms TridentLocker ransomware attack on its Government Solutions subsidiary, affecting an isolated file transfer system.
Sedgwick has officially confirmed the cybersecurity incident, stating that the TridentLocker ransomware attack specifically targeted its Sedgwick Government Solutions subsidiary. The breach was reportedly contained to an isolated file transfer system used for government client services. This confirmation solidifies earlier reports of data exfiltration from systems supporting government operations, emphasizing the risk to sensitive public sector data handled by third-party contractors. Sedgwick is investigating the scope and has notified law enforcement.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats