Global claims management firm Sedgwick has been hit by a ransomware attack attributed to the TridentLocker group. This incident exemplifies the modern double-extortion strategy, where attackers prioritize data theft before the final encryption stage. The threat actors claim to have exfiltrated sensitive data specifically from systems related to Sedgwick's government services division, a tactic calculated to increase leverage by threatening the public release of regulated data. The attack on Sedgwick highlights the significant risk faced by service providers who are custodians of valuable third-party information, making them prime targets for sophisticated ransomware operations focused on data exfiltration as a primary objective.
The TridentLocker ransomware group has targeted Sedgwick, a major player in the claims management industry. The choice of victim is strategic; organizations like Sedgwick process and store vast quantities of sensitive information, including personally identifiable information (PII), financial data, and protected health information (PHI) on behalf of their clients, which in this case includes government entities. This makes the stolen data highly valuable for extortion.
The attack methodology is described as "breach-then-encrypt." This is a multi-stage process:
This double-extortion tactic ensures that even if the victim has viable backups, they are still under immense pressure to pay the ransom to prevent the public leak of stolen data.
While specific TTPs for this incident have not been released, attacks of this nature typically involve a series of common steps.
T1190 - Exploit Public-Facing Application: A likely vector for initial access into a large enterprise.T1078 - Valid Accounts: Use of stolen credentials to gain initial or expanded access.T1048 - Exfiltration Over Alternative Protocol: Data is often exfiltrated using common protocols like FTP, or to cloud storage services to blend in with normal traffic.T1567 - Exfiltration Over Web Service: Uploading stolen data to legitimate cloud storage providers.T1486 - Data Encrypted for Impact: The final stage of the attack, where ransomware is deployed to encrypt files across the network.T1657 - Financial Theft: The ultimate goal of the ransomware operation is financial gain through extortion.The impact on Sedgwick and its clients could be substantial. The encryption of systems supporting government services can cause major operational disruptions, preventing the processing of claims and other essential functions. The exfiltration of sensitive government-related data triggers significant regulatory and contractual obligations, including data breach notifications under laws like HIPAA or state-level regulations. The reputational damage from such a breach can be long-lasting, eroding client trust. The cost of incident response, system restoration, potential ransom payment, regulatory fines, and legal fees can be financially crippling.
Early detection is key to thwarting a double-extortion attack before the encryption phase.
D3-NTA: Network Traffic Analysis to baseline normal network traffic and alert on deviations. Use D3-UBA: User Behavior Analysis to spot accounts being used for reconnaissance or data staging.D3-BR: Backup and Recovery.M1030 - Network Segmentation.Sedgwick confirms TridentLocker ransomware attack on its Government Solutions subsidiary, affecting an isolated file transfer system.
Properly segmenting the network can contain a ransomware outbreak and prevent attackers from moving from less sensitive systems to critical data stores.
Mapped D3FEND Techniques:
Using EDR tools with behavioral analysis can detect and block ransomware activities like rapid file encryption or deletion of volume shadow copies.
Mapped D3FEND Techniques:
Filtering outbound web traffic can block data exfiltration attempts to attacker-controlled cloud storage or C2 servers.
Mapped D3FEND Techniques:
To counter the 'breach-then-encrypt' model used by TridentLocker, organizations must focus on detecting and blocking the data exfiltration phase. Implement strict outbound traffic filtering on perimeter firewalls. By default, deny all outbound traffic from servers except for what is explicitly required for business operations. For allowed traffic, such as to cloud services, use application-aware firewall rules to only permit access to your organization's specific tenants. Deploy network monitoring or DLP solutions to inspect outbound traffic for large, anomalous data flows, especially from servers housing sensitive data like those in Sedgwick's government services unit. Alert on any sustained, high-volume transfers to unknown IP addresses or consumer-grade cloud storage services. This can provide the critical early warning needed to interrupt the attack before encryption begins.
Deploy deception technology to detect the lateral movement and reconnaissance that precedes data exfiltration and encryption. Create decoy systems, or honeypots, that mimic critical assets like file servers, databases, and domain controllers. Populate these decoys with fake data and credentials (honeytokens). Since no legitimate user should ever interact with these systems, any access attempt is a high-fidelity indicator of an intruder. When an attacker, such as a member of the TridentLocker group, begins exploring the network, they are likely to interact with a decoy. This triggers an immediate alert, giving the security team early notification of the breach and allowing them to respond before widespread damage occurs. This is especially effective at catching the 'silent dwell time' phase of the attack.
A flat network is a ransomware operator's playground. To limit the blast radius of an attack like the one on Sedgwick, implement a robust network segmentation strategy. Isolate critical systems, such as the servers supporting government services, into their own secure network zones. Use firewalls or access control lists (ACLs) to strictly control traffic between segments, following the principle of least privilege. For example, user workstations should not be able to directly communicate with database servers. This containment strategy ensures that even if an attacker compromises an initial endpoint, their ability to move laterally across the network to reach high-value targets is severely restricted. This can prevent a minor intrusion from escalating into a major enterprise-wide ransomware event.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats