On January 4, 2026, claims administration firm Sedgwick confirmed a ransomware attack against its subsidiary, Sedgwick Government Solutions (SGS). The incident, claimed by the new TridentLocker ransomware group, involved the exfiltration of 3.4 GB of data from a file transfer system. While Sedgwick reports that its primary corporate network and claims management servers were not affected due to network segmentation, the breach poses a significant supply chain risk. SGS is a critical federal contractor serving numerous U.S. government agencies, including the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). This attack underscores the vulnerability of government supply chains to emerging ransomware threats.
The attack was claimed on New Year's Eve by TridentLocker, a relatively new ransomware-as-a-service (RaaS) group that first appeared in late November 2025. The group employs a double-extortion model, combining data encryption with the threat of leaking stolen information. In this case, TridentLocker posted samples of stolen documents on its dark web leak site to validate its claim of exfiltrating 3.4 GB of data. The initial access vector targeted an "isolated file transfer system" within SGS, suggesting a potential vulnerability or compromised credential related to that specific environment. The targeted organization, SGS, provides claims and risk management services to a sensitive portfolio of clients, including DHS, ICE, CBP, the Department of Labor, and the Smithsonian Institution.
The attack pattern is characteristic of modern ransomware operations focusing on data exfiltration prior to encryption. The threat actor, TridentLocker, likely gained initial access through a compromised account or an exploited vulnerability on the internet-facing file transfer system.
T1078 - Valid Accounts or T1190 - Exploit Public-Facing Application targeting the file transfer system.T1560 - Archive Collected Data, where attackers compress data before exfiltration. The 3.4 GB figure suggests a staged and compressed data package.T1567.002 - Exfiltration to Cloud Storage or a similar web-based service to move the stolen data out of the network.T1486 - Data Encrypted for Impact is the primary goal of ransomware, though the report focuses on exfiltration. T1485 - Data Destruction is also a possibility if files are deleted after encryption. The public leak threat corresponds to T1657 - Financial Cryptography.The primary impact is the significant supply chain risk to the U.S. government. The exfiltrated data, although limited to 3.4 GB, could contain sensitive information related to federal contracts, claims processing, or personally identifiable information (PII) of government employees. A breach at a contractor like SGS can provide adversaries with intelligence on government operations, personnel, or security postures. Even if core claims systems were not breached, the reputational damage to Sedgwick is substantial. The incident forces SGS's high-profile government clients to assess their own exposure and the security of their third-party vendors, potentially leading to contract reviews and heightened scrutiny.
Security teams should hunt for the following activities, which are common in such attacks:
| Type | Value | Description |
|---|---|---|
log_source |
File Transfer Appliance Logs | Monitor for anomalous logins, especially from unusual geolocations or IP ranges. |
network_traffic_pattern |
Large outbound data transfer | Look for unusually large data flows from file transfer systems to unknown external destinations. |
process_name |
rclone.exe, megacmd.exe |
Common tools used by ransomware groups for data exfiltration. |
command_line_pattern |
7z.exe a -p[password] ... |
Command-line usage of archiving tools like 7-Zip to stage data for exfiltration. |
Detection:
vssadmin), and the execution of suspicious archiving or exfiltration tools.Response:
Strategic:
Tactical:
Isolating critical systems to prevent lateral movement. Sedgwick's use of segmentation was effective in limiting the blast radius of this attack.
Enforcing MFA on all internet-facing systems, especially administrative portals and file transfer systems, can prevent attacks based on compromised credentials.
Mapped D3FEND Techniques:
Ensuring public-facing applications and appliances are patched promptly to prevent exploitation of known vulnerabilities.
Mapped D3FEND Techniques:
In the context of the Sedgwick breach, Network Isolation proved to be a critical and effective control. Organizations should emulate this by implementing strict network segmentation between different business units and between corporate IT and specialized, internet-facing systems like file transfer portals. For SGS, this meant the compromise of their 'isolated file transfer system' did not cascade into the core claims management servers or the broader Sedgwick corporate network. A practical implementation involves using firewalls and VLANs to create distinct security zones. Default-deny rules should be enforced, allowing only explicitly permitted traffic between zones. For a file transfer system, this means it should only be able to communicate with necessary internal storage and specific, authorized external IP ranges, while being completely isolated from sensitive internal networks like HR, finance, or domain controllers. Regular network architecture reviews and penetration tests are essential to validate that segmentation controls remain effective and have not been weakened by misconfigurations.
To prevent data exfiltration as seen in the TridentLocker attack, organizations must implement robust Outbound Traffic Filtering. This goes beyond simple port blocking. For the compromised file transfer system, egress traffic should be restricted at the network perimeter to only allow connections to known, trusted destinations on specific ports and protocols. For example, if the system is only meant to exchange files with specific government agencies, firewall rules should enforce this. Furthermore, deep packet inspection (DPI) and proxy servers can be used to block connections to known malicious domains, anonymizing services, and consumer-grade cloud storage providers that are commonly abused for exfiltration. Implementing alerts for high-volume data transfers to new or uncategorized domains can provide early warning of an attack in progress, enabling security teams to intervene before 3.4 GB of data leaves the network.
The initial vector was an 'isolated file transfer system,' which points to a likely failure in application hardening. To defend against this, organizations must secure such public-facing applications by following vendor hardening guides, disabling unnecessary features, and changing default credentials. Specifically for a file transfer system, this includes enforcing strong password policies and account lockout rules, implementing MFA for all administrative and user accounts, restricting file types that can be uploaded, and running the application with the least possible service account privileges. Regular vulnerability scanning and penetration testing of these high-risk applications are crucial to identify and remediate weaknesses before they are exploited by groups like TridentLocker. Had stronger authentication and configuration controls been in place, the attackers may have been prevented from gaining their initial foothold.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats