TridentLocker Ransomware Hits Sedgwick's Federal Contracting Arm

Sedgwick Confirms Ransomware Attack on Government Solutions Subsidiary by TridentLocker

HIGH
January 5, 2026
6m read
RansomwareData BreachSupply Chain Attack

Related Entities

Threat Actors

TridentLocker

Other

Sedgwick Government SolutionsSedgwick

Full Report

Executive Summary

On January 4, 2026, claims administration firm Sedgwick confirmed a ransomware attack against its subsidiary, Sedgwick Government Solutions (SGS). The incident, claimed by the new TridentLocker ransomware group, involved the exfiltration of 3.4 GB of data from a file transfer system. While Sedgwick reports that its primary corporate network and claims management servers were not affected due to network segmentation, the breach poses a significant supply chain risk. SGS is a critical federal contractor serving numerous U.S. government agencies, including the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA). This attack underscores the vulnerability of government supply chains to emerging ransomware threats.

Threat Overview

The attack was claimed on New Year's Eve by TridentLocker, a relatively new ransomware-as-a-service (RaaS) group that first appeared in late November 2025. The group employs a double-extortion model, combining data encryption with the threat of leaking stolen information. In this case, TridentLocker posted samples of stolen documents on its dark web leak site to validate its claim of exfiltrating 3.4 GB of data. The initial access vector targeted an "isolated file transfer system" within SGS, suggesting a potential vulnerability or compromised credential related to that specific environment. The targeted organization, SGS, provides claims and risk management services to a sensitive portfolio of clients, including DHS, ICE, CBP, the Department of Labor, and the Smithsonian Institution.

Technical Analysis

The attack pattern is characteristic of modern ransomware operations focusing on data exfiltration prior to encryption. The threat actor, TridentLocker, likely gained initial access through a compromised account or an exploited vulnerability on the internet-facing file transfer system.

MITRE ATT&CK Techniques

Impact Assessment

The primary impact is the significant supply chain risk to the U.S. government. The exfiltrated data, although limited to 3.4 GB, could contain sensitive information related to federal contracts, claims processing, or personally identifiable information (PII) of government employees. A breach at a contractor like SGS can provide adversaries with intelligence on government operations, personnel, or security postures. Even if core claims systems were not breached, the reputational damage to Sedgwick is substantial. The incident forces SGS's high-profile government clients to assess their own exposure and the security of their third-party vendors, potentially leading to contract reviews and heightened scrutiny.

Cyber Observables for Detection

Security teams should hunt for the following activities, which are common in such attacks:

Type Value Description
log_source File Transfer Appliance Logs Monitor for anomalous logins, especially from unusual geolocations or IP ranges.
network_traffic_pattern Large outbound data transfer Look for unusually large data flows from file transfer systems to unknown external destinations.
process_name rclone.exe, megacmd.exe Common tools used by ransomware groups for data exfiltration.
command_line_pattern 7z.exe a -p[password] ... Command-line usage of archiving tools like 7-Zip to stage data for exfiltration.

Detection & Response

Detection:

  1. Network Traffic Analysis: Implement solutions (D3-NTA) to monitor for large, unexpected outbound data transfers, especially from systems like file servers or transfer appliances that hold sensitive data. Set alerts for transfers exceeding a baseline threshold.
  2. Log Monitoring: Aggregate and analyze logs from file transfer systems. Look for patterns of enumeration, multiple failed logins followed by a success, or access from non-standard IP addresses.
  3. Endpoint Detection and Response (EDR): Deploy EDR agents on servers, including file transfer systems, to detect ransomware behaviors such as rapid file modification, shadow copy deletion (vssadmin), and the execution of suspicious archiving or exfiltration tools.

Response:

  • Isolate the compromised system from the network immediately to prevent lateral movement, as Sedgwick did.
  • Activate the incident response plan, including engaging third-party forensic experts.
  • Preserve logs and system images for investigation.
  • Review access logs for the compromised system to identify the full scope of data accessed.

Mitigation

Strategic:

  • Third-Party Risk Management: Continuously assess the security posture of all critical third-party vendors and supply chain partners.
  • Network Segmentation: Implement and maintain robust network segmentation (D3-NI) to isolate critical systems and prevent a breach in one area from spreading. Sedgwick's segmentation was a key mitigating factor.
  • Data Encryption: Encrypt sensitive data at rest and in transit to reduce the impact of an exfiltration event.

Tactical:

  • Harden Public-Facing Systems: Secure all internet-facing systems, including file transfer appliances, by applying patches promptly, disabling unnecessary services, and using strong, unique credentials.
  • Multi-Factor Authentication (MFA): Enforce MFA (D3-MFA) on all external access points, including VPNs and file transfer portals.
  • Immutable Backups: Maintain offline and immutable backups of critical data to ensure recovery without paying a ransom.

Timeline of Events

1
November 30, 2025
TridentLocker ransomware group first emerges.
2
December 31, 2025
TridentLocker claims the attack on Sedgwick Government Solutions on its dark web leak site.
3
January 4, 2026
Sedgwick publicly acknowledges the cybersecurity incident.
4
January 5, 2026
This article was published

MITRE ATT&CK Mitigations

Isolating critical systems to prevent lateral movement. Sedgwick's use of segmentation was effective in limiting the blast radius of this attack.

Mapped D3FEND Techniques:

Enforcing MFA on all internet-facing systems, especially administrative portals and file transfer systems, can prevent attacks based on compromised credentials.

Mapped D3FEND Techniques:

Ensuring public-facing applications and appliances are patched promptly to prevent exploitation of known vulnerabilities.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Implementing comprehensive logging and monitoring to detect anomalous access patterns and data movements.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

In the context of the Sedgwick breach, Network Isolation proved to be a critical and effective control. Organizations should emulate this by implementing strict network segmentation between different business units and between corporate IT and specialized, internet-facing systems like file transfer portals. For SGS, this meant the compromise of their 'isolated file transfer system' did not cascade into the core claims management servers or the broader Sedgwick corporate network. A practical implementation involves using firewalls and VLANs to create distinct security zones. Default-deny rules should be enforced, allowing only explicitly permitted traffic between zones. For a file transfer system, this means it should only be able to communicate with necessary internal storage and specific, authorized external IP ranges, while being completely isolated from sensitive internal networks like HR, finance, or domain controllers. Regular network architecture reviews and penetration tests are essential to validate that segmentation controls remain effective and have not been weakened by misconfigurations.

To prevent data exfiltration as seen in the TridentLocker attack, organizations must implement robust Outbound Traffic Filtering. This goes beyond simple port blocking. For the compromised file transfer system, egress traffic should be restricted at the network perimeter to only allow connections to known, trusted destinations on specific ports and protocols. For example, if the system is only meant to exchange files with specific government agencies, firewall rules should enforce this. Furthermore, deep packet inspection (DPI) and proxy servers can be used to block connections to known malicious domains, anonymizing services, and consumer-grade cloud storage providers that are commonly abused for exfiltration. Implementing alerts for high-volume data transfers to new or uncategorized domains can provide early warning of an attack in progress, enabling security teams to intervene before 3.4 GB of data leaves the network.

The initial vector was an 'isolated file transfer system,' which points to a likely failure in application hardening. To defend against this, organizations must secure such public-facing applications by following vendor hardening guides, disabling unnecessary features, and changing default credentials. Specifically for a file transfer system, this includes enforcing strong password policies and account lockout rules, implementing MFA for all administrative and user accounts, restricting file types that can be uploaded, and running the application with the least possible service account privileges. Regular vulnerability scanning and penetration testing of these high-risk applications are crucial to identify and remediate weaknesses before they are exploited by groups like TridentLocker. Had stronger authentication and configuration controls been in place, the attackers may have been prevented from gaining their initial foothold.

Sources & References

Sedgwick discloses data breach after TridentLocker ransomware attack - Security Affairs
Security Affairs (vertexaisearch.cloud.google.com) January 5, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

TridentLockerRansomwareData BreachSupply Chain AttackDouble ExtortionFederal Contractor

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading