Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Sedgwick Data Breach Confirmed After TridentLocker
CyberSecurity News

Sedgwick Data Breach Confirmed After TridentLocker

The TridentLocker ransomware gang has claimed responsibility for stealing 3.4 gigabytes of data from Sedgwick Data Breach underscores the persistent risks faced by federal contractors handling...

Jennifer sherman
Jennifer sherman
January 6, 2026 2 Min Read
60 0

The TridentLocker ransomware gang has claimed responsibility for stealing 3.4 gigabytes of data from Sedgwick Data Breach underscores the persistent risks faced by federal contractors handling sensitive U.S. agency data.

Claims administration giant Sedgwick acknowledged on January 4, 2026, that Sedgwick Government Solutions (SGS) experienced unauthorized access to an isolated file transfer system.

The subsidiary provides risk management and claims services to key federal clients, including the Department of Homeland Security (DHS), Immigration and Customs Enforcement (ICE), Customs and Border Protection (CBP), U.S. Citizenship and Immigration Services (USCIS), Department of Labor (DOL), and Cybersecurity and Infrastructure Security Agency (CISA). SGS also supports municipal agencies across all 50 states, the Smithsonian Institution, and the Port Authority of New York and New Jersey.​

TridentLocker publicly listed SGS as a victim on New Year’s Eve, December 31, 2025, claiming to have exfiltrated 3.39 GB of documents and posting samples on its dark web leak site.

The ransomware-as-a-service (RaaS) group, which emerged in late November 2025, employs double-extortion tactics, encrypting systems and threatening data leaks.​

A Sedgwick spokesperson told The Record Media.“Following the detection of the incident, we initiated our incident response protocols and engaged external cybersecurity experts through outside counsel to assist with our investigation of the affected isolated file transfer system.”

The company emphasized segmentation: “Importantly, Sedgwick Government Solutions is segmented from the rest of our business, and no wider Sedgwick systems or data were affected. Further, there is no evidence of access to claims management servers nor any impact on Sedgwick Government Solutions’ ability to continue serving its clients.”​

Sedgwick, which employs over 33,000 people across 80 countries and generates multi-billion-dollar revenue, has notified law enforcement and clients while continuing operations. CISA and DHS did not respond to requests for comment.​

TridentLocker has claimed 12 victims since November 2025, spanning manufacturing, government, IT, and professional services, primarily in North America and Europe.

Ransomware Gang Claim
Ransomware Gang Claim

Notable prior targets include the Belgian postal service bpost, which confirmed a breach. The group uses tactics like data exfiltration over web protocols (MITRE ATT&CK T1071.001) and encryption for impact (T1486).​

Federal contractors face repeated ransomware attacks; Conduent’s 2025 attack exposed data on more than 10 million people, while Chemonics suffered a breach targeting USAID work.

Experts urge enhanced segmentation, incident response, and supply chain scrutiny amid rising threats to public sector partners. Sedgwick’s cyber services arm ironically promotes rapid response, underscoring the irony in the incident.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityransomwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Judge Demands OpenAI Release 20M Million Anonymized

Next Post

Malicious Chrome Extension Steals ChatGPT Data from 90

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us