Sedgwick, one of the world’s largest claims management companies, has been targeted by the TridentLocker ransomware group, with attackers claiming to have exfiltrated sensitive data from systems supporting government services operations.

About Sedgwick

Sedgwick is a leading global provider of technology-enabled risk, benefits, and integrated business solutions, handling:

  • Workers’ compensation claims
  • Property and casualty claims
  • Disability and leave management
  • Government services administration

The company processes millions of claims annually for major insurers, corporations, and government entities.

Attack Details

The TridentLocker group claims to have:

  • Gained access to Sedgwick’s internal systems
  • Exfiltrated data from government services operations
  • Obtained sensitive claims and personal information

Potential Impact

Given Sedgwick’s role in claims processing, compromised data could include:

  • Personal identifiable information (PII): Names, SSNs, addresses
  • Medical information: Injury details, treatment records
  • Financial data: Payment information, bank accounts
  • Employment records: Salary, job history
  • Government program data: Benefits claims, eligibility information

Third-Party Risk

This attack underscores the risk posed by third-party service providers:

  • Claims administrators handle sensitive data for multiple organizations
  • A single breach can impact thousands of businesses and millions of individuals
  • Attackers increasingly target service providers for maximum leverage

Recommendations

For Sedgwick clients:

  1. Monitor for breach notifications
  2. Review data sharing agreements
  3. Assess exposure of shared information
  4. Prepare incident response plans

For organizations generally:

  1. Evaluate third-party security posture
  2. Limit data shared with service providers
  3. Require breach notification clauses in contracts
  4. Conduct regular vendor security assessments