top of page

Subscribe to our newsletter

Ingram Micro Legacy Systems Outage: How the SafePay Ransomware Attack Disrupted Global Supply Chain Operations

  • Rescana
  • Jul 6
  • 3 min read

Updated: Jul 7

Image for post about Ingram Micro outage caused by SafePay ransomware attack

Executive Summary

Ingram Micro experienced a significant outage caused by a breach involving the SafePay ransomware attack. The incident was detected through anomalous network activity, and By July 6 2025, Ingram Micro publicly confirmed. Due to vulnerabilities in legacy systems and misconfigurations in business applications, the attack led to widespread disruption affecting internal and customer-facing services. The outage, lasting around 48 hours, directly impacted global supply chain operations and required an intensive, coordinated response from both internal teams and external cybersecurity experts.

Incident Timeline


  • 3 Jul 2025 (≈20:00 UTC) – Security monitoring detects unusual traffic; key portals are taken offline while triage begins. 

  • 4 Jul 2025 – Customers and MSPs report a global blackout as websites, partner portals and ordering systems remain inaccessible. 

  • 5 Jul 2025 – Analysts uncover SafePay ransom notes on compromised hosts; first media reports link the outage to ransomware. 

  • 6 Jul 2025 (02:30 UTC) – Ingram Micro issues a statement confirming ransomware and activates full incident‑response procedures with external experts and law‑enforcement. 

  • 7 Jul 2025 and onward – Recovery work continues; industry outlets report sustained supply‑chain disruption as partners seek alternate distributors. 


Technical Root Cause

The root cause of the incident was identified as vulnerabilities in Ingram Micro’s legacy operating systems and business applications, which were further compromised due to misconfigurations and delayed patch management. These technical deficiencies allowed the SafePay ransomware attack to infiltrate the network, enabling lateral movement across critical systems and ultimately leading to extensive disruption of services. The event highlighted the inherent risks associated with outdated infrastructure and underscored the necessity for proactive vulnerability management and rigorous patch application.

Service Impact Analysis

The outage paralysed core back‑end platforms (order processing, logistics, partner licensing portals) for at least four consecutive days. Distributors, MSPs and end‑customers were unable to place hardware or software orders, renew subscriptions or manage cloud licences, leading to cascading delays across the global IT supply chain.

Customer Impact

Customer impact was significant as Ingram Micro promptly communicated by email notifications and website updates, informing clients and stakeholders about the incident. Affected parties experienced uncertainty and operational delays, and the communications described the technical aspects of the attack as well as the steps being taken to restore full functionality. Despite the swift response, the service disruption led to temporary dissatisfaction among customers who rely on the critical systems for supply chain and logistics operations.

Response and Recovery

Upon detecting the intrusion on 3 July, Ingram Micro isolated affected networks and applied traffic filters to curb lateral movement. Emergency patching of vulnerable legacy hosts began on 4 July, followed by forensic imaging of key systems. After publicly acknowledging the attack on 6 July, the company brought in third‑party incident‑response teams, rotated credentials enterprise‑wide and implemented heightened 24×7 monitoring. Progressive service restoration started late on 7 July, with priority given to order‑entry and partner‑portal functions; full normalisation is expected to extend beyond the initial week‑end.

Business Impact

Operational disruption during the first four days prevented billions of dollars in channel transactions, forcing resellers to redirect purchases and hurting Ingram Micro’s reputation for supply‑chain reliability. Analysts warn of near‑term revenue deferrals and potential SLA penalties, though swift disclosure and coordinated remediation have limited longer‑term damage. 

Lessons Learned

This incident reaffirmed the critical need for up-to-date security patches, improved system configurations, and stringent monitoring protocols, with emphasis on maintaining modernized infrastructure. Ingram Micro’s experience with the SafePay ransomware attack has emphasized the importance of rapid communication, both internally and externally, along with the necessity for continuous improvements in cybersecurity defenses. The coordinated response and thorough investigation provided valuable insights, leading to strengthened response strategies and highlighting the importance of proactive risk management to mitigate future threats.

References


  1. The Register, “14‑hour+ global blackout at Ingram Micro halts customer orders,” 4 Jul 2025

  2. BleepingComputer, “Ingram Micro outage caused by SafePay ransomware attack,” 5 Jul 2025

  3. Reuters, “Ingram Micro says identified ransomware on certain of its internal systems,” 6 Jul 2025

  4. SDxCentral, “Ingram Micro ransomware attack sees supply chain in disarray,” 7 Jul 2025


About Rescana

Rescana offers a comprehensive Third Party Risk Management (TPRM) platform designed to assist organizations in overseeing and mitigating risks associated with their suppliers and partners. Our platform facilitates robust risk assessment, continuous monitoring, and regulatory compliance, ensuring firms are well-prepared to handle the complexities of modern cybersecurity and operational threats. We are happy to answer questions at ops@rescana.com.

bottom of page