IT big Ingram Micro is experiencing a world outage that’s impacting its web sites and inner programs, with clients involved that it might be a cyberattack after the corporate stays silent on the reason for the problems.
Ingram Micro is without doubt one of the largest business-to-business expertise distributors and repair suppliers on the planet, providing {hardware}, software program, cloud, logistics, and coaching options to resellers and managed service suppliers worldwide.
The corporate employs round 24,000 individuals and generated roughly $48 billion in income in 2024.
Ingram Micro’s outage began Thursday morning, with the web site going offline and clients unable to position orders.
BleepingComputer was knowledgeable final evening that a few of Ingram Micro’s inner programs are additionally inaccessible to workers.
Visiting the ingrammicro.com web site now shows both a generic entry restricted message from Akamai, a networking vendor utilized by Ingram Micro, or a upkeep message, proven beneath.
Upkeep message proven on Ingram Micro’s web site
Supply: BleepingComputer
Do you could have details about this or one other cyberattack? If you wish to share the data, you may contact us securely and confidentially on Sign at LawrenceA.11, by way of electronic mail at lawrence.abrams@bleepingcomputer.com, or through the use of our ideas kind.
Ingram Micro clients shared on Reddit that the corporate is being silent as to what’s inflicting the outage, with workers additionally left at the hours of darkness.
Some individuals claimed they have been informed a cyberattack, probably ransomware, is behind the outage, however BleepingComputer has not been in a position to decide if these claims are legitimate.
Nonetheless, an prolonged outage and the shutting down of inner programs are widespread indicators of a breach of some type.
BleepingComputer contacted Ingram Micro concerning the outage and can replace the story if we obtain a response.
Whereas cloud assaults could also be rising extra refined, attackers nonetheless succeed with surprisingly easy methods.
Drawing from Wiz’s detections throughout hundreds of organizations, this report reveals 8 key methods utilized by cloud-fluent menace actors.