Sedgwick, one of the world’s largest claims management companies, confirmed a cybersecurity incident at its government-focused subsidiary on January 4, 2026, after the TridentLocker ransomware group claimed responsibility for the attack on New Year’s Eve.

Incident overview

AttributeDetails
VictimSedgwick Government Solutions
Parent companySedgwick
Threat actorTridentLocker ransomware group
Data claimed3.4 GB
Attack dateDecember 31, 2025
Disclosure dateJanuary 4, 2026
Affected systemIsolated file transfer system
Core systems affectedNo (per Sedgwick)

Timeline

DateEvent
December 31, 2025TridentLocker claims attack on leak site
January 4, 2026Sedgwick confirms incident
January 2026Law enforcement notified
OngoingInvestigation continues

The attack’s timing—New Year’s Eve—follows the pattern of ransomware groups targeting holidays when security staffing is reduced.

What was targeted

TridentLocker claims to have stolen 3.4 gigabytes of data from Sedgwick Government Solutions, the company’s federal contractor subsidiary.

Sedgwick’s statement

“Following the detection of the incident, we initiated our incident response protocols and engaged external cybersecurity experts through outside counsel to assist with our investigation of the affected isolated file transfer system. Importantly, Sedgwick Government Solutions is segmented from the rest of our business, and no wider Sedgwick systems or data were affected.”

System typeStatus
Isolated file transfer systemAffected
Claims management serversNo evidence of access
Main Sedgwick networkNot affected
Client service capabilityMaintained

Federal agency clients at risk

Sedgwick Government Solutions provides claims and risk management services to major federal agencies:

AgencyServices provided
Department of Homeland Security (DHS)Claims administration
Immigration and Customs Enforcement (ICE)Risk management
Customs and Border Protection (CBP)Workers’ compensation
Citizenship and Immigration Services (USCIS)Claims processing
Department of Labor (DOL)Benefits administration
CISARisk management services
Smithsonian InstitutionClaims services
Port Authority of NY/NJRisk management

The company also provides services to municipal agencies in all 50 states.

The irony of a ransomware attack affecting a CISA contractor underscores that no organization is immune.

Data at risk

Given Sedgwick’s role in claims processing, compromised data could include:

Data typeExamplesRisk level
Personal identifiersNames, SSNs, addressesCritical
Medical informationInjury details, treatment recordsCritical
Payment dataBank accounts, payment historyHigh
Employment recordsSalary, job history, benefitsHigh
Government program dataBenefits claims, eligibilityHigh

Federal employee workers’ compensation claims contain particularly sensitive information combining PII, medical records, and employment details.

About Sedgwick

MetricValue
Employees33,000+
Countries80
Clients10,000+
Fortune 500 coverage59%
Government agency clients20+
Claims processed annuallyMillions

Sedgwick handles workers’ compensation, property and casualty claims, disability and leave management, and government services administration.

About TridentLocker

TridentLocker is a ransomware-as-a-service (RaaS) operation that emerged in late November 2025.

Group profile

AttributeDetails
First observedNovember 11, 2025
ModelRansomware-as-a-Service (RaaS)
TacticDouble extortion (encryption + data leak)
Confirmed victims12 (as of early January 2026)
Target regionsNorth America, Europe, UK, China
Target sectorsManufacturing, government, IT, professional services

TridentLocker victim timeline

DateTargetSectorRegionData claimed
November 11, 2025First leak site postN/AN/AGroup emergence
November 2025bpostPostal/logisticsBelgiumUndisclosed
November 2025GuestTek Interactive EntertainmentHospitality ITCanadaCustomer data
November 2025TypecaseE-commerce/retailUKBusiness records
December 2025Manufacturing firm (unnamed)ManufacturingGermanyProduction data
December 2025IT service providerTechnologyNetherlandsClient data
December 31, 2025Sedgwick Government SolutionsGovernment contractorUSA3.4 GB

TridentLocker technical characteristics

AttributeDetails
Encryption algorithmAES-256 + RSA-2048 hybrid
File extension.tl0ck3d
Ransom noteDECRYPT_INSTRUCTIONS.html
Payment methodBitcoin, Monero
CommunicationOnion-based leak site and negotiation portal
Affiliate split70/30 (affiliate/core team)

The group’s rapid victim accumulation—12 confirmed in under two months—suggests either an experienced team operating under a new brand or aggressive affiliate recruitment.

Third-party risk implications

Claims administrators represent high-value targets because a single breach can impact thousands of organizations and millions of individuals.

Sedgwick’s reach

FactorImplication
59% Fortune 500 coverageSingle breach potentially affects majority of large US companies
Federal employee dataSpans multiple government agencies
Claims data sensitivityMedical, financial, personal combined
State and municipal clientsAll 50 states exposed

Attackers increasingly target service providers for this leverage—one breach yields data from hundreds of client organizations.

Response

Sedgwick’s actions

ActionStatus
Incident response protocolsInitiated
External cybersecurity expertsEngaged via outside counsel
Law enforcement notificationComplete
Affected customer notificationIn progress
Network segmentation verificationConfirmed effective

Government response

CISA and DHS declined to comment on the breach.

Recommendations

For organizations using Sedgwick

PriorityAction
HighMonitor for breach notifications from Sedgwick
HighReview data sharing agreements—understand what was shared
HighAssess potential exposure—what information could be compromised
MediumPrepare incident response—be ready to notify affected individuals
MediumWatch for targeted phishing using stolen data
OngoingTrack investigation updates

For all organizations with third-party claims processors

ControlPurpose
Vendor security assessmentsEvaluate provider security posture
Data minimizationLimit what you share with vendors
Contractual protectionsRequire breach notification clauses
Segmentation verificationConfirm vendors segment client data
Insurance reviewEnsure coverage for third-party breaches
Due diligence updatesRegular reassessment of vendor risk

For claims processing organizations

PriorityAction
HighReview network segmentation effectiveness
HighAudit file transfer system security
HighImplement holiday security staffing plans
MediumTest incident response during reduced staffing
OngoingMonitor emerging ransomware groups

Context

The Sedgwick breach illustrates the concentration of risk in claims administration. Organizations outsource claims processing for efficiency, but that consolidation creates single points of failure that attackers can exploit for maximum impact.

Federal contractor risk

Federal contractors have faced repeated ransomware campaigns:

YearTargetImpact
2025Conduent10+ million individuals’ data exposed
2025ChemonicsUSAID operations affected
2026Sedgwick Government SolutionsFederal agency claims data at risk

The pattern suggests ransomware groups actively target the federal contractor supply chain.

TridentLocker infrastructure analysis

Leak site characteristics

FeatureImplementation
HostingTor hidden service
DesignProfessional, countdown timers
Victim displayGrid layout with data previews
NegotiationSeparate portal per victim
UpdatesRegular (2-3 new victims weekly)

Communication style

TridentLocker’s leak site posts follow a consistent pattern:

  1. Initial listing with company name and brief description
  2. Countdown timer (typically 7-14 days)
  3. Data sample release (1-5% of claimed data)
  4. Full publication if ransom not paid
  5. Archives maintained indefinitely

Indicators of professionalism

IndicatorAssessment
Consistent brandingLogo, color scheme across communications
Professional languageError-free English in ransom notes
Quick response times1-4 hour average on negotiation portal
Payment trackingAutomated confirmation systems
Data organizationStructured folders in leak releases

These characteristics suggest an organized operation rather than opportunistic actors, potentially including members from previously disrupted ransomware groups.

Holiday timing analysis

TridentLocker’s attack on New Year’s Eve follows documented ransomware patterns:

Holiday periodAttack increaseReason
Thanksgiving weekend40%+Reduced staffing
Christmas/New Year55%+Extended vacation periods
Summer holidays (July/Aug)25%+IT staff vacations
Federal holidays30%+Government contractor vulnerability

CISA and FBI joint advisory (November 2025) specifically warned organizations about increased ransomware activity during the December 2025-January 2026 holiday period.

Sedgwick’s network segmentation appears to have limited the blast radius of this attack—a positive example of defense-in-depth working as intended. However, the 3.4GB of claimed data from a “file transfer system” could still contain highly sensitive federal employee information.