Amey Company Cyber Security Posture

amey.co.uk

We are a leading provider of full life-cycle engineering, operations and decarbonisation solutions, for transport infrastructure and complex facilities. Our purpose is delivering sustainable infrastructure, enhancing life, protecting our shared future. We combine exceptional expertise in Consulting & Design, Advisory & Analytics, Transport Infrastructure and Complex Facilities to design, manage, and maintain clientsโ€™ assets throughout their lifetime. Our leading data and analytics solutions enable us to create transformative solutions that strengthen resilience and drive sustainable improvements. Our people are driven by a set of strong values, that focus on safety, insight, and collaboration.

Amey Company Details

Linkedin ID:

amey

Employees number:

7568 employees

Number of followers:

151124.0

NAICS:

237

Industry Type:

Civil Engineering

Homepage:

amey.co.uk

IP Addresses:

Scan still pending

Company ID:

AME_1035074

Scan Status:

In-progress

AI scoreAmey Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Amey Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Amey Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
AmeyRansomware100512/2020AME15336322Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The infrastructure support services provider Amey Plc was targeted by the Mount Locker ransomware group. The group released some of the stolen proprietary data from its systems on their leak site. The dumped data included confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints, and other information.

Amey Company Subsidiaries

SubsidiaryImage

We are a leading provider of full life-cycle engineering, operations and decarbonisation solutions, for transport infrastructure and complex facilities. Our purpose is delivering sustainable infrastructure, enhancing life, protecting our shared future. We combine exceptional expertise in Consulting & Design, Advisory & Analytics, Transport Infrastructure and Complex Facilities to design, manage, and maintain clientsโ€™ assets throughout their lifetime. Our leading data and analytics solutions enable us to create transformative solutions that strengthen resilience and drive sustainable improvements. Our people are driven by a set of strong values, that focus on safety, insight, and collaboration.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=amey' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Amey Cyber Security News

2025-06-02T07:00:00.000Z
New podcast series on Smart Local Energy Systems launched by Amey

Amey has launched a new podcast series exploring Smart Local Energy Systems (SLES) and their role in enabling a sustainable, resilient, low-carbon future.

2022-04-18T07:00:00.000Z
2022 spring student marshal: Amey Deotale

UNIVERSITY PARK, Pa. โ€” Amey Deotale has been named the spring 2022 student marshal for computer science. Deotale will receive his bachelorย ...

2025-05-18T07:00:00.000Z
Small Town, Big Impact: How Belagavi Is Quietly Powering Tech Innovation

In a world increasingly defined by digital intelligence and cybersecurity, a quiet revolution is underwayโ€”not in Bengaluru, Hyderabad,ย ...

2023-12-05T08:00:00.000Z
Amey and Indra join forces to digitise UK rail signalling

Amey is no stranger to collaborating with technology firms to boost the efficiency and security of UK rail networks. The firm also collaboratedย ...

2023-12-05T08:00:00.000Z
Amey and Indra to develop new digital signalling system

AMEY and Indra have announced that they will work together to develop an open and interoperable digital signalling system that will enable allย ...

2022-06-27T07:00:00.000Z
Insurers refuse to cover contractors with poor cyber security

In March, a government report revealed that construction firms were among the groups of businesses that were least likely to have specific cyberย ...

2013-07-23T07:00:00.000Z
New Report: The State Departmentโ€™s Anti-Hacking Office Is a Complete Disaster

The State Department has plenty of important secretsโ€”classified cables, foreign policy directives, embassy plans, and more.

2022-01-16T08:00:00.000Z
Inside story of cyber attacks on Indiaโ€™s banks, airlines, railwaysโ€ฆ and the fightback

On March 2, 2014, Ukraine woke up to a major communication blackout. Mobile phones in the former Soviet republic stopped working,ย ...

2021-01-05T08:00:00.000Z
Amey plc hit with Mount Locker ransomware attack

It has been confirmed that infrastructure support service company Amey plc were recently struck by a Mount Locker ransomware cyberattack. It hasย ...

similarCompanies

Amey Similar Companies

We are committed to addressing the worldโ€™s biggest challenges in the areas of water, energy and communities. GHD is a global network of multi-disciplinary professionals providing clients with integrated solutions through engineering, environmental, design and construction expertise. Our future-focu

Fugro

We are the worldโ€™s leading Geo-data specialist, collecting and analysing comprehensive information about the Earth and the structures built upon it. Through integrated data acquisition, analysis and advice, we unlock insights from Geo-data to help our clients design, build and operate their assets i

Enabling communities to thrive. Itโ€™s what weโ€™ve done for more than 150 years. Solving problems. Making the extraordinary run smoothly every day. Weโ€™re keeping the lights on and the water flowing. Running the hospitals that take care of us. Delivering the transport that takes us from A to B. Mainta

Tetra Tech

Tetra Tech is a leading, global provider of consulting and engineering services. We are differentiated by Leading with Scienceยฎ to provide innovative technical solutions to our clients. We support global commercial and government clients focused on water, environment, sustainable infrastructure, ren

UEM Edgenta Berhad

UEM Edgenta is a leading Asset Management and Infrastructure Solutions company in the region and a subsidiary of UEM Group. Listed on the Main Market of Bursa Malaysia Securities Berhad (KLSE: EDGENTA), our expertise covers Healthcare Support and Property & Facility Solutions, and Infrastructure Ser

Sigdo Koppers SKIC

Sigdo Koppers Ingenierรƒยญa y Construcciรƒยณn es una empresa formada por capitales chilenos, lรƒยญder en la ejecuciรƒยณn de proyectos de construcciรƒยณn y montaje industrial de gran escala. La compaรƒยฑรƒยญa ha participado en los principales proyectos de inversiรƒยณn relevantes para el desarrollo del paรƒยญs y cuent

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Amey CyberSecurity History Information

How many cyber incidents has Amey faced?

Total Incidents: According to Rankiteo, Amey has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Amey?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Amey Plc Ransomware Attack by Mount Locker

Description: The infrastructure support services provider Amey Plc was targeted by the Mount Locker ransomware group. The group released some of the stolen proprietary data from its systems on their leak site. The dumped data included confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints, and other information.

Type: Ransomware

Threat Actor: Mount Locker

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware AME15336322

Data Compromised: confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.

Which entities were affected by each incident?

Incident : Ransomware AME15336322

Entity Type: Company

Industry: Infrastructure Support Services

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware AME15336322

Type of Data Compromised: confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware AME15336322

Ransomware Strain: Mount Locker

Data Exfiltration: True

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Mount Locker.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge