
Amey Company Cyber Security Posture
amey.co.ukWe are a leading provider of full life-cycle engineering, operations and decarbonisation solutions, for transport infrastructure and complex facilities. Our purpose is delivering sustainable infrastructure, enhancing life, protecting our shared future. We combine exceptional expertise in Consulting & Design, Advisory & Analytics, Transport Infrastructure and Complex Facilities to design, manage, and maintain clientsโ assets throughout their lifetime. Our leading data and analytics solutions enable us to create transformative solutions that strengthen resilience and drive sustainable improvements. Our people are driven by a set of strong values, that focus on safety, insight, and collaboration.
Amey Company Details
amey
7568 employees
151124.0
237
Civil Engineering
amey.co.uk
Scan still pending
AME_1035074
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Amey Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Amey Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Amey | Ransomware | 100 | 5 | 12/2020 | AME15336322 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: The infrastructure support services provider Amey Plc was targeted by the Mount Locker ransomware group. The group released some of the stolen proprietary data from its systems on their leak site. The dumped data included confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints, and other information. |
Amey Company Subsidiaries

We are a leading provider of full life-cycle engineering, operations and decarbonisation solutions, for transport infrastructure and complex facilities. Our purpose is delivering sustainable infrastructure, enhancing life, protecting our shared future. We combine exceptional expertise in Consulting & Design, Advisory & Analytics, Transport Infrastructure and Complex Facilities to design, manage, and maintain clientsโ assets throughout their lifetime. Our leading data and analytics solutions enable us to create transformative solutions that strengthen resilience and drive sustainable improvements. Our people are driven by a set of strong values, that focus on safety, insight, and collaboration.
Access Data Using Our API

Get company history
.png)
Amey Cyber Security News
New podcast series on Smart Local Energy Systems launched by Amey
Amey has launched a new podcast series exploring Smart Local Energy Systems (SLES) and their role in enabling a sustainable, resilient, low-carbon future.
2022 spring student marshal: Amey Deotale
UNIVERSITY PARK, Pa. โ Amey Deotale has been named the spring 2022 student marshal for computer science. Deotale will receive his bachelorย ...
Small Town, Big Impact: How Belagavi Is Quietly Powering Tech Innovation
In a world increasingly defined by digital intelligence and cybersecurity, a quiet revolution is underwayโnot in Bengaluru, Hyderabad,ย ...
Amey and Indra join forces to digitise UK rail signalling
Amey is no stranger to collaborating with technology firms to boost the efficiency and security of UK rail networks. The firm also collaboratedย ...
Amey and Indra to develop new digital signalling system
AMEY and Indra have announced that they will work together to develop an open and interoperable digital signalling system that will enable allย ...
Insurers refuse to cover contractors with poor cyber security
In March, a government report revealed that construction firms were among the groups of businesses that were least likely to have specific cyberย ...
New Report: The State Departmentโs Anti-Hacking Office Is a Complete Disaster
The State Department has plenty of important secretsโclassified cables, foreign policy directives, embassy plans, and more.
Inside story of cyber attacks on Indiaโs banks, airlines, railwaysโฆ and the fightback
On March 2, 2014, Ukraine woke up to a major communication blackout. Mobile phones in the former Soviet republic stopped working,ย ...
Amey plc hit with Mount Locker ransomware attack
It has been confirmed that infrastructure support service company Amey plc were recently struck by a Mount Locker ransomware cyberattack. It hasย ...

Amey Similar Companies

GHD
We are committed to addressing the worldโs biggest challenges in the areas of water, energy and communities. GHD is a global network of multi-disciplinary professionals providing clients with integrated solutions through engineering, environmental, design and construction expertise. Our future-focu

Fugro
We are the worldโs leading Geo-data specialist, collecting and analysing comprehensive information about the Earth and the structures built upon it. Through integrated data acquisition, analysis and advice, we unlock insights from Geo-data to help our clients design, build and operate their assets i

Downer
Enabling communities to thrive. Itโs what weโve done for more than 150 years. Solving problems. Making the extraordinary run smoothly every day. Weโre keeping the lights on and the water flowing. Running the hospitals that take care of us. Delivering the transport that takes us from A to B. Mainta

Tetra Tech
Tetra Tech is a leading, global provider of consulting and engineering services. We are differentiated by Leading with Scienceยฎ to provide innovative technical solutions to our clients. We support global commercial and government clients focused on water, environment, sustainable infrastructure, ren

UEM Edgenta Berhad
UEM Edgenta is a leading Asset Management and Infrastructure Solutions company in the region and a subsidiary of UEM Group. Listed on the Main Market of Bursa Malaysia Securities Berhad (KLSE: EDGENTA), our expertise covers Healthcare Support and Property & Facility Solutions, and Infrastructure Ser

Sigdo Koppers SKIC
Sigdo Koppers Ingenierรยญa y Construcciรยณn es una empresa formada por capitales chilenos, lรยญder en la ejecuciรยณn de proyectos de construcciรยณn y montaje industrial de gran escala. La compaรยฑรยญa ha participado en los principales proyectos de inversiรยณn relevantes para el desarrollo del paรยญs y cuent

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Amey CyberSecurity History Information
How many cyber incidents has Amey faced?
Total Incidents: According to Rankiteo, Amey has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Amey?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Amey Plc Ransomware Attack by Mount Locker
Description: The infrastructure support services provider Amey Plc was targeted by the Mount Locker ransomware group. The group released some of the stolen proprietary data from its systems on their leak site. The dumped data included confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints, and other information.
Type: Ransomware
Threat Actor: Mount Locker
Motivation: Financial Gain
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware AME15336322
Data Compromised: confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.
Which entities were affected by each incident?
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware AME15336322
Type of Data Compromised: confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records, technical blueprints
Sensitivity of Data: High
Data Exfiltration: True
Personally Identifiable Information: True
Ransomware Information
Was ransomware involved in any of the incidents?
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Mount Locker.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were confidential partnership agreements, NDAs, scans of passports, driving licenses, financial reports, employment records and technical blueprints.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
