Army National Guard Company Cyber Security Posture

nationalguard.com

Welcome to the Army National Guard's page on LinkedIn.ย  The Army National Guard, also known as the National Guard, is one component of The Army (which consists of the Active Army, the Army National Guard, and the Army Reserve). National Guard Soldiers serve both community and country. Our versatility enables us to respond to domestic emergencies, overseas combat missions, counterdrug efforts, reconstruction missions and more. If you are interested in learning more about the career opportunities and educational benefits made possible through service in the National Guard, visit www.NATIONALGUARD.com or talk with our team today at https://bit.ly/2uXk12R. For those seeking official information and news tied to the Army National Guard, visitย www.ng.mil.

ANG Company Details

Linkedin ID:

army-national-guard

Employees number:

56864 employees

Number of followers:

150787.0

NAICS:

928

Industry Type:

Armed Forces

Homepage:

nationalguard.com

IP Addresses:

Scan still pending

Company ID:

ARM_1014038

Scan Status:

In-progress

AI scoreANG Risk Score (AI oriented)

Between 800 and 900

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Army National Guard Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 800 and 900

Army National Guard Company Cyber Security News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Army National GuardBreach10057/2025ARM603071825Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The Army National Guard suffered a significant breach where a Chinese cyberespionage group nicknamed 'Salt Typhoon' extensively compromised its network. The hackers exfiltrated maps, data traffic, network configuration, and administrator credentials. The breach spanned from March to December 2024 and affected networks in every US state and at least four US territories. This incident has raised concerns about the vulnerability of critical infrastructure and the potential for future cyber-attacks.

US Army National GuardBreach10057/2025ARM711072025Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The US Army National Guard experienced a significant data breach by a Chinese state-sponsored threat actor known as Salt Typhoon. The attackers were present in the networks from March to December 2024, stealing sensitive data including administrator credentials, network traffic diagrams, geographical maps, and personally identifiable information (PII) of service members. The breach also compromised data traffic between the stateโ€™s network and other US states and territories, potentially allowing the attackers to pivot to other networks and compromise more government and military targets.

Army National Guard Company Subsidiaries

SubsidiaryImage

Welcome to the Army National Guard's page on LinkedIn.ย  The Army National Guard, also known as the National Guard, is one component of The Army (which consists of the Active Army, the Army National Guard, and the Army Reserve). National Guard Soldiers serve both community and country. Our versatility enables us to respond to domestic emergencies, overseas combat missions, counterdrug efforts, reconstruction missions and more. If you are interested in learning more about the career opportunities and educational benefits made possible through service in the National Guard, visit www.NATIONALGUARD.com or talk with our team today at https://bit.ly/2uXk12R. For those seeking official information and news tied to the Army National Guard, visitย www.ng.mil.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=army-national-guard' -H 'apikey: YOUR_API_KEY_HERE'
newsone

ANG Cyber Security News

2025-03-06T08:00:00.000Z
91st Cyber Brigade direct commissions veteran as LTC

The Virginia National Guard direct-commissioned Robert M. Lee to the rank of lieutenant colonel - a first in the Army National Guardย ...

2025-05-29T07:00:00.000Z
News - South Carolina National Guard Cybersecurity Center at USCA

Aiken is a growing regional cybersecurity center. The South Carolina National Guard is a community-based organization. The Cyber Integrationย ...

2025-05-20T07:00:00.000Z
New Hampshire Army National Guard Hosts 2025 Cyber Yankee Training Exercise

Now in its 11th year, Cyber Yankee 2025 simulated a large-scale cyberattack on critical infrastructure across New England. โ€œAs global cyberย ...

2024-10-21T07:00:00.000Z
National Guard Bureau Hosts 3rd Annual Cybersecurity Awareness Panel

ARLINGTON, Va. โ€“ Everybody plays a role in cybersecurity, National Guard and Department of Defense officials emphasized during a panelย ...

2025-06-02T07:00:00.000Z
Center will focus on monitoring cyber threats, training military and civilian personnel

The facility will serve as the home for the SCANG's Cyber Battalion, according to USCA. The 43,000-square-foot readiness center and the 25,580-ย ...

2025-02-18T08:00:00.000Z
Alabama soldiers among cyber protection team taking part in training exercise

The exercise was designed to test a cyber team's ability to assess whether a network attack has occurred. When an attack is discovered, theย ...

2024-11-05T08:00:00.000Z
Many of the National Guardsmen activated for election focus on cybersecurity

The National Guard advises state officials and works with law enforcement to prevent and respond to cyber threats.

2024-10-25T07:00:00.000Z
Maryland Guard members help enhance Anne Arundel schools cybersecurity

Maryland Guard members help enhance Anne Arundel schools cybersecurity ยท Anne Arundel County allowed CPT 169 and 275th COS to conduct defensiveย ...

2025-06-08T07:00:00.000Z
Cybersecurity, a family trade

VIRGINIA BEACH, Va. โ€“ A unique pair of cybersecurity professionals has traveled from North Carolina to Virginia Beach.

similarCompanies

ANG Similar Companies

US Army Corps of Engineers

U.S. Army Corps of Engineers Mission: Provide vital public engineering services in peace and war to strengthen our Nationโ€™s security, energize the economy, and reduce risks from disasters. Privacy Policy/Social Media Guidelines: https://www.usace.army.mil/SocialMedia/ U.S. Army Corps of Engineers

Canadian Armed Forces | Forces armรฉes canadiennes

A career in the Canadian Armed Forces is more than a way to make a living. Itโ€™s a passport to a whole-life experience that will change you and allow you to change the lives of others. Join an organization that offers more than 100 different trades and professions. Obtain world-class qualification

U.S. Air Force Reserve

The Air Force Reserve is an integral component of our Nation's air defense and military support network. Reservists bring knowledge, skills and expertise from their civilian experiences to support critical missions and training around the globe, while working alongside their Active Duty Air Force me

Minnesota National Guard

The Minnesota National Guard is a joint force of citizen Soldiers and Airmen that serve our state and nation with the Governor as their Commander in Chief, assisting during disasters and other emergencies. In times of war, Minnesota National Guard Soldiers and Airmen can be called into federal activ

U.S. Coast Guard

The mission of the U.S. Coast Guard is to protect the public, the environment, and U.S. economic interests โ€” in the nation's ports and waterways, along the coast, on international waters, or in any maritime region as required to support national security. As one of the five branches of the Armed

Bulgarian Air Force

ะ’ะ’ะก ัะฐ ะพัะฝะพะฒะตะฝ ะฒะธะด ะฒัŠะพั€ัŠะถะตะฝะธ ัะธะปะธ, ะฟั€ะตะดะฝะฐะทะฝะฐั‡ะตะฝะธ ะทะฐ ัƒั‡ะฐัั‚ะธะต ะฒ ััŠะฒะผะตัั‚ะฝะธ ะธ ัะฐะผะพัั‚ะพัั‚ะตะปะฝะธ ะพะฟะตั€ะฐั†ะธะธ, ะบะฐะบั‚ะพ ะฒ ะฝะฐั†ะธะพะฝะฐะปะตะฝ, ั‚ะฐะบะฐ ะธ ะฒ ะผะฝะพะณะพะฝะฐั†ะธะพะฝะฐะปะตะฝ ั„ะพั€ะผะฐั‚. ะ’ะ’ะก ะณะฐั€ะฐะฝั‚ะธั€ะฐั‚ ะฒัŠะทะดัƒัˆะฝะธั ััƒะฒะตั€ะตะฝะธั‚ะตั‚ ะฝะฐ ะ ะตะฟัƒะฑะปะธะบะฐ ะ‘ัŠะปะณะฐั€ะธั, ะบะฐั‚ะพ ะพััŠั‰ะตัั‚ะฒัะฒะฐั‚ ะฝะฐะฑะปัŽะดะตะฝะธะต, ะพั…ั€ะฐะฝะฐ ะธ ะพั‚ะฑั€ะฐะฝะฐ ะฝะฐ ะฝะตะนะฝะพั‚ะพ ะฒัŠะทะดัƒัˆะฝะพ ะฟั€ะพัั‚ั€ะฐะฝัั‚ะฒะพ, ะธะทะฟัŠะปะฝั

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ANG CyberSecurity History Information

How many cyber incidents has ANG faced?

Total Incidents: According to Rankiteo, ANG has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at ANG?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Salt Typhoon Accessed National Guard Systems

Description: A Chinese state-sponsored threat actor known as Salt Typhoon accessed the network of the US Army National Guard for nine months, stealing sensitive data including administrator credentials, network traffic diagrams, geographical maps, and personally identifiable information (PII) of service members.

Type: Data Breach

Attack Vector: Exploiting vulnerabilities in Cisco's routers and similar hardware

Vulnerability Exploited: CVEs in Cisco's routers

Threat Actor: Salt Typhoon (Chinese state-sponsored)

Motivation: Disrupt networks, Steal key intelligence, Prepare for potential conflict over Taiwan

Incident : Cyber Espionage

Title: Cyber Espionage Breach of US Army National Guard Network

Description: A US state's Army National Guard network suffered a breach by the group Salt Typhoon. Maps and data were stolen between March and December 2024.

Type: Cyber Espionage

Attack Vector: Network Compromise

Threat Actor: Salt Typhoon

Motivation: Intelligence Gathering, Critical Infrastructure Sabotage

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Cisco's routers.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach ARM711072025

Data Compromised: Administrator credentials, Network traffic diagrams, Geographical maps, Personally identifiable information (PII) of service members, Data traffic between state's network and other US states and territories

Incident : Cyber Espionage ARM603071825

Data Compromised: Maps, Data Traffic, Network Configuration, Network Diagrams, Administrator Credentials, PII of Service Members

Systems Affected: US state Army National Guard network, Counterparts' networks in every other US state and at least four US territories

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Administrator credentials, Network traffic diagrams, Geographical maps, Personally identifiable information (PII), Maps, Data Traffic, Network Configuration, Network Diagrams, Administrator Credentials and PII of Service Members.

Which entities were affected by each incident?

Incident : Data Breach ARM711072025

Entity Type: Government/Military

Industry: Military

Location: United States

Incident : Cyber Espionage ARM603071825

Entity Type: Government

Industry: Defense

Location: Unnamed US State

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach ARM711072025

Type of Data Compromised: Administrator credentials, Network traffic diagrams, Geographical maps, Personally identifiable information (PII)

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Incident : Cyber Espionage ARM603071825

Type of Data Compromised: Maps, Data Traffic, Network Configuration, Network Diagrams, Administrator Credentials, PII of Service Members

Data Exfiltration: True

Personally Identifiable Information: True

References

Where can I find more information about each incident?

Incident : Data Breach ARM711072025

Source: BleepingComputer

Incident : Cyber Espionage ARM603071825

Source: NBC News

Incident : Cyber Espionage ARM603071825

Source: Property of the People

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: NBC News, and Source: Property of the People.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach ARM711072025

Entry Point: Cisco's routers

High Value Targets: Critical infrastructure organizations, Communications firms, Government, Military, Defense organizations

Data Sold on Dark Web: Critical infrastructure organizations, Communications firms, Government, Military, Defense organizations

Incident : Cyber Espionage ARM603071825

High Value Targets: US state Army National Guard network

Data Sold on Dark Web: US state Army National Guard network

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Salt Typhoon (Chinese state-sponsored) and Salt Typhoon.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Administrator credentials, Network traffic diagrams, Geographical maps, Personally identifiable information (PII) of service members, Data traffic between state's network and other US states and territories, Maps, Data Traffic, Network Configuration, Network Diagrams, Administrator Credentials and PII of Service Members.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were US state Army National Guard network, Counterparts' networks in every other US state and at least four US territories.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Administrator credentials, Network traffic diagrams, Geographical maps, Personally identifiable information (PII) of service members, Data traffic between state's network and other US states and territories, Maps, Data Traffic, Network Configuration, Network Diagrams, Administrator Credentials and PII of Service Members.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident are BleepingComputer, NBC News and Property of the People.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Cisco's routers.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge