Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

We advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investing to create a better today and a better tomorrow by supporting the social and economic prosperity of our communities. This includes the Bell Let's Talk initiative, which promotes Canadian mental health with national awareness and anti-stigma campaigns like Bell Let's Talk Day and significant Bell funding of community care and access, research and workplace initiatives throughout the country. To learn more, please visit Bell.ca/LetsTalk

Bell A.I CyberSecurity Scoring

Bell

Company Details

Linkedin ID:

bell

Employees number:

33,894

Number of followers:

363,183

NAICS:

517

Industry Type:

Telecommunications

Homepage:

bell.ca

IP Addresses:

0

Company ID:

BEL_1877834

Scan Status:

In-progress

AI scoreBell Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/bell.jpeg
Bell Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreBell Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/bell.jpeg
Bell Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Bell Company CyberSecurity News & History

Past Incidents
4
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
BellRansomware10053/2026NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Bell Ambulance Suffers Major Data Breach in Medusa Ransomware Attack In February 2025, Wisconsin-based Bell Ambulance, a leading emergency medical services provider, fell victim to a cyberattack by the Medusa ransomware-as-a-service operation. The breach compromised sensitive data belonging to 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information. Bell Ambulance disclosed the incident in breach notices filed with Maine regulators, confirming that threat actors exfiltrated the data. While the company began sending breach notifications in April 2025, additional victims were identified in the following months. The attack traces back to a 2024 ransom demand by Medusa, which sought $400,000 in exchange for not leaking the stolen 219 GB of data. The FBI has since highlighted Medusa’s growing threat, noting that the group has targeted over 300 critical infrastructure organizations since its emergence in June 2021. The Bell Ambulance breach underscores the persistent risks posed by ransomware operations to healthcare and emergency services.

BellRansomware10052/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Cyberattack on Bell Ambulance Exposes Data of Over 235,000 Individuals Bell Ambulance, Wisconsin’s largest ambulance provider, confirmed a data breach affecting 237,830 individuals after hackers infiltrated its systems in early 2025. The attack, discovered on February 13, resulted in the theft of sensitive information, including Social Security numbers, driver’s license details, financial accounts, medical records, and health insurance data. The company, which serves Milwaukee and surrounding cities with over 750 employees handling roughly 140,000 calls annually, engaged cybersecurity experts to investigate and mitigate the breach. Notifications to affected individuals began in April 2025, with additional victims identified through the fall. The Medusa ransomware gang claimed responsibility for the attack, demanding a $400,000 ransom for the 219 GB of stolen data. The group, active since June 2021, has targeted critical infrastructure, including healthcare and government entities across multiple states. In March 2025, the FBI issued an advisory warning of Medusa’s escalating attacks, noting its use of triple extortion tactics demanding multiple ransom payments under false pretenses. The breach underscores the persistent threat ransomware groups pose to healthcare and emergency services.

BellBreach100501/2018NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Hackers have illegally obtained customer information, primarily subscriber names and e-mail addresses. Up to 100,000 customers were affected by the hack. Hackers accessed nearly 1.9 million Bell customer e-mail addresses as well as 1,700 names and phone numbers.

BellBreach50205/2017NA
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Bell suffered from a data breach incident that exposed1.9 million customer e-mail addresses, and 700 names and phone numbers were illegally accessed. Financial, password or other sensitive personal information was not accessed. Bell takes swift action to protect vulnerable systems. The business has contacted the Office of the Privacy Commissioner and has been closely collaborating with the RCMP cybercrime unit in its investigation.

Bell Ambulance: Bell Ambulance breach impacts over 237K
Ransomware
Severity: 100
Impact: 5
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Bell Ambulance Suffers Major Data Breach in Medusa Ransomware Attack In February 2025, Wisconsin-based Bell Ambulance, a leading emergency medical services provider, fell victim to a cyberattack by the Medusa ransomware-as-a-service operation. The breach compromised sensitive data belonging to 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information. Bell Ambulance disclosed the incident in breach notices filed with Maine regulators, confirming that threat actors exfiltrated the data. While the company began sending breach notifications in April 2025, additional victims were identified in the following months. The attack traces back to a 2024 ransom demand by Medusa, which sought $400,000 in exchange for not leaking the stolen 219 GB of data. The FBI has since highlighted Medusa’s growing threat, noting that the group has targeted over 300 critical infrastructure organizations since its emergence in June 2021. The Bell Ambulance breach underscores the persistent risks posed by ransomware operations to healthcare and emergency services.

Bell Ambulance: 235,000 affected by cyberattack on largest ambulance provider in Wisconsin
Ransomware
Severity: 100
Impact: 5
Seen: 2/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Cyberattack on Bell Ambulance Exposes Data of Over 235,000 Individuals Bell Ambulance, Wisconsin’s largest ambulance provider, confirmed a data breach affecting 237,830 individuals after hackers infiltrated its systems in early 2025. The attack, discovered on February 13, resulted in the theft of sensitive information, including Social Security numbers, driver’s license details, financial accounts, medical records, and health insurance data. The company, which serves Milwaukee and surrounding cities with over 750 employees handling roughly 140,000 calls annually, engaged cybersecurity experts to investigate and mitigate the breach. Notifications to affected individuals began in April 2025, with additional victims identified through the fall. The Medusa ransomware gang claimed responsibility for the attack, demanding a $400,000 ransom for the 219 GB of stolen data. The group, active since June 2021, has targeted critical infrastructure, including healthcare and government entities across multiple states. In March 2025, the FBI issued an advisory warning of Medusa’s escalating attacks, noting its use of triple extortion tactics demanding multiple ransom payments under false pretenses. The breach underscores the persistent threat ransomware groups pose to healthcare and emergency services.

Bell
Breach
Severity: 100
Impact: 5
Seen: 01/2018
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Hackers have illegally obtained customer information, primarily subscriber names and e-mail addresses. Up to 100,000 customers were affected by the hack. Hackers accessed nearly 1.9 million Bell customer e-mail addresses as well as 1,700 names and phone numbers.

Bell
Breach
Severity: 50
Impact: 2
Seen: 05/2017
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack limited on finance or reputation

Description: Bell suffered from a data breach incident that exposed1.9 million customer e-mail addresses, and 700 names and phone numbers were illegally accessed. Financial, password or other sensitive personal information was not accessed. Bell takes swift action to protect vulnerable systems. The business has contacted the Office of the Privacy Commissioner and has been closely collaborating with the RCMP cybercrime unit in its investigation.

Ailogo

Bell Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Bell

Incidents vs Telecommunications Industry Average (This Year)

Bell has 44.44% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Bell has 14.53% fewer incidents than the average of all companies with at least one recorded incident.

Incident Types Bell vs Telecommunications Industry Avg (This Year)

Bell reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Bell (X = Date, Y = Severity)

Bell cyber incidents detection timeline including parent company and subsidiaries

Bell Company Subsidiaries

SubsidiaryImage

We advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investing to create a better today and a better tomorrow by supporting the social and economic prosperity of our communities. This includes the Bell Let's Talk initiative, which promotes Canadian mental health with national awareness and anti-stigma campaigns like Bell Let's Talk Day and significant Bell funding of community care and access, research and workplace initiatives throughout the country. To learn more, please visit Bell.ca/LetsTalk

Loading...
similarCompanies

Bell Similar Companies

ACN is the leading direct selling telecommunications and essential services provider. ACN Inc. was founded in 1993 by four entrepreneurs and is now operating in North America. ACN offers essential products and services that people use every day, while also offering a powerful business ownership oppo

(Formerly etisalat UAE) For more than four decades, we have connected people and now we’ve evolved to become the digital telco of the future. Our mission is to grow, transform and excel as the region’s technology leader while enhancing digital customer experience and operation agility. e& UAE offe

Telmex

TELMEX, la empresa líder de telecomunicaciones y servicios TI en México, ha realizado importantes inversiones para desarrollar la plataforma tecnológica más robusta y vanguardista del país, que le permite ofrecer la más amplia gama de soluciones, con los mayores estándares de calidad, seguridad, con

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives.  With stc, You will always be empowered to focus on delivering what’s next through collaborati

AT&T

We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

Idea Cellular Ltd

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

Reliance Communications

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

Ciena

Ciena (NYSE:CIEN) is the global leader in high-speed connectivity. We build advanced networks to support exponential growth in bandwidth demand—empowering our customers, partners, and communities to thrive in the AI era. With unparalleled expertise and innovation, our networking systems, interconnec

TELUS

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and

newsone

Bell CyberSecurity News

March 19, 2026 11:35 PM
Why Bell Potter is bullish on this ASX cybersecurity stock with 44% upside

a group of three cybersecurity experts stand with satisfied looks on their faces with one holding a laptop computer while he group stands in front of a...

March 19, 2026 11:00 PM
Why Bell Potter is bullish on this ASX cybersecurity stock with 44% upside

This ASX cybersecurity stock could be worth a closer look according to analysts at Bell Potter. Here's what the broker is saying...

March 11, 2026 01:52 PM
Bell Cyber launches new CyberShield Connect managed service for SMEs

Bell Canada's Bell Cyber division has launched a new fully-managed cybersecurity solutions for Canadian SMEs called CyberShield Connect, powered by the...

February 27, 2026 08:00 AM
Bell invests $1 million in McKenna Institute to strengthen Canada's cybersecurity talent pipeline

New partnership expands the McKenna Institute's role in developing job‑ready cybersecurity talent in New Brunswick, with Bell Cyber scaling...

February 27, 2026 08:00 AM
Cyber, AI labour shortages lead to $1-million Bell investment in University of New Brunswick

A shortage in artificial intelligence and cybersecurity experts has led to a partnership between the University of New Brunswick and Bell...

February 27, 2026 08:00 AM
Bell invests $1 million in McKenna Institute to strengthen Canada's cybersecurity talent pipeline

Bell invests $1 million in McKenna Institute to strengthen Canada's cybersecurity talent pipeline ... FREDERICTON, NB, Feb. 27, 2026 /CNW/ - Bell...

February 27, 2026 08:00 AM
Bell invests $1 million in McKenna Institute to strengthen Canada’s cybersecurity talent pipeline

New partnership expands the McKenna Institute's role in developing job‑ready cybersecurity talent in New Brunswick, with Bell Cyber scaling...

February 20, 2026 08:00 AM
Bell Cyber and Radware Expand AI-driven, Cloud-Delivered Security Services

Bell Cyber and Radware are launching a unified, AI-driven managed security service to enhance protection against sophisticated cyberattacks...

February 06, 2026 08:00 AM
Microsoft appoints 'Engineering Quality Czar'; CEO Satya Nadella to employees in memo: I have asked Charl

Microsoft CEO Satya Nadella has shuffled two of his top lieutenants in a move that puts engineering quality and cybersecurity front and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Bell CyberSecurity History Information

Official Website of Bell

The official website of Bell is https://letstalk.bell.ca/en/.

Bell’s AI-Generated Cybersecurity Score

According to Rankiteo, Bell’s AI-generated cybersecurity score is 515, reflecting their Critical security posture.

How many security badges does Bell’ have ?

According to Rankiteo, Bell currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Bell been affected by any supply chain cyber incidents ?

According to Rankiteo, Bell has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Bell have SOC 2 Type 1 certification ?

According to Rankiteo, Bell is not certified under SOC 2 Type 1.

Does Bell have SOC 2 Type 2 certification ?

According to Rankiteo, Bell does not hold a SOC 2 Type 2 certification.

Does Bell comply with GDPR ?

According to Rankiteo, Bell is not listed as GDPR compliant.

Does Bell have PCI DSS certification ?

According to Rankiteo, Bell does not currently maintain PCI DSS compliance.

Does Bell comply with HIPAA ?

According to Rankiteo, Bell is not compliant with HIPAA regulations.

Does Bell have ISO 27001 certification ?

According to Rankiteo,Bell is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Bell

Bell operates primarily in the Telecommunications industry.

Number of Employees at Bell

Bell employs approximately 33,894 people worldwide.

Subsidiaries Owned by Bell

Bell presently has no subsidiaries across any sectors.

Bell’s LinkedIn Followers

Bell’s official LinkedIn profile has approximately 363,183 followers.

NAICS Classification of Bell

Bell is classified under the NAICS code 517, which corresponds to Telecommunications.

Bell’s Presence on Crunchbase

No, Bell does not have a profile on Crunchbase.

Bell’s Presence on LinkedIn

Yes, Bell maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bell.

Cybersecurity Incidents Involving Bell

As of April 02, 2026, Rankiteo reports that Bell has experienced 4 cybersecurity incidents.

Number of Peer and Competitor Companies

Bell has an estimated 10,042 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Bell ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does Bell detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with bell takes swift action to protect vulnerable systems., and law enforcement notified with the business has contacted the office of the privacy commissioner and has been closely collaborating with the rcmp cybercrime unit in its investigation., and third party assistance with cybersecurity experts, and communication strategy with notifications to affected individuals, and communication strategy with breach notifications sent to affected individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Bell Customer Data Breach

Description: Hackers have illegally obtained customer information, primarily subscriber names and e-mail addresses.

Type: Data Breach

Incident : Data Breach

Title: Bell Data Breach

Description: Bell suffered from a data breach incident that exposed 1.9 million customer e-mail addresses, and 700 names and phone numbers were illegally accessed. Financial, password or other sensitive personal information was not accessed. Bell takes swift action to protect vulnerable systems.

Type: Data Breach

Incident : Data Breach, Ransomware

Title: Cyberattack on Bell Ambulance Exposes Data of Over 235,000 Individuals

Description: Bell Ambulance, Wisconsin’s largest ambulance provider, confirmed a data breach affecting 237,830 individuals after hackers infiltrated its systems in early 2025. The attack resulted in the theft of sensitive information, including Social Security numbers, driver’s license details, financial accounts, medical records, and health insurance data.

Date Detected: 2025-02-13

Date Publicly Disclosed: 2025-04

Type: Data Breach, Ransomware

Threat Actor: Medusa ransomware gang

Motivation: Financial gain (ransom)

Incident : Ransomware

Title: Bell Ambulance Suffers Major Data Breach in Medusa Ransomware Attack

Description: In February 2025, Wisconsin-based Bell Ambulance, a leading emergency medical services provider, fell victim to a cyberattack by the Medusa ransomware-as-a-service operation. The breach compromised sensitive data belonging to 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information. The attack traces back to a 2024 ransom demand by Medusa, which sought $400,000 in exchange for not leaking the stolen 219 GB of data.

Date Detected: 2025-02

Date Publicly Disclosed: 2025-04

Type: Ransomware

Threat Actor: Medusa ransomware-as-a-service operation

Motivation: Financial gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach BEL23124522

Data Compromised: Customer e-mail addresses, Subscriber names, Phone numbers

Incident : Data Breach BEL122427922

Data Compromised: 1.9 million customer e-mail addresses, 700 names and phone numbers

Incident : Data Breach, Ransomware BEL1773239202

Data Compromised: Sensitive personal and medical information

Identity Theft Risk: High

Payment Information Risk: High

Incident : Ransomware BEL1773383385

Data Compromised: Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information

Identity Theft Risk: High

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer E-Mail Addresses, Subscriber Names, Phone Numbers, , Email Addresses, Names, Phone Numbers, , Social Security Numbers, Driver’S License Details, Financial Accounts, Medical Records, Health Insurance Data, , Social Security Numbers, Financial Account Details, Driver’S License Numbers, Medical Records, Health Insurance Information and .

Which entities were affected by each incident ?

Incident : Data Breach BEL23124522

Entity Name: Bell

Entity Type: Company

Industry: Telecommunications

Customers Affected: 100000

Incident : Data Breach BEL122427922

Entity Name: Bell

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: 1.9 million customer e-mails, 700 names and phone numbers

Incident : Data Breach, Ransomware BEL1773239202

Entity Name: Bell Ambulance

Entity Type: Ambulance Service Provider

Industry: Healthcare, Emergency Services

Location: Milwaukee, Wisconsin, USA

Size: 750+ employees, 140,000 calls annually

Customers Affected: 237,830

Incident : Ransomware BEL1773383385

Entity Name: Bell Ambulance

Entity Type: Emergency medical services provider

Industry: Healthcare

Location: Wisconsin, USA

Customers Affected: 237,830

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach BEL122427922

Incident Response Plan Activated: Bell takes swift action to protect vulnerable systems.

Law Enforcement Notified: The business has contacted the Office of the Privacy Commissioner and has been closely collaborating with the RCMP cybercrime unit in its investigation.

Incident : Data Breach, Ransomware BEL1773239202

Third Party Assistance: Cybersecurity experts

Communication Strategy: Notifications to affected individuals

Incident : Ransomware BEL1773383385

Communication Strategy: Breach notifications sent to affected individuals

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Bell takes swift action to protect vulnerable systems..

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach BEL23124522

Type of Data Compromised: Customer e-mail addresses, Subscriber names, Phone numbers

Number of Records Exposed: 1900000

Incident : Data Breach BEL122427922

Type of Data Compromised: Email addresses, Names, Phone numbers

Number of Records Exposed: 1.9 million email addresses, 700 names and phone numbers

Sensitivity of Data: Non-sensitive (no financial, password, or other sensitive personal information)

Personally Identifiable Information: NamesPhone numbers

Incident : Data Breach, Ransomware BEL1773239202

Type of Data Compromised: Social security numbers, Driver’s license details, Financial accounts, Medical records, Health insurance data

Number of Records Exposed: 237,830

Sensitivity of Data: High

Data Exfiltration: 219 GB of stolen data

Personally Identifiable Information: Yes

Incident : Ransomware BEL1773383385

Type of Data Compromised: Social security numbers, Financial account details, Driver’s license numbers, Medical records, Health insurance information

Number of Records Exposed: 237,830

Sensitivity of Data: High

Data Exfiltration: 219 GB of data

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach, Ransomware BEL1773239202

Ransom Demanded: $400,000

Ransomware Strain: Medusa

Data Exfiltration: Yes

Incident : Ransomware BEL1773383385

Ransom Demanded: $400,000

Ransomware Strain: Medusa

Data Exfiltration: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach BEL122427922

Regulatory Notifications: The business has contacted the Office of the Privacy Commissioner.

Incident : Ransomware BEL1773383385

Regulatory Notifications: Breach notices filed with Maine regulators

References

Where can I find more information about each incident ?

Incident : Data Breach, Ransomware BEL1773239202

Source: FBI Advisory

Incident : Ransomware BEL1773383385

Source: Maine regulators breach notices

Incident : Ransomware BEL1773383385

Source: FBI report on Medusa ransomware

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: FBI Advisory, and Source: Maine regulators breach notices, and Source: FBI report on Medusa ransomware.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach, Ransomware BEL1773239202

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications to affected individuals and Breach notifications sent to affected individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach, Ransomware BEL1773239202

Customer Advisories: Notifications sent to affected individuals

Incident : Ransomware BEL1773383385

Customer Advisories: Breach notifications sent to affected individuals

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notifications sent to affected individuals and Breach notifications sent to affected individuals.

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity experts.

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was $400,000.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Medusa ransomware gang and Medusa ransomware-as-a-service operation.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-02-13.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-04.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Customer e-mail addresses, Subscriber names, Phone numbers, , 1.9 million customer e-mail addresses, 700 names and phone numbers, , Sensitive personal and medical information, Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records and and health insurance information.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity experts.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 700 names and phone numbers, Sensitive personal and medical information, Phone numbers, Customer e-mail addresses, 1.9 million customer e-mail addresses, Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information and Subscriber names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.4M.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $400,000.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are FBI Advisory, FBI report on Medusa ransomware and Maine regulators breach notices.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Notifications sent to affected individuals and Breach notifications sent to affected individuals.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=bell' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge