BT Group Company Cyber Security Posture

bt.com

Weโ€™re one of the worldโ€™s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, connections are becoming even more important to everyday life. Today, thatโ€™s truer than ever. The connections we make are helping solve the worldโ€™s biggest challenges such as the global pandemic, climate change and cyber security. Through the power of technology, weโ€™re supporting customers to live, work and play together better.

BT Group Company Details

Linkedin ID:

bt

Employees number:

75585 employees

Number of followers:

775307.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

bt.com

IP Addresses:

183

Company ID:

BT _1397370

Scan Status:

In-progress

AI scoreBT Group Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreBT Group Global Score
blurone
Ailogo

BT Group Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

BT Group Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
EEData Leak85305/2018EE410251223Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users. According to reports, EE, the massive British mobile network, left a crucial code repository on an open-source tool that is password-protected by default. Malicious hackers can use this to examine the source code and find weaknesses in it. An attacker might use the keys' accessibility to examine the employee payment systems' code and find weaknesses that they could use for malevolent intent.

BT GroupRansomware100512/2024BT000120524Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack.

BT Group Company Subsidiaries

SubsidiaryImage

Weโ€™re one of the worldโ€™s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, connections are becoming even more important to everyday life. Today, thatโ€™s truer than ever. The connections we make are helping solve the worldโ€™s biggest challenges such as the global pandemic, climate change and cyber security. Through the power of technology, weโ€™re supporting customers to live, work and play together better.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=bt' -H 'apikey: YOUR_API_KEY_HERE'
newsone

BT Group Cyber Security News

2025-06-23T07:00:00.000Z
BT Group joins CHERI Alliance to advance cybersecurity innovation

CHERI technology offers a transformative approach to preventing memory safety vulnerabilities, which are the root cause of certain cyberattacks,ย ...

2025-01-22T08:00:00.000Z
BT's Security Chief: Why AI Poses Such a Risk to Security

As AI continues to create new security vulnerabilities, BT Group โ€“ Britain's largest telecommunications provider โ€“ has revealed it processesย ...

2025-06-23T15:37:59.000Z
BT joins CHERI Alliance to boost hardware-based cybersecurity defenses

BT has become the latest brand to join the CHERI Alliance, the group aiming to enhance cybersecurity through hardware memory safetyย ...

2024-09-12T07:00:00.000Z
BT identifying 2,000 signals a second indicating possible cyber-attacks

BT identifies 2,000 signals indicating a potential cyber-attack across its networks every second, it has revealed, amid an โ€œAI armsโ€ raceย ...

2024-12-05T08:00:00.000Z
Telecom Giant BT Group Hit by Black Basta Ransomware

British telecommunications giant BT Group has fallen victim to a ransomware attack launched by the notorious Black Basta gang.

2024-09-27T07:00:00.000Z
BT Group Detect 200m Daily Cyber Threats

Speaking during a keynote presentation at the Secure Tomorrow event, BT Group CEO Allison Kirkby and BT Business chief Bas Burger explained thatย ...

2024-12-06T08:00:00.000Z
BT Groupโ€™s Conferencing division attacked by Black Basta ransomware gang

BT Group has confirmed it is responding to an attempt to breach one of its business divisions, after the Black Basta ransomware group listed theย ...

2024-09-12T07:00:00.000Z
Britainโ€™s one of the largest mobile services providers BT Group raises cybersecurity alarm: โ€œ...every 90

BT Group, which is one of Britain's largest mobile services providers, has claimed it has spotted 2,000 signals of potential cyber-attacksย ...

2024-09-12T07:00:00.000Z
BT spots 2,000 potential attacks on its network a second

IPSWICH, England, Sept 12 (Reuters) - Britain's BT (BT.L) , opens new tab said it was spotting 2,000 signals of potential cyber-attacks acrossย ...

similarCompanies

BT Group Similar Companies

Idea Cellular Ltd

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

Orange RDC

Orange RDC est lโ€šร„รดun des principaux opโˆšยฉrateurs de tโˆšยฉlโˆšยฉcommunication de la RDC qui offre des solutions globales de tโˆšยฉlโˆšยฉcommunication dans le domaine du fixe, du mobile, de lโ€šร„รดinternet et des donnโˆšยฉes au service des particuliers et des entreprises. Elle est l'une des marques prโˆšยฉfโˆšยฉrโˆšยฉes de la

Founded in 2004, OPPO is one of the world's leading innovators of smart devices. With operations in over 60 countries and regions, OPPO's more than 290,000 points of sales and 1,900 official service centers share the beauty of technology with users all over the world. To forward our vision of a bett

T-Mobile

T-Mobile US, Inc. (NASDAQ: TMUS) is Americaโ€™s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobileโ€™s customers benefit from its unmatched combination of value and quality, unwavering obsession with off

Airtel Business

The B2B arm of Bharti Airtel, we are India's leading provider of secure and reliable connectivity, technology, and communications solutions. Our vast network spans across India, the US, Europe, Africa, the Middle East, Asia-Pacific, and SAARC, enabling us to serve businesses of all sizes and industr

(Formerly etisalat UAE) For more than four decades, we have connected people and now weโ€šร„รดve evolved to become the digital telco of the future. Our mission is to grow, transform and excel as the regionโ€šร„รดs technology leader while enhancing digital customer experience and operation agility. e& UAE

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

BT Group CyberSecurity History Information

How many cyber incidents has BT Group faced?

Total Incidents: According to Rankiteo, BT Group has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at BT Group?

Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Data Leak.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: BT Group Ransomware Attack

Description: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack.

Type: Ransomware

Threat Actor: Black Basta group

Incident : Data Exposure

Title: EE Operator Code Repository Exposure

Description: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users.

Type: Data Exposure

Attack Vector: Exposed Default Password

Vulnerability Exploited: Default Password on Code Repository

Threat Actor: Unknown

Motivation: Unintentional Exposure

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware BT000120524

Data Compromised: financial data, organizational records, user and personal documents, NDAs, confidential information

Incident : Data Exposure EE410251223

Data Compromised: Source Code, Employee Payment Systems Code

Systems Affected: Code Repository

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.

Which entities were affected by each incident?

Incident : Ransomware BT000120524

Entity Type: Company

Incident : Data Exposure EE410251223

Entity Type: Telecommunications Company

Industry: Telecommunications

Location: UK

Customers Affected: Almost 30 million users

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware BT000120524

Type of Data Compromised: financial data, organizational records, user and personal documents, NDAs, confidential information

Data Exfiltration: True

Personally Identifiable Information: True

Incident : Data Exposure EE410251223

Type of Data Compromised: Source Code, Employee Payment Systems Code

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware BT000120524

Data Exfiltration: True

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Black Basta group and Unknown.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Code Repository.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge