Company Details
diebold
20,251
344,147
5415
DieboldNixdorf.com
0
DIE_1559874
In-progress


Diebold Nixdorf Vendor Cyber Rating & Cyber Score
DieboldNixdorf.comDiebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial institutions and a majority of the top 25 global retailers, Diebold Nixdorf delivers unparalleled services and technology that power the daily operations and consumer experience of financial institutions and retailers around the world.
Company Details
diebold
20,251
344,147
5415
DieboldNixdorf.com
0
DIE_1559874
In-progress
Between 650 and 699

Diebold Nixdorf Global Score (TPRM)XXXX

Description: Diebold Nixdorf Hit by ProLock Ransomware Attack in April Diebold Nixdorf, the largest ATM provider in the U.S. and a major global player with over a third of the worldwide market, confirmed a ransomware attack in April that disrupted its corporate operations. The company disclosed the incident this week, stating that customer networks remained unaffected and that the attack had been contained. Security researcher Brian Krebs reported that the attackers deployed ProLock ransomware, a successor to the PwndLocker kit. ProLock encrypts files by appending malicious executables, sometimes layering them to complicate recovery. Victims are directed to a Tor-based payment portal via a ransom note, with demands averaging 60 BTC (approximately $570,000) in early April. Diebold Nixdorf confirmed it did not pay the ransom. The company detected the infection in late April and stated that the malware’s spread had been halted. Leadership reportedly contacted customers directly to inform them of the breach and mitigation efforts. While ransomware attacks often promise decryption tools upon payment, many victims never receive them, leaving data permanently inaccessible.
Description: Independent researcher Matt Burch disclosed vulnerabilities in Diebold Nixdorf's ATM security solution, Vynamic Security Suite (VSS), during the Defcon security conference. The findings showed potential for attackers to circumvent hard drive encryption and gain full control over the machines if the patches are not applied, posing significant risks of financial data breach and unauthorized cash withdrawals. The unencrypted Linux partition used in the dual-boot configuration of the ATMs exacerbated the issue, allowing the exploitation path. Although Diebold has patched the issues, Burch suggested that patches might not be consistently deployed across all ATMs.
Description: Diebold Nixdorf admitted a cyber attack on a service provider in a letter to customers, this provided optimization data for cash distribution to the ATMs. It is uncertain who was responsible for the attack on servers and other components at the data center utilized by the service provider Planfocus. Aside from not being impacted, neither customer data nor statistics data have been lost as of this writing, as far as is known. A service provider's data center, which houses the CCO systems, was the target of the attack. Only the attack, not the cash supply itself, could have put the optimization in jeopardy.


No incidents recorded for Diebold Nixdorf in 2026.
No incidents recorded for Diebold Nixdorf in 2026.
No incidents recorded for Diebold Nixdorf in 2026.
Diebold Nixdorf cyber incidents detection timeline including parent company and subsidiaries

Diebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial institutions and a majority of the top 25 global retailers, Diebold Nixdorf delivers unparalleled services and technology that power the daily operations and consumer experience of financial institutions and retailers around the world.


Samsung SDS provides cloud computing and digital logistics services. We build an optimized cloud environment with Samsung Cloud Platform specialized for businesses, provide all-in-one management service based on 38 years of expertise in each industry, and boost work efficiency and customer service w

HCLTech is a global technology company, home to more than 226,300 people across 60 countries, delivering industry-leading capabilities centered around AI, digital, engineering, cloud and software, powered by a broad portfolio of technology services and products. We work with clients across all major

Somos a Algar Tech CX. Com 26 anos de mercado, atuamos como parceira de negócio para a transformação digital de grandes corporações. Nosso portfólio possui serviços de Relacionamento com o Cliente, que visam melhorar a experiência dos consumidores. Somos mais de 7 mil associados que trabalham com o

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

Zensar stands out as a premier technology consulting and services company, embracing an ‘experience-led everything’ philosophy. We are creators, thinkers, and problem solvers passionate about designing digital experiences that are engineered into scale-ready products, services, and solutions to deli
Atos Group is a global leader in digital transformation with c. 67,000 employees and annual revenue of c. €10 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is com
At CACI International Inc (NYSE: CACI), our 25,000 talented and dynamic employees are ever vigilant in delivering distinctive expertise and technology to meet our customers’ greatest challenges in national security. We are a company of good character, relentless innovation, and long-standing excelle

We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosystem of partners, we continuously improve
Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a
.png)
The end of an earnings season can be a great time to discover new stocks and assess how companies are handling the current business...
The rise in malware-based jackpotting attacks in 2024 was unprecedented, and although the frequency in 2025 has moderated, it remains higher...
A grand jury in Nebraska has indicted 54 people for allegedly participating in an ATM jackpotting scheme.
Fifty-four individuals tied to the Tren de Aragua gang face charges for using Ploutus malware to drain millions from community banks and...
Wrapping up Q3 earnings, we look at the numbers and key takeaways for the hardware & infrastructure stocks, including IonQ NYSE:IONQ and its...
Discover Martin Bally's net worth, age, family details, and cybersecurity career milestones in this detailed biography, plus insights on his...
Quarterly earnings results are a good time to check in on a company's progress, especially compared to its peers in the same sector.
ATM malware continues to be one of the most persistent and costly challenges for financial institutions worldwide. Here's how to stay on top...
ATM jackpotting drains machines of cash and raises reputational concerns. Crowe cybersecurity specialists offer proactive and mitigating...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Diebold Nixdorf is http://DieboldNixdorf.com.
According to Rankiteo, Diebold Nixdorf’s AI-generated cybersecurity score is 672, reflecting their Weak security posture.
According to Rankiteo, Diebold Nixdorf currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Diebold Nixdorf has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Diebold Nixdorf is not certified under SOC 2 Type 1.
According to Rankiteo, Diebold Nixdorf does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Diebold Nixdorf is not listed as GDPR compliant.
According to Rankiteo, Diebold Nixdorf does not currently maintain PCI DSS compliance.
According to Rankiteo, Diebold Nixdorf is not compliant with HIPAA regulations.
According to Rankiteo,Diebold Nixdorf is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Diebold Nixdorf operates primarily in the IT Services and IT Consulting industry.
Diebold Nixdorf employs approximately 20,251 people worldwide.
Diebold Nixdorf presently has no subsidiaries across any sectors.
Diebold Nixdorf’s official LinkedIn profile has approximately 344,147 followers.
Diebold Nixdorf is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Diebold Nixdorf has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/diebold-nixdorf.
Yes, Diebold Nixdorf maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/diebold.
As of March 28, 2026, Rankiteo reports that Diebold Nixdorf has experienced 3 cybersecurity incidents.
Diebold Nixdorf has an estimated 39,816 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Vulnerability and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with letter to customers, and remediation measures with patches applied, and containment measures with malware spread halted, and communication strategy with direct customer notifications..
Title: Cyber Attack on Diebold Nixdorf's Service Provider
Description: Diebold Nixdorf admitted a cyber attack on a service provider in a letter to customers, which provided optimization data for cash distribution to ATMs. The attack targeted a service provider's data center, which houses the CCO systems. The attack did not compromise customer data or statistics data.
Type: Cyber Attack
Title: Vulnerabilities in Diebold Nixdorf ATM Security Suite
Description: Independent researcher Matt Burch disclosed vulnerabilities in Diebold Nixdorf's ATM security solution, Vynamic Security Suite (VSS), during the Defcon security conference. The findings showed potential for attackers to circumvent hard drive encryption and gain full control over the machines if the patches are not applied, posing significant risks of financial data breach and unauthorized cash withdrawals. The unencrypted Linux partition used in the dual-boot configuration of the ATMs exacerbated the issue, allowing the exploitation path. Although Diebold has patched the issues, Burch suggested that patches might not be consistently deployed across all ATMs.
Type: Vulnerability Exploitation
Attack Vector: Hard Drive Encryption Bypass
Vulnerability Exploited: Unencrypted Linux Partition in Dual-Boot Configuration
Motivation: Financial Data BreachUnauthorized Cash Withdrawals
Title: Diebold Nixdorf Hit by ProLock Ransomware Attack
Description: Diebold Nixdorf, the largest ATM provider in the U.S. and a major global player, confirmed a ransomware attack in April that disrupted its corporate operations. The attack was contained, and customer networks remained unaffected.
Date Detected: 2020-04-01
Date Publicly Disclosed: 2020-05-01
Type: Ransomware
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: CCO systems

Data Compromised: Financial Data
Systems Affected: ATMs

Systems Affected: Corporate operations
Operational Impact: Disruption of corporate operations
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Financial Data.

Entity Name: Diebold Nixdorf
Entity Type: Company
Industry: Financial Services

Entity Name: Planfocus
Entity Type: Service Provider
Industry: Technology

Entity Name: Diebold Nixdorf
Entity Type: Company
Industry: Financial Services

Entity Name: Diebold Nixdorf
Entity Type: Corporation
Industry: Financial Services (ATM Provider)
Location: Global (Headquartered in the U.S.)
Size: Large (over a third of the worldwide ATM market)

Communication Strategy: Letter to customers

Remediation Measures: Patches Applied

Containment Measures: Malware spread halted
Communication Strategy: Direct customer notifications

Type of Data Compromised: Financial Data
Data Encryption: Hard Drive Encryption

Data Encryption: Files encrypted by ProLock ransomware
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patches Applied.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by malware spread halted.

Ransom Demanded: 60 BTC (~$570,000)
Ransom Paid: No
Ransomware Strain: ProLock
Data Encryption: Yes

Source: Diebold Nixdorf

Source: Defcon Security Conference

Source: Brian Krebs (Security Researcher)

Source: Diebold Nixdorf Disclosure
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Diebold Nixdorf, and Source: Defcon Security Conference, and Source: Brian Krebs (Security Researcher), and Source: Diebold Nixdorf Disclosure.

Investigation Status: Contained
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Letter To Customers and Direct customer notifications.

Customer Advisories: Direct customer notifications regarding the breach and mitigation efforts
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Direct customer notifications regarding the breach and mitigation efforts.

Root Causes: Unencrypted Linux Partition in Dual-Boot Configuration
Corrective Actions: Patches Applied
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patches Applied.
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was 60 BTC (~$570,000).
Most Recent Incident Detected: The most recent incident detected was on 2020-04-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-05-01.
Most Significant Data Compromised: The most significant data compromised in an incident was Financial Data.
Most Significant System Affected: The most significant system affected in an incident was CCO systems and and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Malware spread halted.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Financial Data.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 60 BTC (~$570,000).
Highest Ransom Paid: The highest ransom paid in a ransomware incident was No.
Most Recent Source: The most recent source of information about an incident are Defcon Security Conference, Diebold Nixdorf, Diebold Nixdorf Disclosure and Brian Krebs (Security Researcher).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Contained.
Most Recent Customer Advisory: The most recent customer advisory issued was an Direct customer notifications regarding the breach and mitigation efforts.
.png)
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.
Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.