Company Details
dnv
22,475
619,387
92219
dnv.com
0
DNV_1524730
In-progress


DNV Vendor Cyber Rating & Cyber Score
dnv.comDNV is the independent expert in risk management and assurance, operating in more than 100 countries. Through its broad experience and deep expertise DNV advances safety and sustainable performance, sets industry benchmarks, and inspires and invents solutions. Whether assessing a new ship design, optimizing the performance of a wind farm, analyzing sensor data from a gas pipeline or certifying a food company’s supply chain, DNV enables its customers and their stakeholders to make critical decisions with confidence. Driven by its purpose, to safeguard life, property, and the environment, DNV helps tackle the challenges and global transformations facing its customers and the world today and is a trusted voice for many of the world’s most successful and forward-thinking companies. DNV uses cookies. For more information, please visit https://www.dnv.com/privacy/change-cookie-settings.html
Company Details
dnv
22,475
619,387
92219
dnv.com
0
DNV_1524730
In-progress
Between 700 and 749

DNV Global Score (TPRM)XXXX

Description: In January 2023, Oslo-based DNV a leading global maritime classification society and risk management provider fell victim to a ransomware attack on January 7, forcing the shutdown of IT servers linked to its ShipManager system. The incident disrupted operations for 70 customers, impacting approximately 1,000 vessels reliant on the system for navigation, safety, and compliance management. DNV initiated daily communications with affected clients, providing updates from ongoing forensic investigations. While the attack caused significant operational disruptions potentially halting vessel management, logistical coordination, and regulatory compliance the company did not confirm whether sensitive customer or proprietary data was exfiltrated. The shutdown of critical IT infrastructure posed risks to maritime safety, supply chain continuity, and DNV’s reputation as a trusted industry authority. Recovery efforts focused on restoring systems while mitigating further propagation of the ransomware.
Description: Major Ransomware Attack Disrupts Global Supply Chain Operations A large-scale ransomware attack has targeted DNV, a leading provider of maritime software solutions, forcing the company to shut down key IT systems affecting 70 ship management clients worldwide. The incident, detected on January 7, 2025, disrupted operations for vessel owners and operators relying on DNV’s ShipManager software, which handles critical functions such as navigation, maintenance, and compliance. DNV confirmed the attack involved LockBit ransomware, a notorious strain known for extorting high-profile victims. While the company stated that no ransom demand had been received as of the latest update, investigations are ongoing to assess the full scope of the breach. Initial reports indicate that backup systems were activated, minimizing downtime, but some clients experienced delays in accessing real-time vessel data. The attack highlights the growing vulnerability of maritime infrastructure to cyber threats, a sector increasingly targeted due to its reliance on interconnected digital systems. DNV, headquartered in Norway, serves over 300,000 vessels globally, making this incident one of the most significant disruptions to maritime cybersecurity in recent years. Authorities, including Norwegian cybersecurity agencies, are assisting in the response, though no attribution to a specific threat actor has been confirmed. The incident underscores the escalating risks to supply chains, where a single breach can cascade across multiple industries. Further details on data exposure and recovery timelines are expected in the coming days.


No incidents recorded for DNV in 2026.
No incidents recorded for DNV in 2026.
No incidents recorded for DNV in 2026.
DNV cyber incidents detection timeline including parent company and subsidiaries

DNV is the independent expert in risk management and assurance, operating in more than 100 countries. Through its broad experience and deep expertise DNV advances safety and sustainable performance, sets industry benchmarks, and inspires and invents solutions. Whether assessing a new ship design, optimizing the performance of a wind farm, analyzing sensor data from a gas pipeline or certifying a food company’s supply chain, DNV enables its customers and their stakeholders to make critical decisions with confidence. Driven by its purpose, to safeguard life, property, and the environment, DNV helps tackle the challenges and global transformations facing its customers and the world today and is a trusted voice for many of the world’s most successful and forward-thinking companies. DNV uses cookies. For more information, please visit https://www.dnv.com/privacy/change-cookie-settings.html


Neutral, independent third party For more than 150 years, TÜV Rheinland has stood for ensuring quality, safety, and efficiency in conjunction with people, the environment, and technology. As a neutral, independent third party, we test, accompany, develop, promote and certify products, plants, proc

For 100 years, DEKRA has been a trusted name in safety. Founded in 1925 with the original goal of improving road safety through vehicle inspections, DEKRA has grown to become the world's largest independent, non-listed expert organization in the field of testing, inspection, and certification. Today

TÜV SÜD is the trusted partner of choice for safety, security and sustainability solutions. Our community of experts is passionate about technology and united by the belief that technology should better people’s lives. We work alongside our customers to anticipate and capitalize on technological d
.png)
Global identity security technology vendor ARCON and DNV Cyber formed a new partnership that will strengthen ARCON's presence in the Nordics...
Moxa Network and Communication Devices Certified With DNV Type Approval of Security Profile 2 and IEC 61162-460. Moxa's EDR-G9010 and EDR-8010 Series...
CyberOwl, a DNV company, uncovered a sophisticated phishing and malware campaign targeting Iranian oil and gas trading organizations,...
Maritime cybersecurity is not just a technical challenge, but a strategic imperative that affects safety, operations, and reputation.
Furuno successfully completed the compliance assessment for DNV security profile 1 to meet the requirements specified in IACS UR E27.
The European Solar Manufacturing Council (ESMC) urges immediate EU action to address cybersecurity threats posed by Chinese-made PV...
The energy transition is not secure without the safe proliferation of AI, argues Shaun Reardon at DNV. Across the energy industry,...
Ship systems are integrated, making vessels potentially far more vulnerable to cyber-attack, a DNV expert said this week.
DNV's annual survey and analysis finds that even as the energy industry becomes more mature in its cybersecurity posture, it needs to continue to strengthen...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DNV is https://www.dnv.com.
According to Rankiteo, DNV’s AI-generated cybersecurity score is 748, reflecting their Moderate security posture.
According to Rankiteo, DNV currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DNV has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, DNV is not certified under SOC 2 Type 1.
According to Rankiteo, DNV does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DNV is not listed as GDPR compliant.
According to Rankiteo, DNV does not currently maintain PCI DSS compliance.
According to Rankiteo, DNV is not compliant with HIPAA regulations.
According to Rankiteo,DNV is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DNV operates primarily in the Public Safety industry.
DNV employs approximately 22,475 people worldwide.
DNV presently has no subsidiaries across any sectors.
DNV’s official LinkedIn profile has approximately 619,387 followers.
DNV is classified under the NAICS code 92219, which corresponds to Other Justice, Public Order, and Safety Activities.
No, DNV does not have a profile on Crunchbase.
Yes, DNV maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dnv.
As of April 04, 2026, Rankiteo reports that DNV has experienced 2 cybersecurity incidents.
DNV has an estimated 2,144 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with shut down it servers connected to shipmanager system, and communication strategy with daily updates to 70 affected customers on forensic investigation findings, and third party assistance with norwegian cybersecurity agencies, and containment measures with shut down key it systems; activated backup systems..
Title: DNV Ransomware Attack (January 2023)
Description: In January 2023, Oslo-based DNV – one of the world’s largest maritime organizations – was hit with ransomware on the evening of January 7 and was forced to shut down the IT servers connected to their ShipManager system. DNV is communicating daily with all 70 affected customers to update them on findings of the ongoing forensic investigations. In total, around 1000 vessels are affected.
Date Detected: 2023-01-07
Date Publicly Disclosed: 2023-01-07
Type: Ransomware
Title: Major Ransomware Attack Disrupts Global Supply Chain Operations
Description: A large-scale ransomware attack has targeted DNV, a leading provider of maritime software solutions, forcing the company to shut down key IT systems affecting 70 ship management clients worldwide. The incident disrupted operations for vessel owners and operators relying on DNV’s ShipManager software, which handles critical functions such as navigation, maintenance, and compliance.
Date Detected: 2025-01-07
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: ShipManager system
Operational Impact: 1000 vessels affected; IT servers shut down

Systems Affected: ShipManager software (navigation, maintenance, compliance systems)
Operational Impact: Disrupted operations for vessel owners and operators; delays in accessing real-time vessel data

Entity Name: DNV
Entity Type: Organization
Industry: Maritime
Location: Oslo, Norway
Customers Affected: 70

Entity Name: DNV
Entity Type: Maritime software provider
Industry: Maritime/Supply Chain
Location: Norway
Customers Affected: 70 ship management clients

Incident Response Plan Activated: True
Containment Measures: Shut down IT servers connected to ShipManager system
Communication Strategy: Daily updates to 70 affected customers on forensic investigation findings

Third Party Assistance: Norwegian cybersecurity agencies
Containment Measures: Shut down key IT systems; activated backup systems
Third-Party Assistance: The company involves third-party assistance in incident response through Norwegian cybersecurity agencies.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by shut down it servers connected to shipmanager system, and shut down key it systems; activated backup systems.

Data Encryption: True

Ransom Demanded: None received as of latest update
Ransomware Strain: LockBit

Lessons Learned: Growing vulnerability of maritime infrastructure to cyber threats; escalating risks to supply chains due to interconnected digital systems
Key Lessons Learned: The key lessons learned from past incidents are Growing vulnerability of maritime infrastructure to cyber threats; escalating risks to supply chains due to interconnected digital systems.

Investigation Status: Ongoing (as of January 2023 disclosure)

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Daily updates to 70 affected customers on forensic investigation findings.

Customer Advisories: Daily updates provided to 70 affected customers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Daily updates provided to 70 affected customers.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Norwegian cybersecurity agencies.
Last Ransom Demanded: The amount of the last ransom demanded was None received as of latest update.
Most Recent Incident Detected: The most recent incident detected was on 2023-01-07.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-01-07.
Most Significant System Affected: The most significant system affected in an incident was ShipManager system and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Norwegian cybersecurity agencies.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Shut down IT servers connected to ShipManager system and Shut down key IT systems; activated backup systems.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was None received as of latest update.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Growing vulnerability of maritime infrastructure to cyber threats; escalating risks to supply chains due to interconnected digital systems.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as of January 2023 disclosure).
Most Recent Customer Advisory: The most recent customer advisory issued was an Daily updates provided to 70 affected customers.
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.