
EE Company Cyber Security Posture
ee.co.ukEE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was the first European operator to surpass 14 million 4G customers in December 2015. We have more than 550 shops across the UK and weโre dedicated to making EE an outstanding place to work for our 13,000 employees. Our 4G coverage reaches 80% of the UK geography and we have plans to extend 4G geographic coverage to 95% by 2020. Weโve received extensive independent recognition, including being ranked the UK's best overall network by RootMetricsยฎ; Best Network at the 2015, 2016 and 2017 Mobile News Awards; Best Network at the Mobile Choice Consumer Awards 2016; Best Consumer Network at the 2015 & 2016 Mobile Industry Awards; as well as Fastest Network and Best Network Coverage at the 2017 uSwitch Mobile Awards.
EE Company Details
ee-uk
11299 employees
121061.0
517
Telecommunications
ee.co.uk
Scan still pending
EE_6851764
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

EE Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
EE Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
EE | Data Leak | 85 | 3 | 05/2018 | EE410251223 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users. According to reports, EE, the massive British mobile network, left a crucial code repository on an open-source tool that is password-protected by default. Malicious hackers can use this to examine the source code and find weaknesses in it. An attacker might use the keys' accessibility to examine the employee payment systems' code and find weaknesses that they could use for malevolent intent. | |||||||
BT Group | Ransomware | 100 | 5 | 12/2024 | BT000120524 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack. |
EE Company Subsidiaries

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was the first European operator to surpass 14 million 4G customers in December 2015. We have more than 550 shops across the UK and weโre dedicated to making EE an outstanding place to work for our 13,000 employees. Our 4G coverage reaches 80% of the UK geography and we have plans to extend 4G geographic coverage to 95% by 2020. Weโve received extensive independent recognition, including being ranked the UK's best overall network by RootMetricsยฎ; Best Network at the 2015, 2016 and 2017 Mobile News Awards; Best Network at the Mobile Choice Consumer Awards 2016; Best Consumer Network at the 2015 & 2016 Mobile Industry Awards; as well as Fastest Network and Best Network Coverage at the 2017 uSwitch Mobile Awards.
Access Data Using Our API

Get company history
.png)
EE Cyber Security News
8th E.DSO/EE-ISAC/ENCS/ENISA Cybersecurity Forum
ENISA in line with articles 6 and 10 of the Cybersecurity Act , prepared this guidance document on the skills and roles for the cybersecurity professionalsย ...
AI vs. AI: Both Friend and Foe in Cybersecurity
In his opening speech, Kaspersky CEO and founder Eugene Kaspersky, said, โWe are living in a world where it's very much AI vs. AIโa defence against attack.โ.
Meet GI's Cybersecurity Champion: Lim Ee Lin, Deputy Director, CISO & Governance, Agency Chief Information Security Officer, Home Team Science & Technology Agency (HTX), Singapore
Meet GI's Cybersecurity Champion: Lim Ee Lin, Deputy Director, CISO & Governance, Agency Chief Information Security Officer, Home Team Science &ย ...
Cybersecurity Legislation Driving SBOMs
The EU has taken a broader stance by pursuing cybersecurity legislation affecting all software developers and hardware manufacturers of digitalย ...
Memory Safety is Key to Addressing Cyber Security
The paper highlights why memory safety vulnerabilities are important: when combined with network communications or other malignant data, theyย ...
Automotive Cybersecurity: Attacks Keeps Growing
The yearly reports by Upstream are an excellent source to keep up with automotive cybersecurity trends. The 2025 Upstream Global Automotiveย ...
Meeting the EUโs Radio Equipment Directive (RED) Cybersecurity Standards
EU's latest Radio Equipment Directive (RED), including Regulation 2022/30/EU and EN 18031:2024, demands secure data storage, software update resilience, andย ...
Keysight Enhance Cybersecurity Through Expanded AI Network Visibility
Article By : Keysight Technologies ยท Category : AI; 2025-03-25 ยท Category : AI; 2025-03-25 ยท 2025-03-25; (0) Comments ยท Ask question of embedded. Keysight'sย ...
Deep Learning and the Future of Cybersecurity
As cyber threats continue to evolve in complexity and frequency, traditional cybersecurity measures often fall short in providing robust protection.

EE Similar Companies

BTCC Call Center
Em breve uma nova pรกgina da BTCC Conexรฃo Cliente. Acompanhe as as atualizaรงรตes por aqui, no Linkedin. Show more Show less

Bouygues Telecom
๐คCe qui fait notre singularitรฉ ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualitรฉ de nos relations avec notre famille, nos amis, ceux qui nous entourent est dรฉterminante pour notre bien-รชtre, notre santรฉ et mรชme notre espรฉrance de vie. Ce sont ces rela

Orange Polska
Orange Polska is the principal supplier of telecommunications services in Poland. Orange Polska provides services, including fixed-line voice telecommunications, voice mail, fixed access to the Internet and Voice over Internet Protocol (โVoIPโ). Orange Polska provides telecommunications servic

Deutsche Telekom
Welcome to Deutsche Telekom. As one of the world's most valuable brands, we design innovative solutions and products in the areas of connectivity, networks, digitalization and security. #connectingyourworld At Deutsche Telekom, we believe that each and every one of us has the power to move society

Telstra
We believe itโs people who give purpose to our technology. So weโre committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build techno

airtel
Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
EE CyberSecurity History Information
How many cyber incidents has EE faced?
Total Incidents: According to Rankiteo, EE has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at EE?
Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Data Leak.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: BT Group Ransomware Attack
Description: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack.
Type: Ransomware
Threat Actor: Black Basta group

Incident : Data Exposure
Title: EE Operator Code Repository Exposure
Description: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users.
Type: Data Exposure
Attack Vector: Exposed Default Password
Vulnerability Exploited: Default Password on Code Repository
Threat Actor: Unknown
Motivation: Unintentional Exposure
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware BT000120524
Data Compromised: financial data, organizational records, user and personal documents, NDAs, confidential information

Incident : Data Exposure EE410251223
Data Compromised: Source Code, Employee Payment Systems Code
Systems Affected: Code Repository
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.
Which entities were affected by each incident?

Incident : Ransomware BT000120524
Entity Type: Company

Incident : Data Exposure EE410251223
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: UK
Customers Affected: Almost 30 million users
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware BT000120524
Type of Data Compromised: financial data, organizational records, user and personal documents, NDAs, confidential information
Data Exfiltration: True
Personally Identifiable Information: True

Incident : Data Exposure EE410251223
Type of Data Compromised: Source Code, Employee Payment Systems Code
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware BT000120524
Data Exfiltration: True
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an Black Basta group and Unknown.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Code Repository.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were financial data, organizational records, user and personal documents, NDAs, confidential information, Source Code and Employee Payment Systems Code.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
