Company Details
ericsson
107,243
2,260,541
517
ericsson.com
66
ERI_8911153
Completed


Ericsson Vendor Cyber Rating & Cyber Score
ericsson.comThe future of mobile isn’t on the horizon, it’s happening now. At Ericsson, we’re building the foundation for an open network ecosystem where industries, developers, and enterprises thrive. The convergence of 5G, AI, cloud, and network APIs isn’t just a technological shift; it’s a transformation that is redefining industries and enhancing everyday life. Open, programmable networks are enabling real-time innovation and unlocking new business models across the globe. Imagine a world where developers can dynamically access network capabilities on demand, where enterprises don’t just use connectivity but shape it. This isn’t a distant vision, it’s the ecosystem we’re creating today. Collaboration fuels everything we do. By working across industries, we’re designing a future where connectivity isn’t just seamless. It’s intelligent, programmable, and transformative. The shift is happening. Are you part of it?
Company Details
ericsson
107,243
2,260,541
517
ericsson.com
66
ERI_8911153
Completed
Between 550 and 599

Ericsson Global Score (TPRM)XXXX

Description: Ericsson Vendor Breach Exposes Personal Data of Over 15,000 Individuals On 28 April 2025, Ericsson disclosed a security incident involving a third-party vendor, which detected a suspicious event potentially linked to unauthorized access to data on its systems. The breach did not affect Ericsson’s internal infrastructure but occurred at a vendor handling sensitive information. An investigation revealed that an unauthorized party may have accessed a limited set of files between 17–22 April 2025, with the probe concluding on 23 February 2026. While the vendor reported no evidence of data misuse, regulatory filings confirmed that personal information of over 15,000 individuals was exposed. Ericsson promptly notified US regulators and implemented enhanced security measures to mitigate future risks. The incident underscores the growing threat to telecom providers, which handle vast amounts of sensitive data, making them prime targets for cybercriminals. Industry experts, including James Neilson, SVP of Global at OPSWAT, noted that such breaches highlight the need for robust vendor security protocols in high-risk sectors.
Description: Credential Stuffing Campaign Exploits Stolen Employee Logins to Breach Corporate Networks A sophisticated credential stuffing campaign targeting corporate Single Sign-On (SSO) gateways particularly F5 BIG-IP interfaces has exposed a growing threat: attackers gaining network access not through software vulnerabilities, but by using stolen employee credentials. First detected on February 23, 2026, by threat intelligence group Defused Cyber, the attack leveraged credentials harvested from infostealer malware infections on employee devices. A single source IP (219.75.254.166, registered to OPTAGE Inc. in Japan) was observed sending large volumes of corporate email and password combinations in automated login attempts. Analysis by Hudson Rock revealed that 77% of the 70 unique credentials used in the attack matched known infostealer infection logs, confirming they were stolen from compromised endpoints rather than a traditional data breach. The credentials were then repurposed against ADFS, Security Token Services (STS), and OWA portals, demonstrating a shift from mere data theft to coordinated network intrusion. Affected organizations included high-profile entities such as Rolls-Royce, Johnson & Johnson, Ericsson, Deloitte, Cellebrite, the Belgian Police, Queensland Police, Turkish government ministries, and major retail conglomerates. Attackers targeted these entities knowing that even a small number of valid logins especially in organizations lacking multi-factor authentication (MFA) could provide initial access. The attack infrastructure further raised concerns, as the source IP was traced to a compromised Fortinet FortiGate-60E firewall with open ports and a self-signed SSL certificate. This indicated attackers were routing traffic through hijacked network devices to target other edge systems, blending stolen credentials with compromised infrastructure. Researchers described the attack as part of a "Log-to-Lead" pipeline, an industrialized process where infostealer malware logs are aggregated, filtered by corporate domain, and sold to Initial Access Brokers on dark web marketplaces. Attackers then purchase these credential packages and use them in large-scale stuffing attacks until they gain access. The campaign underscores a critical shift in cyber threats: identity as the new perimeter. Since devices like F5 BIG-IP often accept the same credentials used for internal systems, a single stolen ADFS password could unlock VPNs, SSO portals, or remote access gateways effectively allowing attackers to bypass traditional security measures.
Description: Credential-Stuffing Attacks Target Corporate SSO Systems via Infostealer-Mined Logins A surge in credential-stuffing attacks is targeting corporate Single Sign-On (SSO) systems, with recent campaigns focusing on F5 BIG-IP devices. Security firm Defused Cyber analyzed 70 unique email-password pairs used in the attacks, finding that 77% (54 credentials) matched data from Infostealer infections malware like RedLine, Raccoon, and Vidar that harvests browser-saved logins from compromised employee devices. The attacks, first detected by Defused Cyber’s honeypots, involved malicious authentication attempts from a Japanese IP (219.75.254.166, AS17511, OPTAGE Inc.). Threat actors repurposed stolen credentials to bypass defenses, targeting corporate portals such as ADFS, OWA, and STS, often exploiting weak multi-factor authentication (MFA) enforcement or password reuse. The campaign highlights an industrialized "log-to-lead" pipeline: 1. Infection: Employees’ devices are compromised by Infostealers, which exfiltrate stored credentials. 2. Marketplace: Stolen logs are sold on underground forums to Initial Access Brokers (IABs). 3. Front-Door Bypass: Attackers use valid credentials to access corporate systems like F5 BIG-IP, leveraging their role in authentication. 4. Network Compromise: Legitimate logins grant direct access, bypassing traditional security measures. Compromised credentials linked to high-profile organizations were identified, including Rolls-Royce, Johnson & Johnson, Ericsson, Deloitte, Belgian and Queensland Police, Majid Al Futtaim, Cellebrite, Doka, and Turkey’s Ministry of Trade. The attacks cast a wide net, relying on volume to exploit gaps in MFA or user fatigue. Further investigation revealed the attacks originated from a compromised Fortinet FortiGate-60E firewall hosted by OPTAGE Inc., exposing open ports (541/tcp, 10443/tcp) with a self-signed SSL certificate. This indicates attackers are hijacking network edge devices to launch assaults, turning one organization’s infrastructure into an attack proxy for another. The campaign underscores a shift in cybercriminal tactics from exploiting vulnerabilities to abusing legitimate authentication emphasizing the growing threat of identity-based attacks.
Description: Ericsson Data Breach Exposes Personal Information of Over 15,000 Individuals in Vishing Attack In April 2025, a voice-phishing (vishing) scam targeted an unnamed third-party vendor supporting Ericsson’s U.S. operations, leading to the exposure of sensitive personal data belonging to 15,661 individuals. Attackers successfully manipulated an employee into granting unauthorized access between April 17 and April 22, with the breach detected on April 28. The vendor responded by engaging cybersecurity experts, resetting passwords, and notifying the FBI. However, Ericsson itself was only informed of the incident on November 10, 2025, after the vendor completed its internal investigation. The company then spent months identifying affected individuals, finalizing the list by February 23, 2026. Exposed data varied by state but included names, Social Security numbers, driver’s license details, government-issued IDs, financial information (such as bank account and payment card numbers), medical records, and dates of birth. While no misuse of the stolen data has been confirmed, Ericsson is offering affected individuals 12 months of credit monitoring. The vendor has since implemented additional security measures and staff training to prevent future incidents. The breach underscores the risks of social engineering attacks, where human error not technical vulnerabilities can serve as the primary entry point for cybercriminals.
Description: Ericsson U.S. Subsidiary Suffers Data Breach Affecting Thousands in Texas Ericsson Inc., the U.S. arm of Swedish telecommunications firm Ericsson, confirmed a data breach stemming from a third-party service provider, exposing sensitive information of at least 4,377 individuals in Texas with the total number of affected users likely higher nationwide. The breach was detected on April 28, 2025, following unauthorized access to the service provider’s systems between April 17 and April 22, 2025. A forensic investigation, conducted with external cybersecurity experts, concluded on February 23, 2026, revealing that compromised files contained a broad range of personal and financial data. Exposed information included names, addresses, Social Security numbers, driver’s license and passport details, credit card and bank account numbers, medical records, and dates of birth. Ericsson notified the Texas and California Attorneys General of the incident beginning March 9, 2026. In response, the company is offering affected individuals complimentary identity protection services through IDX, including 12 or 24 months of credit and dark web monitoring, a $1 million identity fraud reimbursement policy, and managed identity recovery support. The enrollment deadline for these services is June 9, 2026. The breach underscores the risks of third-party vulnerabilities in handling sensitive data, particularly in sectors reliant on external service providers. Ericsson has directed impacted individuals to monitor financial accounts and consider fraud alerts or credit freezes, though no further details on the root cause or the service provider’s identity have been disclosed.
Description: Ericsson Discloses Major Data Breach Impacting Employees and Customers Swedish telecommunications giant Ericsson has confirmed a cyber incident in April 2025 that may have compromised sensitive personal and financial data belonging to employees and customers. The breach, disclosed in a formal notification to the California Attorney General’s office, exposed names, addresses, phone numbers, Social Security numbers, driver’s license details, and in some cases, credit card information and medical data. Ericsson attributed the attack to a state-sponsored threat actor, though it did not publicly identify the group. Such actors typically target large corporations for espionage, fraud, or other malicious purposes. Following the breach, the company launched an internal investigation with cybersecurity experts to assess the scope and reinforce its security measures. To mitigate potential harm, Ericsson is offering affected individuals free identity protection services through IDX, including credit and dark web monitoring, as well as identity theft recovery support. Eligible individuals can also receive up to $1 million in identity fraud reimbursement. Those impacted have until June 9, 2026, to register for these services. The company has stated it is enhancing its cybersecurity protocols to prevent future incidents.
Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Variuos security issues can be encountered of it gets exploited.


Ericsson has 66.67% more incidents than the average of same-industry companies with at least one recorded incident.
Ericsson has 156.41% more incidents than the average of all companies with at least one recorded incident.
Ericsson reported 3 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
Ericsson cyber incidents detection timeline including parent company and subsidiaries

The future of mobile isn’t on the horizon, it’s happening now. At Ericsson, we’re building the foundation for an open network ecosystem where industries, developers, and enterprises thrive. The convergence of 5G, AI, cloud, and network APIs isn’t just a technological shift; it’s a transformation that is redefining industries and enhancing everyday life. Open, programmable networks are enabling real-time innovation and unlocking new business models across the globe. Imagine a world where developers can dynamically access network capabilities on demand, where enterprises don’t just use connectivity but shape it. This isn’t a distant vision, it’s the ecosystem we’re creating today. Collaboration fuels everything we do. By working across industries, we’re designing a future where connectivity isn’t just seamless. It’s intelligent, programmable, and transformative. The shift is happening. Are you part of it?

Ciena (NYSE:CIEN) is the global leader in high-speed connectivity. We build advanced networks to support exponential growth in bandwidth demand—empowering our customers, partners, and communities to thrive in the AI era. With unparalleled expertise and innovation, our networking systems, interconnec

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives. With stc, You will always be empowered to focus on delivering what’s next through collaborati

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s

Spectrum is a suite of advanced communications services offered by Charter Communications, Inc. (NASDAQ:CHTR), a leading broadband connectivity company available to more than 57 million homes and small to large businesses across 41 states. Founded in 1993, Charter has evolved from providing cable TV
Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. With integrated solutions across four key domains – telecom networks, IT, smart devices, and cloud services – we are committed to bringing digital to every person, home and organi

Proximus Group is a provider of future-proof connectivity, IT and digital services, headquartered in Brussels. The Group is actively engaged in building a connected world that people trust, so society blooms. The Domestic segment is focused on providing state-of-the art telecommunications and IT se

A TIM é a empresa de telefonia móvel que mais cresce no Brasil. Atualmente, possui mais de 13 mil colaboradores em todo o país que trabalham entregando serviços inovadores e de qualidade em telefonia móvel, fixa e internet banda larga. É uma companhia feita de pessoas criativas, com energia real
.png)
AT&T and Ericsson are urging tighter industry-wide coordination to thwart cyberattacks; Detection and eradication are getting far more...
AT&T and Ericsson unveil a security blueprint for AI and open 5G and 6G networks and call for more industry collaboration.
Ericsson Inc., the United States subsidiary of the Swedish telecommunications giant, has confirmed a data breach affecting 15661 of its...
Ericsson, one of the largest telecommunications companies in the world, has acknowledged experiencing a data breach that would have resulted...
A service provider that was storing the personal data of Ericsson's US subsidiary, Ericsson Inc., has experienced a cyberattack.
The US branch of telecom provider Ericsson has revealed that a “data security incident” occurred at one of its service providers.
The US subsidiary of Ericsson has disclosed a data breach affecting the personal information of thousands of individuals.
Ericsson suffered a major data breach, with sensitive data belonging to 15000+ individuals affected as a result of third-party service...
The US arm of Ericsson has confirmed suffering a third-party data breach which saw it lose sensitive data on an undisclosed number of its...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ericsson is http://www.ericsson.com.
According to Rankiteo, Ericsson’s AI-generated cybersecurity score is 569, reflecting their Very Poor security posture.
According to Rankiteo, Ericsson currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ericsson has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:
According to Rankiteo, Ericsson is not certified under SOC 2 Type 1.
According to Rankiteo, Ericsson does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ericsson is not listed as GDPR compliant.
According to Rankiteo, Ericsson does not currently maintain PCI DSS compliance.
According to Rankiteo, Ericsson is not compliant with HIPAA regulations.
According to Rankiteo,Ericsson is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ericsson operates primarily in the Telecommunications industry.
Ericsson employs approximately 107,243 people worldwide.
Ericsson presently has no subsidiaries across any sectors.
Ericsson’s official LinkedIn profile has approximately 2,260,541 followers.
Ericsson is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Ericsson does not have a profile on Crunchbase.
Yes, Ericsson maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ericsson.
As of April 02, 2026, Rankiteo reports that Ericsson has experienced 7 cybersecurity incidents.
Ericsson has an estimated 10,042 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Vulnerability and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with defused cyber (security firm), and third party assistance with defused cyber, third party assistance with hudson rock, and third party assistance with external cybersecurity experts, and communication strategy with notified texas and california attorneys general; offered identity protection services, and third party assistance with cybersecurity experts engaged, and law enforcement notified with fbi notified, and containment measures with password resets, and remediation measures with additional security measures and staff training, and communication strategy with notification to affected individuals, credit monitoring offered, and incident response plan activated with yes, and third party assistance with cybersecurity experts, and remediation measures with enhancing cybersecurity protocols, and communication strategy with formal notification to the california attorney general’s office, and incident response plan activated with yes, and remediation measures with enhanced security measures, and communication strategy with regulatory notifications and public disclosure..
Title: Ericsson Network Manager Product Bug
Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Various security issues can be encountered if it gets exploited.
Type: Vulnerability
Attack Vector: Exposure of Resource to Wrong Sphere
Vulnerability Exploited: CWE Exposure of Resource to Wrong Sphere
Threat Actor: TIM Red Team Research
Title: Credential-Stuffing Attacks Target Corporate SSO Systems via Infostealer-Mined Logins
Description: A surge in credential-stuffing attacks is targeting corporate Single Sign-On (SSO) systems, with recent campaigns focusing on F5 BIG-IP devices. Threat actors repurposed stolen credentials to bypass defenses, targeting corporate portals such as ADFS, OWA, and STS, often exploiting weak multi-factor authentication (MFA) enforcement or password reuse. The campaign highlights an industrialized 'log-to-lead' pipeline involving Infostealer infections, underground marketplace sales, and direct access to corporate systems.
Type: Credential Stuffing
Attack Vector: Stolen credentials from Infostealer malware (RedLine, Raccoon, Vidar)
Vulnerability Exploited: Weak multi-factor authentication (MFA) enforcement, password reuse, exposed network edge devices (e.g., Fortinet FortiGate-60E with open ports)
Threat Actor: Initial Access Brokers (IABs), cybercriminals leveraging Infostealer logs
Motivation: Unauthorized access to corporate systems, data exfiltration, potential financial gain
Title: Credential Stuffing Campaign Exploits Stolen Employee Logins to Breach Corporate Networks
Description: A sophisticated credential stuffing campaign targeting corporate Single Sign-On (SSO) gateways, particularly F5 BIG-IP interfaces, leveraged stolen employee credentials harvested from infostealer malware infections to gain network access. The attack was first detected on February 23, 2026, and involved automated login attempts using credentials repurposed against ADFS, STS, and OWA portals. The campaign highlights a shift from data theft to coordinated network intrusion, exploiting identity as the new perimeter.
Date Detected: 2026-02-23
Type: Credential Stuffing
Attack Vector: Stolen employee credentials via infostealer malware
Vulnerability Exploited: Lack of multi-factor authentication (MFA)
Threat Actor: Initial Access Brokers
Motivation: Network intrusion, data exfiltration, potential ransomware deployment
Title: Ericsson U.S. Subsidiary Suffers Data Breach Affecting Thousands in Texas
Description: Ericsson Inc., the U.S. arm of Swedish telecommunications firm Ericsson, confirmed a data breach stemming from a third-party service provider, exposing sensitive information of at least 4,377 individuals in Texas with the total number of affected users likely higher nationwide.
Date Detected: 2025-04-28
Date Publicly Disclosed: 2026-03-09
Type: Data Breach
Attack Vector: Third-party service provider compromise
Title: Ericsson Data Breach Exposes Personal Information of Over 15,000 Individuals in Vishing Attack
Description: In April 2025, a voice-phishing (vishing) scam targeted an unnamed third-party vendor supporting Ericsson’s U.S. operations, leading to the exposure of sensitive personal data belonging to 15,661 individuals. Attackers manipulated an employee into granting unauthorized access between April 17 and April 22, with the breach detected on April 28. Ericsson was informed on November 10, 2025, after the vendor completed its internal investigation. Exposed data included names, Social Security numbers, driver’s license details, government-issued IDs, financial information, medical records, and dates of birth. No misuse of the stolen data has been confirmed, but Ericsson is offering affected individuals 12 months of credit monitoring.
Date Detected: 2025-04-28
Type: Data Breach
Attack Vector: Vishing (Voice Phishing)
Vulnerability Exploited: Human error (social engineering)
Title: Ericsson Major Data Breach Impacting Employees and Customers
Description: Swedish telecommunications giant Ericsson has confirmed a cyber incident in April 2025 that may have compromised sensitive personal and financial data belonging to employees and customers. The breach exposed names, addresses, phone numbers, Social Security numbers, driver’s license details, and in some cases, credit card information and medical data.
Date Detected: 2025-04
Type: Data Breach
Threat Actor: State-sponsored threat actor
Motivation: EspionageFraud
Title: Ericsson Vendor Breach Exposes Personal Data of Over 15,000 Individuals
Description: Ericsson disclosed a security incident involving a third-party vendor, which detected a suspicious event potentially linked to unauthorized access to data on its systems. The breach did not affect Ericsson’s internal infrastructure but occurred at a vendor handling sensitive information. An investigation revealed that an unauthorized party may have accessed a limited set of files between 17–22 April 2025, with the probe concluding on 23 February 2026. While the vendor reported no evidence of data misuse, regulatory filings confirmed that personal information of over 15,000 individuals was exposed.
Date Detected: 2025-04-28
Date Publicly Disclosed: 2025-04-28
Date Resolved: 2026-02-23
Type: Data Breach
Attack Vector: Third-party vendor compromise
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Stolen credentials from Infostealer logs, Stolen employee credentials via infostealer malware and Third-party vendor employee.

Data Compromised: Browser-saved logins, corporate SSO credentials
Systems Affected: F5 BIG-IP devicesADFSOWASTS portalsFortinet FortiGate-60E firewalls
Operational Impact: Bypassed authentication, potential unauthorized access to corporate networks
Brand Reputation Impact: Potential reputational damage for affected organizations
Identity Theft Risk: High (stolen credentials, PII exposure)

Data Compromised: Employee credentials, potential access to internal systems
Systems Affected: ADFSSecurity Token Services (STS)OWA portalsF5 BIG-IP interfacesVPNsSSO portalsRemote access gateways
Operational Impact: Potential unauthorized access to corporate networks
Brand Reputation Impact: Potential reputational damage due to unauthorized access
Identity Theft Risk: High (stolen employee credentials)

Data Compromised: Sensitive personal and financial data
Brand Reputation Impact: Yes
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Sensitive personal and financial information
Brand Reputation Impact: Potential reputational damage
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Sensitive personal and financial data
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Personal information of over 15,000 individuals
Systems Affected: Vendor systems
Brand Reputation Impact: Potential reputational damage due to third-party breach
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Browser-Saved Logins, Corporate Sso Credentials, , Employee credentials, Personal Data, Financial Data, Medical Records, , Personally Identifiable Information (Pii), Financial Information, Medical Records, , Personal Data, Financial Data, Medical Data, and Personal information.

Entity Name: Ericsson
Entity Type: Corporation
Industry: Telecommunications

Entity Name: Rolls-Royce
Entity Type: Corporation
Industry: Aerospace/Defense

Entity Name: Johnson & Johnson
Entity Type: Corporation
Industry: Healthcare/Pharmaceutical

Entity Name: Ericsson
Entity Type: Corporation
Industry: Telecommunications

Entity Name: Deloitte
Entity Type: Corporation
Industry: Professional Services/Consulting

Entity Name: Belgian Police
Entity Type: Government
Industry: Law Enforcement
Location: Belgium

Entity Name: Queensland Police
Entity Type: Government
Industry: Law Enforcement
Location: Australia

Entity Name: Majid Al Futtaim
Entity Type: Corporation
Industry: Retail/Conglomerate
Location: UAE

Entity Name: Cellebrite
Entity Type: Corporation
Industry: Digital Intelligence

Entity Name: Doka
Entity Type: Corporation
Industry: Construction/Engineering

Entity Name: Turkey’s Ministry of Trade
Entity Type: Government
Industry: Government/Trade
Location: Turkey

Entity Name: Rolls-Royce
Entity Type: Corporation
Industry: Aerospace/Defense

Entity Name: Johnson & Johnson
Entity Type: Corporation
Industry: Healthcare/Pharmaceutical

Entity Name: Ericsson
Entity Type: Corporation
Industry: Telecommunications

Entity Name: Deloitte
Entity Type: Corporation
Industry: Professional Services/Consulting

Entity Name: Cellebrite
Entity Type: Corporation
Industry: Digital Intelligence/Forensics

Entity Name: Belgian Police
Entity Type: Government
Industry: Law Enforcement
Location: Belgium

Entity Name: Queensland Police
Entity Type: Government
Industry: Law Enforcement
Location: Australia

Entity Name: Turkish government ministries
Entity Type: Government
Industry: Public Sector
Location: Turkey

Entity Name: Major retail conglomerates
Entity Type: Corporation
Industry: Retail

Entity Name: Ericsson Inc.
Entity Type: Subsidiary
Industry: Telecommunications
Location: U.S.
Customers Affected: 4377 (Texas), likely higher nationwide

Entity Name: Ericsson
Entity Type: Corporation
Industry: Telecommunications
Location: United States
Customers Affected: 15,661

Entity Name: Ericsson
Entity Type: Corporation
Industry: Telecommunications
Location: Sweden
Customers Affected: Employees and customers

Entity Name: Ericsson
Entity Type: Telecommunications company
Industry: Telecommunications
Customers Affected: 15,000+

Third Party Assistance: Defused Cyber (security firm)

Third Party Assistance: Defused Cyber, Hudson Rock.

Third Party Assistance: External cybersecurity experts
Communication Strategy: Notified Texas and California Attorneys General; offered identity protection services

Third Party Assistance: Cybersecurity experts engaged
Law Enforcement Notified: FBI notified
Containment Measures: Password resets
Remediation Measures: Additional security measures and staff training
Communication Strategy: Notification to affected individuals, credit monitoring offered

Incident Response Plan Activated: Yes
Third Party Assistance: Cybersecurity experts
Remediation Measures: Enhancing cybersecurity protocols
Communication Strategy: Formal notification to the California Attorney General’s office

Incident Response Plan Activated: Yes
Remediation Measures: Enhanced security measures
Communication Strategy: Regulatory notifications and public disclosure
Incident Response Plan: The company's incident response plan is described as Yes, Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Defused Cyber (security firm), Defused Cyber, Hudson Rock, , External cybersecurity experts, Cybersecurity experts engaged, Cybersecurity experts.

Type of Data Compromised: Browser-saved logins, Corporate sso credentials
Number of Records Exposed: 70 unique email-password pairs (54 matched Infostealer logs)
Sensitivity of Data: High (corporate authentication credentials, potential PII)
Personally Identifiable Information: Potential (browser-saved credentials may include PII)

Type of Data Compromised: Employee credentials
Number of Records Exposed: 70 unique credentials
Sensitivity of Data: High (corporate network access)
Personally Identifiable Information: Employee login credentials

Type of Data Compromised: Personal data, Financial data, Medical records
Number of Records Exposed: 4377 (Texas), likely higher nationwide
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesSocial Security numbersDriver’s license detailsPassport detailsDates of birth

Type of Data Compromised: Personally identifiable information (pii), Financial information, Medical records
Number of Records Exposed: 15,661
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security NumbersDriver’s License DetailsGovernment-Issued IDsDates of Birth

Type of Data Compromised: Personal data, Financial data, Medical data
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesPhone numbersSocial Security numbersDriver’s license detailsCredit card information

Type of Data Compromised: Personal information
Number of Records Exposed: 15,000+
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Additional security measures and staff training, Enhancing cybersecurity protocols, Enhanced security measures.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by password resets.

Regulatory Notifications: Texas Attorney GeneralCalifornia Attorney General

Regulatory Notifications: California Attorney General’s office

Regulatory Notifications: US regulators

Lessons Learned: The campaign underscores the shift from exploiting vulnerabilities to abusing legitimate authentication, highlighting the growing threat of identity-based attacks. Organizations must enforce strong MFA, monitor for credential leaks, and secure network edge devices to prevent such attacks.

Lessons Learned: The incident underscores the critical importance of multi-factor authentication (MFA) and the risks posed by infostealer malware in enabling credential stuffing attacks. Identity is now the new perimeter, and stolen credentials can bypass traditional security measures.

Lessons Learned: Risks of third-party vulnerabilities in handling sensitive data, particularly in sectors reliant on external service providers.

Lessons Learned: The breach underscores the risks of social engineering attacks, where human error—not technical vulnerabilities—can serve as the primary entry point for cybercriminals.

Lessons Learned: The incident underscores the growing threat to telecom providers and the need for robust vendor security protocols in high-risk sectors.

Recommendations: Enforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breachEnforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breachEnforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breachEnforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breachEnforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breachEnforce strong multi-factor authentication (MFA) across all corporate systems, Monitor for credential leaks and Infostealer infections on employee devices, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Educate employees on password hygiene and the risks of password reuse, Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Segment networks to limit lateral movement in case of a breach

Recommendations: Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Monitor for infostealer malware infections on employee devices., Enforce strict password policies and regular credential rotation., Segment network access to limit lateral movement in case of a breach., Enhance monitoring of login attempts and anomalous access patterns., Educate employees on the risks of malware and credential theft.

Recommendations: Monitor financial accounts, consider fraud alerts or credit freezes, and enroll in identity protection services.

Recommendations: Implement additional security measures and staff training to prevent future incidents.

Recommendations: Implement stronger vendor security protocols and continuous monitoring of third-party systems.
Key Lessons Learned: The key lessons learned from past incidents are The campaign underscores the shift from exploiting vulnerabilities to abusing legitimate authentication, highlighting the growing threat of identity-based attacks. Organizations must enforce strong MFA, monitor for credential leaks, and secure network edge devices to prevent such attacks.The incident underscores the critical importance of multi-factor authentication (MFA) and the risks posed by infostealer malware in enabling credential stuffing attacks. Identity is now the new perimeter, and stolen credentials can bypass traditional security measures.Risks of third-party vulnerabilities in handling sensitive data, particularly in sectors reliant on external service providers.The breach underscores the risks of social engineering attacks, where human error—not technical vulnerabilities—can serve as the primary entry point for cybercriminals.The incident underscores the growing threat to telecom providers and the need for robust vendor security protocols in high-risk sectors.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement stronger vendor security protocols and continuous monitoring of third-party systems., Implement additional security measures and staff training to prevent future incidents., Monitor financial accounts, consider fraud alerts or credit freezes and and enroll in identity protection services..

Source: Defused Cyber

Source: Defused Cyber

Source: Hudson Rock

Source: Incident disclosure

Source: California Attorney General’s office notification

Source: Industry expert (James Neilson, SVP of Global at OPSWAT)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Defused Cyber, and Source: Defused Cyber, and Source: Hudson Rock, and Source: Incident disclosure, and Source: California Attorney General’s office notification, and Source: Industry expert (James Neilson, SVP of Global at OPSWAT).

Investigation Status: Ongoing (as per Defused Cyber’s analysis)

Investigation Status: Ongoing

Investigation Status: Concluded (forensic investigation completed on 2026-02-23)

Investigation Status: Completed

Investigation Status: Ongoing

Investigation Status: Concluded
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified Texas and California Attorneys General; offered identity protection services, Notification to affected individuals, credit monitoring offered, Formal notification to the California Attorney General’s office and Regulatory notifications and public disclosure.

Customer Advisories: Offered complimentary identity protection services through IDX (12 or 24 months of credit and dark web monitoring, $1 million identity fraud reimbursement policy, and managed identity recovery support). Enrollment deadline: 2026-06-09.

Customer Advisories: 12 months of credit monitoring offered to affected individuals

Customer Advisories: Offering free identity protection services through IDX, including credit and dark web monitoring, identity theft recovery support, and up to $1 million in identity fraud reimbursement. Eligible individuals have until June 9, 2026, to register.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Offered complimentary identity protection services through IDX (12 or 24 months of credit and dark web monitoring, $1 million identity fraud reimbursement policy, and managed identity recovery support). Enrollment deadline: 2026-06-09., 12 months of credit monitoring offered to affected individuals, Offering free identity protection services through IDX, including credit and dark web monitoring, identity theft recovery support, and up to $1 million in identity fraud reimbursement. Eligible individuals have until June 9, 2026 and to register..

Entry Point: Stolen credentials from Infostealer logs
High Value Targets: Corporate Sso Systems (F5 Big-Ip, Adfs, Owa, Sts),
Data Sold on Dark Web: Corporate Sso Systems (F5 Big-Ip, Adfs, Owa, Sts),

Entry Point: Stolen employee credentials via infostealer malware
High Value Targets: Corporate SSO gateways, ADFS, STS, OWA portals
Data Sold on Dark Web: Corporate SSO gateways, ADFS, STS, OWA portals

Entry Point: Third-party vendor employee

Root Causes: Infostealer Malware Infections On Employee Devices, Weak Mfa Enforcement Or Password Reuse, Exposed Network Edge Devices (E.G., Fortinet Fortigate-60E With Open Ports), Lack Of Monitoring For Credential Leaks,
Corrective Actions: Strengthen Mfa Policies, Deploy Endpoint Detection For Infostealer Malware, Secure And Monitor Network Edge Devices, Implement Credential Leak Monitoring,

Root Causes: Lack Of Multi-Factor Authentication (Mfa), Infostealer Malware Infections On Employee Devices, Use Of Stolen Credentials To Bypass Security Measures,
Corrective Actions: Implement Mfa Across All Systems, Enhance Endpoint Security To Detect And Prevent Infostealer Malware, Monitor And Restrict Access To Critical Systems,

Root Causes: Third-party service provider compromise

Root Causes: Human error (social engineering via vishing)
Corrective Actions: Additional security measures and staff training

Corrective Actions: Enhancing cybersecurity protocols

Root Causes: Third-party vendor compromise
Corrective Actions: Enhanced security measures
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Defused Cyber (security firm), Defused Cyber, Hudson Rock, , External cybersecurity experts, Cybersecurity experts engaged, Cybersecurity experts.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthen Mfa Policies, Deploy Endpoint Detection For Infostealer Malware, Secure And Monitor Network Edge Devices, Implement Credential Leak Monitoring, , Implement Mfa Across All Systems, Enhance Endpoint Security To Detect And Prevent Infostealer Malware, Monitor And Restrict Access To Critical Systems, , Additional security measures and staff training, Enhancing cybersecurity protocols, Enhanced security measures.
Last Attacking Group: The attacking group in the last incident were an TIM Red Team Research, Initial Access Brokers (IABs), cybercriminals leveraging Infostealer logs, Initial Access Brokers and State-sponsored threat actor.
Most Recent Incident Detected: The most recent incident detected was on 2026-02-23.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-04-28.
Most Recent Incident Resolved: The most recent incident resolved was on 2026-02-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Browser-saved logins, corporate SSO credentials, Employee credentials, potential access to internal systems, Sensitive personal and financial data, Sensitive personal and financial information, Sensitive personal and financial data, Personal information of over 15 and000 individuals.
Most Significant System Affected: The most significant system affected in an incident was F5 BIG-IP devicesADFSOWASTS portalsFortinet FortiGate-60E firewalls and ADFSSecurity Token Services (STS)OWA portalsF5 BIG-IP interfacesVPNsSSO portalsRemote access gateways and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Defused Cyber (security firm), defused cyber, hudson rock, , External cybersecurity experts, Cybersecurity experts engaged, Cybersecurity experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Password resets.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Sensitive personal and financial data, Browser-saved logins, corporate SSO credentials, Personal information of over 15,000 individuals, Employee credentials, potential access to internal systems and Sensitive personal and financial information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 31.3K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The campaign underscores the shift from exploiting vulnerabilities to abusing legitimate authentication, highlighting the growing threat of identity-based attacks. Organizations must enforce strong MFA, monitor for credential leaks, and secure network edge devices to prevent such attacks., The incident underscores the critical importance of multi-factor authentication (MFA) and the risks posed by infostealer malware in enabling credential stuffing attacks. Identity is now the new perimeter, and stolen credentials can bypass traditional security measures., Risks of third-party vulnerabilities in handling sensitive data, particularly in sectors reliant on external service providers., The breach underscores the risks of social engineering attacks, where human error—not technical vulnerabilities—can serve as the primary entry point for cybercriminals., The incident underscores the growing threat to telecom providers and the need for robust vendor security protocols in high-risk sectors.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Educate employees on password hygiene and the risks of password reuse, Educate employees on the risks of malware and credential theft., Monitor for infostealer malware infections on employee devices., Enhance monitoring of login attempts and anomalous access patterns., Segment network access to limit lateral movement in case of a breach., Implement stronger vendor security protocols and continuous monitoring of third-party systems., Implement adaptive behavioral WAFs and enhanced monitoring for authentication anomalies, Secure network edge devices (e.g., firewalls, VPNs) and close unnecessary open ports, Monitor for credential leaks and Infostealer infections on employee devices, Monitor financial accounts, consider fraud alerts or credit freezes, and enroll in identity protection services., Implement multi-factor authentication (MFA) for all corporate systems, especially SSO and remote access gateways., Implement additional security measures and staff training to prevent future incidents., Enforce strict password policies and regular credential rotation., Segment networks to limit lateral movement in case of a breach and Enforce strong multi-factor authentication (MFA) across all corporate systems.
Most Recent Source: The most recent source of information about an incident are Industry expert (James Neilson, SVP of Global at OPSWAT), Incident disclosure, Defused Cyber, Hudson Rock and California Attorney General’s office notification.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as per Defused Cyber’s analysis).
Most Recent Customer Advisory: The most recent customer advisory issued were an Offered complimentary identity protection services through IDX (12 or 24 months of credit and dark web monitoring, $1 million identity fraud reimbursement policy, and managed identity recovery support). Enrollment deadline: 2026-06-09., 12 months of credit monitoring offered to affected individuals, Offering free identity protection services through IDX, including credit and dark web monitoring, identity theft recovery support, and up to $1 million in identity fraud reimbursement. Eligible individuals have until June 9, 2026 and to register.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Stolen credentials from Infostealer logs, Third-party vendor employee and Stolen employee credentials via infostealer malware.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Infostealer malware infections on employee devicesWeak MFA enforcement or password reuseExposed network edge devices (e.g., Fortinet FortiGate-60E with open ports)Lack of monitoring for credential leaks, Lack of multi-factor authentication (MFA)Infostealer malware infections on employee devicesUse of stolen credentials to bypass security measures, Third-party service provider compromise, Human error (social engineering via vishing), Third-party vendor compromise.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Strengthen MFA policiesDeploy endpoint detection for Infostealer malwareSecure and monitor network edge devicesImplement credential leak monitoring, Implement MFA across all systemsEnhance endpoint security to detect and prevent infostealer malwareMonitor and restrict access to critical systems, Additional security measures and staff training, Enhancing cybersecurity protocols, Enhanced security measures.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.