
ExxonMobil Company Cyber Security Posture
exxonmobil.comThe need for energy is universal. That's why ExxonMobil scientists and engineers are pioneering new research and pursuing new technologies to reduce emissions while creating more efficient fuels. We're committed to responsibly meeting the world's energy needs. We aim to achieve #netzero emissions from our operated assets by 2050 (for Scope 1 and 2 greenhouse gas emissions) and are taking a comprehensive approach to create emission-reduction roadmaps for major operated assets. Find us also on: YouTube.com/ExxonMobil Find our latest Privacy Policy at https://corporate.exxonmobil.com/Global-legal-pages/privacy-policy See our terms and conditions at https://corporate.exxonmobil.com/global-legal-pages/terms-and-conditions Find resources on our GHG emission reduction efforts here: https://corporate.exxonmobil.com/resources
ExxonMobil Company Details
exxonmobil
61842 employees
3254750.0
211
Oil and Gas
exxonmobil.com
294
EXX_1090820
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

ExxonMobil Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
ExxonMobil Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Exxon | Breach | 100 | 5 | 12/2024 | EXX000120924 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Exxon faced a significant reputational and potential financial impact due to a hack-and-leak operation targeting climate change activists. The firm hired by Exxon, DCI Group, was investigated for its alleged role in the incident. The internal communications about litigation against Exxon were obtained and leaked to the media, causing disruption to the activists and exposing Exxon to legal and public relations challenges. This attack caused distress among the affected parties and raised questions about the lengths to which corporations might go to protect their interests amid environmental scrutiny. |
ExxonMobil Company Subsidiaries

The need for energy is universal. That's why ExxonMobil scientists and engineers are pioneering new research and pursuing new technologies to reduce emissions while creating more efficient fuels. We're committed to responsibly meeting the world's energy needs. We aim to achieve #netzero emissions from our operated assets by 2050 (for Scope 1 and 2 greenhouse gas emissions) and are taking a comprehensive approach to create emission-reduction roadmaps for major operated assets. Find us also on: YouTube.com/ExxonMobil Find our latest Privacy Policy at https://corporate.exxonmobil.com/Global-legal-pages/privacy-policy See our terms and conditions at https://corporate.exxonmobil.com/global-legal-pages/terms-and-conditions Find resources on our GHG emission reduction efforts here: https://corporate.exxonmobil.com/resources
Access Data Using Our API

Get company history
.png)
ExxonMobil Cyber Security News
Enhancing process safety
Our objective is to help protect our people, communities, and the environment by successfully managing and enhancing process safety.
A โquantum leap forwardโ: Weโre pioneering a new automation technology that could transform manufacturing
A โquantum leap forwardโ: We're pioneering a new automation technology that could transform manufacturing ยท We've helped develop a next-ย ...
Top 10 CISOs
Stephen joined Amazon in 2008, originally as CISO for AWS, where he built the security organisation from the ground up. Under his leadership,ย ...
Justices Pass On ExxonMobil $14M Clean Air Act Dispute
The U.S. Supreme Court on Monday declined to review an en banc Fifth Circuit opinion that upheld $14.25 million in air pollution finesย ...
2025 ARC Forum Panel Discussion โ Converging IT and OT Cybersecurity Technologies
A panel discussion on Integration of IT and OT Cybersecurity Technologies was included in the cybersecurity program at the recent 2025 ARC Forum in Orlando.
ExxonMobil's $30 Breakeven: Why $50 Oil is a Buying Opportunity
At that price, Exxon's breakeven structure allows it to fund dividends and growth projects, while peers scramble to cut costs. The company's $30ย ...
The U.S. is trying to unravel a hacking plot that targeted climate activists
Private detective who led a hacking attack against climate activists gets prison time. Forlit has previously denied ordering or paying forย ...
ExxonMobil launches Speedpass+ mobile payment app with Apple Pay
ExxonMobil is now the โfirst majorโ fuel retailer to accept mobile payments at the pump, including Apple Pay, throughout the majority of its US network.
Israeli private eye wanted in US over alleged hacking for Exxon lobbyist, lawyer says
Forlit's U.K.-based lawyer, Rachel Scott, told the court U.S. authorities have charged Forlit "with a conspiracy to carry out computer hackingย ...

ExxonMobil Similar Companies

Shell
Shell is a global group of energy and petrochemical companies, employing 103,000 people and with operations in more than 70 countries. We serve more than 1 million commercial and industrial customers, and around 33 million customers daily at more than 47,000 Shell-branded retail service stations. O

Transocean
Transocean is a leading international provider of offshore contract drilling services for oil and gas wells. The company specializes in technically demanding sectors of the global offshore drilling business with a particular focus on deepwater and harsh environment drilling services, and believes th

Integrated Energy Systems
ััะฟะฟะฐ ยซะข ะะปััยป โ ะบััะฟะฝะตะนัะฐั ัะพััะธะนัะบะฐั ัะฐััะฝะฐั ะบะพะผะฟะฐะฝะธั, ัะฐะฑะพัะฐััะฐั ะฒ ััะตัะต ัะปะตะบััะพัะฝะตัะณะตัะธะบะธ ะธ ัะตะฟะปะพัะฝะฐะฑะถะตะฝะธั Show more Show less

Baker Hughes
Baker Hughes (NASDAQ: BKR) is an energy technology company that provides solutions for energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward โ making it safer, clea

Halliburton
We collaborate and engineer solutions to maximize asset value for our customers. Founded in 1919, Halliburton is one of the world's largest providers of products and services to the energy industry. With more than 45,000 employees, representing 130 nationalities in more than 80 countries, the compan

TotalEnergies
Have you ever thought of offering your skills and expertise to a multinational company? Give your best to better energy and make the commitment with TotalEnergies. With over 500-plus professions in 130 countries, we offer high safety and environmental standards, strong ethical values, an innovatio

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
ExxonMobil CyberSecurity History Information
How many cyber incidents has ExxonMobil faced?
Total Incidents: According to Rankiteo, ExxonMobil has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at ExxonMobil?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Hack-and-Leak Operation
Title: Exxon Hack-and-Leak Operation Targeting Climate Change Activists
Description: Exxon faced a significant reputational and potential financial impact due to a hack-and-leak operation targeting climate change activists. The firm hired by Exxon, DCI Group, was investigated for its alleged role in the incident. The internal communications about litigation against Exxon were obtained and leaked to the media, causing disruption to the activists and exposing Exxon to legal and public relations challenges. This attack caused distress among the affected parties and raised questions about the lengths to which corporations might go to protect their interests amid environmental scrutiny.
Type: Hack-and-Leak Operation
Threat Actor: DCI Group
Motivation: To protect corporate interests amid environmental scrutiny
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Hack-and-Leak Operation EXX000120924
Data Compromised: Internal communications about litigation
Operational Impact: Disruption to climate change activists
Brand Reputation Impact: Significant reputational impact
Legal Liabilities: ['Exposed to legal and public relations challenges']
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal communications.
Which entities were affected by each incident?
Data Breach Information
What type of data was compromised in each breach?

Incident : Hack-and-Leak Operation EXX000120924
Type of Data Compromised: Internal communications
Data Exfiltration: Internal communications about litigation
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an DCI Group.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Internal communications about litigation.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Internal communications about litigation.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
