Company Details
jpmorgan
82,484
5,796,290
52
jpmorgan.com
0
J.P_1929778
In-progress


J.P. Morgan Vendor Cyber Rating & Cyber Score
jpmorgan.comJ.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built upon our core principle of putting our clients' interests first. J.P. Morgan is part of JPMorgan Chase & Co. (NYSE: JPM), a global financial services firm. Social Media Terms and Conditions: https://bit.ly/JPMCSocialTerms © 2017 JPMorgan Chase & Co. JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.
Company Details
jpmorgan
82,484
5,796,290
52
jpmorgan.com
0
J.P_1929778
In-progress
Between 800 and 849

J.P. Morgan Global Score (TPRM)XXXX

Description: Sophisticated Phishing Attack Targets Outpost24 C-Level Executive Using Kratos Kit A high-profile phishing attack targeted a C-level executive at Outpost24, a Swedish exposure management and identity security firm, leveraging the recently identified Kratos phishing-as-a-service (PhaaS) kit. The attack, analyzed by Outpost24’s subsidiary Specops Software, employed a seven-step chain of redirects through trusted services to evade detection and trick the victim. The phishing email, disguised as a legitimate message from JP Morgan, appeared as part of an existing email thread to enhance credibility. It included two DKIM signatures to bypass DMARC authentication, making it appear trustworthy. The malicious link initially pointed to Cisco’s secure-web.cisco.com, a legitimate domain used for URL rewriting, which passed Cisco’s Secure Email Gateway validation. From there, the attack redirected through Nylas, an email API platform, before funneling the victim to a subdomain of a legitimate Indian development company. The final redirect led to a repurposed domain originally registered in 2017 by a Chinese entity, which had been reacquired on March 12 just days after its TLS certificate expired suggesting deliberate repurposing for the campaign. The last stage of the attack used Cloudflare-protected infrastructure to conceal the origin server, serving a browser validation check to evade security analysis. The victim was then presented with a convincing Microsoft 365 phishing page, complete with a fake Outlook loading animation and real-time credential validation to ensure stolen logins were functional. While Specops did not attribute the attack to a specific threat actor, the tactics align with those of Iran-linked groups recently targeting U.S. entities. However, similar techniques have been observed across multiple hacking collectives, leaving attribution uncertain. The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Description: On April 18, 2024, the Vermont Office of the Attorney General disclosed a data breach at J.P. Morgan, stemming from a software vulnerability discovered on February 26, 2024. The incident exposed sensitive personal and financial information of an unspecified number of individuals, including names, addresses, Social Security numbers, and bank account details. The breach posed a severe risk of identity theft, financial fraud, and unauthorized access to customer accounts, given the highly confidential nature of the compromised data. While the exact scale of the breach remains undisclosed, the exposure of such critical information particularly Social Security numbers and banking details heightens the potential for long-term reputational damage, regulatory scrutiny, and legal repercussions for the financial institution. The incident underscores vulnerabilities in J.P. Morgan’s digital infrastructure, raising concerns about the adequacy of its cybersecurity measures in safeguarding customer data against exploitation by malicious actors.


J.P. Morgan has 50.5% fewer incidents than the average of same-industry companies with at least one recorded incident.
J.P. Morgan has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
J.P. Morgan reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
J.P. Morgan cyber incidents detection timeline including parent company and subsidiaries

J.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built upon our core principle of putting our clients' interests first. J.P. Morgan is part of JPMorgan Chase & Co. (NYSE: JPM), a global financial services firm. Social Media Terms and Conditions: https://bit.ly/JPMCSocialTerms © 2017 JPMorgan Chase & Co. JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.


As a brand with a legacy of over 160 years in Africa, we have a deep understanding and belief in the boundless opportunities that this continent presents. Our vision extends beyond mere geography; it encompasses a profound recognition of the potential for growth that resonates within our people, cus

We support you over time, during expansion phases and their more challenging periods alike. By providing a full range of solutions suited to your needs, we play a facilitating role to help you realise your ambitions and leverage your potential. This is why we intend to develop an authentic advisory

At American Express, we know that with the right backing, people and businesses have the power to progress in incredible ways. Whether we’re supporting our customers’ financial confidence to move ahead, taking commerce to new heights, or encouraging people to explore the world, our colleagues are co

With a history tracing its roots to 1799 in New York City, JPMorganChase is one of the world's oldest, largest, and best-known financial institutions—carrying forth the innovative spirit of our heritage firms in global operations across 100 markets. We serve millions of customers and many of the w

Aditya Birla Capital Ltd is a financial services company based out of One World Center, Tower 1, 18th Floor, Jupiter Mills Compound, 841, Senapati Bapat Marg, Elphinstone Road, MUMBAI, India. - Aditya Birla Capital is committed to provide equal opportunity to all in employment and prohibits discrim
Founded in 2006, CreditEase is a Beijing-based world-leading FinTech conglomerate in China. It specializes in inclusive finance and wealth management with a dominant position in credit technology, wealth management technology, insurance technology, etc. Main business sectors of CreditEase include Yi

Max Group is a $7 billion diversified Indian conglomerate founded by Mr. Analjit Singh with a strong presence across Senior Care, Life Insurance, and Real Estate. Guided by a purpose-driven approach, we aim to create meaningful solutions that improve lives and deliver lasting value. Max India Lim

Motilal Oswal Financial Services Ltd. (MOFSL) was founded in 1987 as a small sub-broking unit, with just 2 people running the show. Focus on a customer-first attitude, ethical and transparent business practices, respect for professionalism, research-based value investing, and implementation of cutti

Angel One Limited is a Fintech company providing broking services, margin trading facility, research services, depository services, investment education and distribution of third-party financial products to its clients, on a mission to become the No. 1 fintech organization in India. With about 32 mi
.png)
As cyber attacks rise in scale and sophistication, investors must assess how prepared companies are to manage cyber risk and build long-term...
Sophisticated 7-stage phishing using Cisco, JP Morgan targets Outpost24 exec. Kratos toolkit evades bots; real payload activates only on...
With escalating geopolitical conflicts, the risk of cyber threats grows, making it crucial to enhance your cybersecurity defenses to protect...
Cybersecurity isn't just defense—it's a growth engine reshaping Latin America's digital future.
As artificial intelligence panic fuels exaggerated fears of disruption and sell-offs, cybersecurity and sovereign infrastructure stand to...
CrowdStrike, Zscaler, Palo Alto Networks, and other cybersecurity stocks fall after Anthropic releases new Claude security tool.
Cybersecurity stocks have performed well as high-profile hacks and AI draw attention to the need for strong digital protection.
JPMorgan identified CrowdStrike (CRWD), Palo Alto Networks (PANW) and Zscaler (ZS) as long-term winners amid AI-driven cyber threats.
Anthropic released 11 new plug-ins for its Claude Cowork AI tool at the end of January sparking a massive sell-off in SaaS stocks.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of J.P. Morgan is http://www.jpmorgan.com.
According to Rankiteo, J.P. Morgan’s AI-generated cybersecurity score is 810, reflecting their Good security posture.
According to Rankiteo, J.P. Morgan currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, J.P. Morgan has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, J.P. Morgan is not certified under SOC 2 Type 1.
According to Rankiteo, J.P. Morgan does not hold a SOC 2 Type 2 certification.
According to Rankiteo, J.P. Morgan is not listed as GDPR compliant.
According to Rankiteo, J.P. Morgan does not currently maintain PCI DSS compliance.
According to Rankiteo, J.P. Morgan is not compliant with HIPAA regulations.
According to Rankiteo,J.P. Morgan is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
J.P. Morgan operates primarily in the Financial Services industry.
J.P. Morgan employs approximately 82,484 people worldwide.
J.P. Morgan presently has no subsidiaries across any sectors.
J.P. Morgan’s official LinkedIn profile has approximately 5,796,290 followers.
J.P. Morgan is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, J.P. Morgan does not have a profile on Crunchbase.
Yes, J.P. Morgan maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jpmorgan.
As of April 02, 2026, Rankiteo reports that J.P. Morgan has experienced 2 cybersecurity incidents.
J.P. Morgan has an estimated 31,537 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with specops software (outpost24 subsidiary)..
Title: J.P. Morgan Data Breach Due to Software Issue (2024)
Description: The Vermont Office of the Attorney General reported a data breach involving J.P. Morgan that occurred due to a software issue on February 26, 2024, potentially affecting personal and financial information, including names, addresses, Social Security numbers, and bank account details of an unknown number of individuals.
Date Detected: 2024-02-26
Date Publicly Disclosed: 2024-04-18
Type: Data Breach
Vulnerability Exploited: Software Issue
Title: Sophisticated Phishing Attack Targets Outpost24 C-Level Executive Using Kratos Kit
Description: A high-profile phishing attack targeted a C-level executive at Outpost24, a Swedish exposure management and identity security firm, leveraging the recently identified Kratos phishing-as-a-service (PhaaS) kit. The attack employed a seven-step chain of redirects through trusted services to evade detection and trick the victim.
Type: Phishing
Attack Vector: Email
Vulnerability Exploited: DMARC authentication bypass, trusted infrastructure abuse
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing email (JP Morgan-themed).

Data Compromised: Names, Addresses, Social security numbers, Bank account details
Identity Theft Risk: Potential
Payment Information Risk: Potential

Data Compromised: Credentials (Microsoft 365)
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Financial Information, and Credentials.

Entity Name: J.P. Morgan
Entity Type: Financial Institution
Industry: Banking/Financial Services
Location: United States
Customers Affected: Unknown

Entity Name: Outpost24
Entity Type: Organization
Industry: Cybersecurity (Exposure Management & Identity Security)
Location: Sweden

Third Party Assistance: Specops Software (Outpost24 subsidiary)
Third-Party Assistance: The company involves third-party assistance in incident response through Specops Software (Outpost24 subsidiary).

Type of Data Compromised: Personal information, Financial information
Number of Records Exposed: Unknown
Sensitivity of Data: High
Personally Identifiable Information: namesaddressesSocial Security numbers

Type of Data Compromised: Credentials
Sensitivity of Data: High (Microsoft 365 logins)

Regulatory Notifications: Vermont Office of the Attorney General

Lessons Learned: The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Key Lessons Learned: The key lessons learned from past incidents are The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.

Source: Vermont Office of the Attorney General
Date Accessed: 2024-04-18

Source: Specops Software (Outpost24 subsidiary)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-04-18, and Source: Specops Software (Outpost24 subsidiary).

Entry Point: Phishing email (JP Morgan-themed)
High Value Targets: C-level executive
Data Sold on Dark Web: C-level executive

Root Causes: Software Issue

Root Causes: Abuse of trusted infrastructure (Cisco Secure Email Gateway, Nylas, Cloudflare), DMARC bypass, repurposed domain
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Specops Software (Outpost24 subsidiary).
Most Recent Incident Detected: The most recent incident detected was on 2024-02-26.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-18.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, bank account details, and Credentials (Microsoft 365).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Specops Software (Outpost24 subsidiary).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Credentials (Microsoft 365), addresses, names, Social Security numbers and bank account details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Most Recent Source: The most recent source of information about an incident are Specops Software (Outpost24 subsidiary) and Vermont Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing email (JP Morgan-themed).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Software Issue, Abuse of trusted infrastructure (Cisco Secure Email Gateway, Nylas, Cloudflare), DMARC bypass, repurposed domain.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.