Company Details
jpmorgan
82,484
5,796,290
52
jpmorgan.com
0
J.P_1929778
In-progress


J.P. Morgan Vendor Cyber Rating & Cyber Score
jpmorgan.comJ.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built upon our core principle of putting our clients' interests first. J.P. Morgan is part of JPMorgan Chase & Co. (NYSE: JPM), a global financial services firm. Social Media Terms and Conditions: https://bit.ly/JPMCSocialTerms © 2017 JPMorgan Chase & Co. JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.
Company Details
jpmorgan
82,484
5,796,290
52
jpmorgan.com
0
J.P_1929778
In-progress
Between 800 and 849

J.P. Morgan Global Score (TPRM)XXXX

Description: Sophisticated Phishing Attack Targets Outpost24 C-Level Executive Using Kratos Kit A high-profile phishing attack targeted a C-level executive at Outpost24, a Swedish exposure management and identity security firm, leveraging the recently identified Kratos phishing-as-a-service (PhaaS) kit. The attack, analyzed by Outpost24’s subsidiary Specops Software, employed a seven-step chain of redirects through trusted services to evade detection and trick the victim. The phishing email, disguised as a legitimate message from JP Morgan, appeared as part of an existing email thread to enhance credibility. It included two DKIM signatures to bypass DMARC authentication, making it appear trustworthy. The malicious link initially pointed to Cisco’s secure-web.cisco.com, a legitimate domain used for URL rewriting, which passed Cisco’s Secure Email Gateway validation. From there, the attack redirected through Nylas, an email API platform, before funneling the victim to a subdomain of a legitimate Indian development company. The final redirect led to a repurposed domain originally registered in 2017 by a Chinese entity, which had been reacquired on March 12 just days after its TLS certificate expired suggesting deliberate repurposing for the campaign. The last stage of the attack used Cloudflare-protected infrastructure to conceal the origin server, serving a browser validation check to evade security analysis. The victim was then presented with a convincing Microsoft 365 phishing page, complete with a fake Outlook loading animation and real-time credential validation to ensure stolen logins were functional. While Specops did not attribute the attack to a specific threat actor, the tactics align with those of Iran-linked groups recently targeting U.S. entities. However, similar techniques have been observed across multiple hacking collectives, leaving attribution uncertain. The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Description: On April 18, 2024, the Vermont Office of the Attorney General disclosed a data breach at J.P. Morgan, stemming from a software vulnerability discovered on February 26, 2024. The incident exposed sensitive personal and financial information of an unspecified number of individuals, including names, addresses, Social Security numbers, and bank account details. The breach posed a severe risk of identity theft, financial fraud, and unauthorized access to customer accounts, given the highly confidential nature of the compromised data. While the exact scale of the breach remains undisclosed, the exposure of such critical information particularly Social Security numbers and banking details heightens the potential for long-term reputational damage, regulatory scrutiny, and legal repercussions for the financial institution. The incident underscores vulnerabilities in J.P. Morgan’s digital infrastructure, raising concerns about the adequacy of its cybersecurity measures in safeguarding customer data against exploitation by malicious actors.


J.P. Morgan has 50.5% fewer incidents than the average of same-industry companies with at least one recorded incident.
J.P. Morgan has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
J.P. Morgan reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
J.P. Morgan cyber incidents detection timeline including parent company and subsidiaries

J.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built upon our core principle of putting our clients' interests first. J.P. Morgan is part of JPMorgan Chase & Co. (NYSE: JPM), a global financial services firm. Social Media Terms and Conditions: https://bit.ly/JPMCSocialTerms © 2017 JPMorgan Chase & Co. JPMorgan Chase is an equal opportunity and affirmative action employer Disability/Veteran.


Prudential Financial (NYSE:PRU) was founded on the belief that financial security should be within reach for everyone, and for over 140 years, we have helped our customers reach their potential and tackle life's challenges for now and future generations to come. Today, we are one of the world’s larg

As a global leader in innovative wealth management, asset servicing and investment solutions, Northern Trust (Nasdaq: NTRS) is proud to guide the world’s most successful individuals, families and institutions by remaining true to our enduring principles of service, expertise and integrity. A global
Old Mutual Limited is a listed company on the Johannesburg Stock Exchange and has secondary listings on the London, Malawi, Namibia and Zimbabwe stock exchanges. As a Pan-African financial services company, we are focused on Africa, her needs and her people. Together with you, we have educated our

Living mutual has always been at the core of our human existence, and it's the principle that's guided us since our founding in 1851. It's not a concept we invented, but one we champion for the simple reason that people take it for granted today. While the world would have us strive for independenc
S&P Global (NYSE: SPGI) enables businesses, governments, and individuals with trusted data, expertise and technology to make decisions with conviction. We are Advancing Essential Intelligence through world-leading benchmarks, data, and insights that customers need in order to plan confidently, act d

Bloomberg is a global leader in business and financial information, delivering trusted data, news, and insights that bring transparency and efficiency, and fairness to markets. We help connect influential communities across the global financial ecosystem via reliable technology solutions that enable

KPMG is one of the world’s leading professional services firms and the fastest growing Big Four accounting firm in the United States. With 90+ offices and more than 36,000 employees and partners throughout the US, we’re leading the industry in new and exciting ways. Our size and strength make us muc
People deserve more from their money. More visibility, more control, and more freedom. Since 2015, Revolut has been on a mission to deliver just that. Our powerhouse of products help our 65+ million customers get more from their money every day. As we continue our lightning-fast growth, 2 things a

Mahindra & Mahindra Financial Services Limited (Mahindra Finance), part of the Mahindra Group, is one of India's leading non-banking finance companies. Focused on the rural and semi-urban sector, the Company has over 10 million customers and has an AUM of over USD 11 Billion. The company is a lead
.png)
As cyber attacks rise in scale and sophistication, investors must assess how prepared companies are to manage cyber risk and build long-term...
Sophisticated 7-stage phishing using Cisco, JP Morgan targets Outpost24 exec. Kratos toolkit evades bots; real payload activates only on...
With escalating geopolitical conflicts, the risk of cyber threats grows, making it crucial to enhance your cybersecurity defenses to protect...
Cybersecurity isn't just defense—it's a growth engine reshaping Latin America's digital future.
As artificial intelligence panic fuels exaggerated fears of disruption and sell-offs, cybersecurity and sovereign infrastructure stand to...
CrowdStrike, Zscaler, Palo Alto Networks, and other cybersecurity stocks fall after Anthropic releases new Claude security tool.
Cybersecurity stocks have performed well as high-profile hacks and AI draw attention to the need for strong digital protection.
JPMorgan identified CrowdStrike (CRWD), Palo Alto Networks (PANW) and Zscaler (ZS) as long-term winners amid AI-driven cyber threats.
Anthropic released 11 new plug-ins for its Claude Cowork AI tool at the end of January sparking a massive sell-off in SaaS stocks.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of J.P. Morgan is http://www.jpmorgan.com.
According to Rankiteo, J.P. Morgan’s AI-generated cybersecurity score is 810, reflecting their Good security posture.
According to Rankiteo, J.P. Morgan currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, J.P. Morgan has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, J.P. Morgan is not certified under SOC 2 Type 1.
According to Rankiteo, J.P. Morgan does not hold a SOC 2 Type 2 certification.
According to Rankiteo, J.P. Morgan is not listed as GDPR compliant.
According to Rankiteo, J.P. Morgan does not currently maintain PCI DSS compliance.
According to Rankiteo, J.P. Morgan is not compliant with HIPAA regulations.
According to Rankiteo,J.P. Morgan is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
J.P. Morgan operates primarily in the Financial Services industry.
J.P. Morgan employs approximately 82,484 people worldwide.
J.P. Morgan presently has no subsidiaries across any sectors.
J.P. Morgan’s official LinkedIn profile has approximately 5,796,290 followers.
J.P. Morgan is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, J.P. Morgan does not have a profile on Crunchbase.
Yes, J.P. Morgan maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jpmorgan.
As of April 02, 2026, Rankiteo reports that J.P. Morgan has experienced 2 cybersecurity incidents.
J.P. Morgan has an estimated 31,536 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with specops software (outpost24 subsidiary)..
Title: J.P. Morgan Data Breach Due to Software Issue (2024)
Description: The Vermont Office of the Attorney General reported a data breach involving J.P. Morgan that occurred due to a software issue on February 26, 2024, potentially affecting personal and financial information, including names, addresses, Social Security numbers, and bank account details of an unknown number of individuals.
Date Detected: 2024-02-26
Date Publicly Disclosed: 2024-04-18
Type: Data Breach
Vulnerability Exploited: Software Issue
Title: Sophisticated Phishing Attack Targets Outpost24 C-Level Executive Using Kratos Kit
Description: A high-profile phishing attack targeted a C-level executive at Outpost24, a Swedish exposure management and identity security firm, leveraging the recently identified Kratos phishing-as-a-service (PhaaS) kit. The attack employed a seven-step chain of redirects through trusted services to evade detection and trick the victim.
Type: Phishing
Attack Vector: Email
Vulnerability Exploited: DMARC authentication bypass, trusted infrastructure abuse
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing email (JP Morgan-themed).

Data Compromised: Names, Addresses, Social security numbers, Bank account details
Identity Theft Risk: Potential
Payment Information Risk: Potential

Data Compromised: Credentials (Microsoft 365)
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Financial Information, and Credentials.

Entity Name: J.P. Morgan
Entity Type: Financial Institution
Industry: Banking/Financial Services
Location: United States
Customers Affected: Unknown

Entity Name: Outpost24
Entity Type: Organization
Industry: Cybersecurity (Exposure Management & Identity Security)
Location: Sweden

Third Party Assistance: Specops Software (Outpost24 subsidiary)
Third-Party Assistance: The company involves third-party assistance in incident response through Specops Software (Outpost24 subsidiary).

Type of Data Compromised: Personal information, Financial information
Number of Records Exposed: Unknown
Sensitivity of Data: High
Personally Identifiable Information: namesaddressesSocial Security numbers

Type of Data Compromised: Credentials
Sensitivity of Data: High (Microsoft 365 logins)

Regulatory Notifications: Vermont Office of the Attorney General

Lessons Learned: The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Key Lessons Learned: The key lessons learned from past incidents are The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.

Source: Vermont Office of the Attorney General
Date Accessed: 2024-04-18

Source: Specops Software (Outpost24 subsidiary)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-04-18, and Source: Specops Software (Outpost24 subsidiary).

Entry Point: Phishing email (JP Morgan-themed)
High Value Targets: C-level executive
Data Sold on Dark Web: C-level executive

Root Causes: Software Issue

Root Causes: Abuse of trusted infrastructure (Cisco Secure Email Gateway, Nylas, Cloudflare), DMARC bypass, repurposed domain
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Specops Software (Outpost24 subsidiary).
Most Recent Incident Detected: The most recent incident detected was on 2024-02-26.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-18.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, bank account details, and Credentials (Microsoft 365).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Specops Software (Outpost24 subsidiary).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, addresses, Credentials (Microsoft 365), names and bank account details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The incident underscores the growing sophistication of phishing campaigns, particularly those leveraging trusted infrastructure to bypass security controls.
Most Recent Source: The most recent source of information about an incident are Vermont Office of the Attorney General and Specops Software (Outpost24 subsidiary).
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing email (JP Morgan-themed).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Software Issue, Abuse of trusted infrastructure (Cisco Secure Email Gateway, Nylas, Cloudflare), DMARC bypass, repurposed domain.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.