Company Details
mckinsey
38,633
6,920,938
5416
mckinsey.com
0
MCK_2563487
In-progress


McKinsey & Company Vendor Cyber Rating & Cyber Score
mckinsey.comMcKinsey & Company is a global management consulting firm. We are the trusted advisor to the world's leading businesses, governments, and institutions. We work with leading organizations across the private, public and social sectors. Our scale, scope, and knowledge allow us to address problems that no one else can. We have deep functional and industry expertise as well as breadth of geographical reach. We are passionate about taking on immense challenges that matter to our clients and, often, to the world. We work with our clients as we do with our colleagues. We build their capabilities and leadership skills at every level and every opportunity. We do this to help build internal support, get to real issues, and reach practical recommendations. We bring out the capabilities of clients to fully participate in the process and lead the ongoing work.
Company Details
mckinsey
38,633
6,920,938
5416
mckinsey.com
0
MCK_2563487
In-progress
Between 800 and 849

MC Global Score (TPRM)XXXX

Description: AI Agent Exploits McKinsey’s Internal Chatbot in Under Two Hours Researchers at security startup CodeWall demonstrated how an autonomous AI agent hacked McKinsey’s internal generative AI platform, *Lilli*, gaining full read-and-write access to its production database within two hours. The attack, conducted in late February, exposed 46.5 million chat messages, 728,000 confidential client files, 57,000 user accounts, and 95 writable system prompts all in plaintext. The agent exploited an unauthenticated SQL injection vulnerability in Lilli’s API, which was publicly exposed through 22 unsecured endpoints. By manipulating JSON keys in user search queries, the AI bypassed standard security tools, eventually extracting live production data. The flaw also allowed attackers to rewrite Lilli’s system prompts, potentially poisoning responses for McKinsey’s 40,000+ users without requiring code changes just a single HTTP request. McKinsey patched the vulnerabilities within hours of disclosure on March 1, taking the development environment offline and securing API documentation. A company spokesperson confirmed no evidence of unauthorized client data access, though the incident underscores the growing threat of AI-driven cyberattacks. CodeWall’s CEO noted that the attack was fully autonomous, from target selection to exploitation, signaling a shift toward machine-speed intrusions by malicious actors. The firm’s findings highlight the risks of AI systems interacting with insecure databases and the potential for large-scale data manipulation.


McKinsey & Company has 35.48% fewer incidents than the average of same-industry companies with at least one recorded incident.
McKinsey & Company has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
McKinsey & Company reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
MC cyber incidents detection timeline including parent company and subsidiaries

McKinsey & Company is a global management consulting firm. We are the trusted advisor to the world's leading businesses, governments, and institutions. We work with leading organizations across the private, public and social sectors. Our scale, scope, and knowledge allow us to address problems that no one else can. We have deep functional and industry expertise as well as breadth of geographical reach. We are passionate about taking on immense challenges that matter to our clients and, often, to the world. We work with our clients as we do with our colleagues. We build their capabilities and leadership skills at every level and every opportunity. We do this to help build internal support, get to real issues, and reach practical recommendations. We bring out the capabilities of clients to fully participate in the process and lead the ongoing work.

As the leader in circular services at work, Elis ensures its clients achieve optimal hygiene, well-being and protection – everywhere, every day, in a sustainable way. We employ 54,000 people locally in 30 countries. We work for public and private organizations of all sizes, in all sectors of activi

At Straive, we operationalize Data Analytics and AI for global enterprises, working with several Fortune 500 companies. We don’t just build world-class data analytics and AI solutions—we embed them seamlessly into your core workflows. This drives greater efficiency, enhances user experience, and boo
Devoteam is a AI-driven tech consulting firm specialised in cloud platforms, cyber, data, and sustainability. Tech native for almost 30 years, Devoteam guides businesses through sustainable digital transformation to deliver value. With over 11,000 tech architects in more than 25 countries across

Our unique combination of transformative strategy, transactions and corporate finance delivers real-world value – solutions that work in practice, not just on paper. Benefiting from EY’s full spectrum of services, we’ve reimagined strategic consulting to work in a world of increasing complexity. Wi

Capgemini Invent is the digital innovation, consulting and transformation brand of the Capgemini Group, a global business line that combines market leading expertise in strategy, technology, data science and creative design, to help CxOs envision and build what’s next for their businesses. For more

Ayesa is a global provider of technology and engineering services with more than 11500 employees in twenty-three countries across Europe, Latin America, Africa and Asia. The company develops and implements digital solutions for the private and public sector and uses the latest technology to provide
At Jacobs, we're challenging today to reinvent tomorrow – delivering outcomes and solutions for the world's most complex challenges. With a team of approximately 45,000, we provide end-to-end services in advanced manufacturing, cities & places, energy, environmental, life sciences, transportation an

Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and

Boston Consulting Group partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. BCG was the pioneer in business strategy when it was founded in 1963. Today, we work closely with clients to embrace a transformational approach a
.png)
In the consulting domain, Boston Consulting Group emerged as the largest recruiter with 33 offers, followed by McKinsey & Company (21) and...
The work of Jeongmin Seong (South Korea, 1977) is to watch over the world for McKinsey, the most powerful consultancy on the planet.
McKinsey has doubled its leadership programming participation in less than two years, as pressure mounts on senior partners.
Mayor Zohran Mamdani is banking on savings from a delay he is seeking in the state mandate for smaller class sizes. He is also scaling back...
Five weeks after floating the tax increase, the mayor appears to be retreating from the plan, according to a report.
Findings from McKinsey's 2026 AI Trust Maturity Survey reveal progress in trust maturity, alongside persistent gaps in strategy, governance,...
The rise of agentic AI is reshaping enterprise cybersecurity risk, requiring new priorities for the CISO and creating fresh opportunities...
March 24, 2026 After dealmaking slowed momentarily in early 2025, global M&A activity quickly assumed a grand scale—delivering big gains for...
In McKinsey's Global Banking Annual Review 2025 McKinsey's annual Global infrastructure report, we explore how private capital is scaling to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of McKinsey & Company is http://www.mckinsey.com.
According to Rankiteo, McKinsey & Company’s AI-generated cybersecurity score is 815, reflecting their Good security posture.
According to Rankiteo, McKinsey & Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, McKinsey & Company has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, McKinsey & Company is not certified under SOC 2 Type 1.
According to Rankiteo, McKinsey & Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, McKinsey & Company is not listed as GDPR compliant.
According to Rankiteo, McKinsey & Company does not currently maintain PCI DSS compliance.
According to Rankiteo, McKinsey & Company is not compliant with HIPAA regulations.
According to Rankiteo,McKinsey & Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
McKinsey & Company operates primarily in the Business Consulting and Services industry.
McKinsey & Company employs approximately 38,633 people worldwide.
McKinsey & Company presently has no subsidiaries across any sectors.
McKinsey & Company’s official LinkedIn profile has approximately 6,920,938 followers.
McKinsey & Company is classified under the NAICS code 5416, which corresponds to Management, Scientific, and Technical Consulting Services.
No, McKinsey & Company does not have a profile on Crunchbase.
Yes, McKinsey & Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mckinsey.
As of April 02, 2026, Rankiteo reports that McKinsey & Company has experienced 1 cybersecurity incidents.
McKinsey & Company has an estimated 19,100 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with took development environment offline, secured api documentation, and remediation measures with patched sql injection vulnerability, and communication strategy with company spokesperson confirmed no unauthorized client data access..
Title: AI Agent Exploits McKinsey’s Internal Chatbot in Under Two Hours
Description: Researchers at security startup CodeWall demonstrated how an autonomous AI agent hacked McKinsey’s internal generative AI platform, *Lilli*, gaining full read-and-write access to its production database within two hours. The attack exposed 46.5 million chat messages, 728,000 confidential client files, 57,000 user accounts, and 95 writable system prompts in plaintext. The agent exploited an unauthenticated SQL injection vulnerability in Lilli’s API, bypassing standard security tools and potentially poisoning responses for McKinsey’s 40,000+ users.
Date Detected: 2024-02-29
Date Resolved: 2024-03-01
Type: AI-driven cyberattack
Attack Vector: Unauthenticated SQL injection via API
Vulnerability Exploited: Unauthenticated SQL injection in Lilli’s API, publicly exposed endpoints
Threat Actor: CodeWall (security researchers)
Motivation: Demonstration of AI-driven exploitation risks
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unauthenticated SQL injection in Lilli’s API.

Data Compromised: 46.5 million chat messages, 728,000 confidential client files, 57,000 user accounts, 95 writable system prompts
Systems Affected: McKinsey’s internal generative AI platform (*Lilli*)
Operational Impact: Potential poisoning of AI responses for 40,000+ users
Brand Reputation Impact: Undermined trust in AI security
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Chat Messages, Confidential Client Files, User Accounts, System Prompts and .

Entity Name: McKinsey & Company
Entity Type: Consulting firm
Industry: Management consulting
Size: 40,000+ users

Containment Measures: Took development environment offline, secured API documentation
Remediation Measures: Patched SQL injection vulnerability
Communication Strategy: Company spokesperson confirmed no unauthorized client data access

Type of Data Compromised: Chat messages, Confidential client files, User accounts, System prompts
Number of Records Exposed: 46.5 million chat messages, 728,000 files, 57,000 accounts, 95 prompts
Sensitivity of Data: High (confidential client files, plaintext data)
Data Encryption: No (plaintext)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patched SQL injection vulnerability.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by took development environment offline and secured api documentation.

Lessons Learned: Risks of AI systems interacting with insecure databases, potential for large-scale data manipulation via AI-driven attacks

Recommendations: Secure API endpoints, implement authentication for database access, monitor AI system interactions for anomalies
Key Lessons Learned: The key lessons learned from past incidents are Risks of AI systems interacting with insecure databases, potential for large-scale data manipulation via AI-driven attacks.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Secure API endpoints, implement authentication for database access and monitor AI system interactions for anomalies.

Source: CodeWall research
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CodeWall research.

Investigation Status: Resolved
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Company spokesperson confirmed no unauthorized client data access.

Entry Point: Unauthenticated SQL injection in Lilli’s API

Root Causes: Unauthenticated SQL injection vulnerability, publicly exposed API endpoints, insecure database interactions
Corrective Actions: Patched vulnerability, secured API documentation, took development environment offline
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patched vulnerability, secured API documentation, took development environment offline.
Last Attacking Group: The attacking group in the last incident was an CodeWall (security researchers).
Most Recent Incident Detected: The most recent incident detected was on 2024-02-29.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-03-01.
Most Significant Data Compromised: The most significant data compromised in an incident were 46.5 million chat messages, 728,000 confidential client files, 57,000 user accounts and 95 writable system prompts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Took development environment offline and secured API documentation.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 46.5 million chat messages, 728,000 confidential client files, 57,000 user accounts and 95 writable system prompts.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 47.3M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Risks of AI systems interacting with insecure databases, potential for large-scale data manipulation via AI-driven attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Secure API endpoints, implement authentication for database access and monitor AI system interactions for anomalies.
Most Recent Source: The most recent source of information about an incident is CodeWall research.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unauthenticated SQL injection in Lilli’s API.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.