
Orange Cyberdefense Company Cyber Security Posture
orangecyberdefense.comOrange Cyberdefense is the expert cybersecurity business unit of the Orange Group. As the leading security provider, we strive to build a safer digital society.
Orange Cyberdefense Company Details
orange-cyberdefense
3651 employees
187149
541
IT Services and IT Consulting
orangecyberdefense.com
Scan still pending
ORA_2498266
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Orange Cyberdefense Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Orange Cyberdefense Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Orange | Cyber Attack | 100 | 6 | 03/2022 | ORA2548322 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: The cyber attackers targeted Orange and its subsidiary internet provider Nordnet in France. The cyberattack affected thousands of internet users across Europe amid the Ukraine-Russia war. Nearly 9,000 subscribers were affected by this internet outage. | |||||||
Orange | Ransomware | 80 | 4 | 07/2020 | ORA2911822 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: French telecommunications company Orange S.A.was targeted by a Nefilim ransomware group which resulted in data loss. The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems. The data from about 20 customers on its virtual hosting service was accessed by those behind the ransomware attack. | |||||||
Orange Cyberdefense | Breach | 100 | 5 | 09/2022 | ORA2131141122 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: Orange Cyberdefense apparently suffered a data breach incident after a popular forum offered data allegedly from their firm. Data in the sample included Contact Name, Email, Phone Number, Company Name, and Solution Name. The listing also offered to sell access to Orange Cyberdefenseโs servers. | |||||||
Orange | Cyber Attack | 60 | 2 | 01/2024 | ORA214221124 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: An unknown number of consumers were unable to access specific websites as a result of a hack that targeted Orange's Spanish business, a telecom operator. Orange successfully identified and neutralised the majority of the unauthorised access to its IP network coordination centre. The French corporation said that there was no risk to client data in a message posted on the social networking platform X. | |||||||
Orange | Ransomware | 100 | 4 | 3/2025 | ORA625031825 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Major telecommunications provider Orange suffered a severe security breach by the Babuk ransomware gang, resulting in the theft of 4.5 TB of sensitive data. The compromised data includes customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, and other personal information. This cyberattack has put both customers and the company at significant risk, impacting the confidentiality, integrity, and availability of valuable data. |
Orange Cyberdefense Company Subsidiaries

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group. As the leading security provider, we strive to build a safer digital society.
Access Data Using Our API

Get company history
.png)
Orange Cyberdefense Cyber Security News
Dominic, Director of Strategy and Alliances โCybersecurity isnโt just about hacking or technical rolesโ
Dominic, tell us about your job, your department, and your teams in a few words? I work for Orange Cyberdefense in the UK and my role focuses on two areas:ย ...
CrowdStrike Falcon Platform Selected by Orange Cyberdefense to Enhance its Cybersecurity in Europe and North Africa
The AI-native CrowdStrike Falcon platform delivers best-in-class protection across endpoint, identity, cloud and data, all from a single,ย ...
Security Navigator 2025
The Security Navigator 2025 attributes nearly 1 in 4 (23%) of sophisticated attacks targeting OT to hacktivists. As such attacks have typicallyย ...
Hacktivists' threat to infrastructure and AI among largest cybersecurity trends โ Orange Cyberdefense
Orange Cyberdefense has released a report summarizing its research into cybersecurity topics and trends, putting the spotlight on hacktivists and AI.
Orange Cyberdefense's Wicus Ross Talks Cyber Extortion Trend
Share. Share. One dramatic finding was how small businesses are four times more likely to be targeted by cyber attackers.
F-Secure Kicks in Total Threat Protection for Orange Customers
Global consumer cyber security leader F-Secure has unveiled its strategic partnership with Orange. This announcement highlights F-Secure's position asย ...
Orange Cyberdefense earns Cortex XMDR Select status in Asia Pacific
The company, which is part of the Orange Group and focuses on cybersecurity solutions and services, joins a select group of global channelย ...
UK not ready for AI cyber threats despite growing awareness
Fewer UK businesses experienced a cyber attack in the last 12 months compared to last year, but boards still need a push to take measuresย ...
Orange Cyberdefense appoints Ajay Bhardwaj as UK director
Orange Cyberdefense has announced the appointment of Ajay Bhardwaj as UK Managing Director. Ajay Bhardwaj is tasked with increasing marketย ...

Orange Cyberdefense Similar Companies

Velocity Partners
En enero de 2018 nos unimos a Endava Group y somos ahora miembros de una compaรฑรญa de tecnologรญa con mรกs de 17 aรฑos de experiencia trabajando para firmas lรญderes del sector financiero, seguros, telecomunicaciones, medios, tecnologรญa y retail. A travรฉs de la evoluciรณn digital, la transformaciรณn รกgil y

HGS
A global leader in optimizing the customer experience lifecycle, digital transformation, and business process management, HGS is helping its clients become more competitive every day. HGS combines automation, analytics, and artificial intelligence with deep domain expertise focusing on digital custo

Indra
Indra (www.indracompany.com) is one of the leading global defence, aerospace and technology companies, and a world leader in digital transformation and information technologies in Spain and Latin America through its subsidiary, Minsait. Its business model is based on a comprehensive range of proprie

IAP
IAP is a top-tier Japanese IT consulting and professional services firm, headquarters in Tokyo, Japan and a well established Quality certified development center in India. IAP has a technical and academic alliance program with more than 40 companies and organizations worldwide, creating a pooled w

Kyndryl
We have the worldโs best talent that design, run, and manage the most advanced and reliable technology infrastructure each day. Together, we think holistically about the health of these vital technology ecosystems. We are a focused, independent company that builds on our foundation of excellence by

UST
UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the worldโs best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to op

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Orange Cyberdefense CyberSecurity History Information
How many cyber incidents has Orange Cyberdefense faced?
Total Incidents: According to Rankiteo, Orange Cyberdefense has faced 5 incidents in the past.
What types of cybersecurity incidents have occurred at Orange Cyberdefense?
Incident Types: The types of cybersecurity incidents that have occurred incidents Breach, Ransomware and Cyber Attack.
How does Orange Cyberdefense detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Identified and neutralised the majority of the unauthorised access and communication strategy with Posted a message on the social networking platform X and containment measures with The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Incident Details
Can you provide details on each incident?

Incident : Data Breach, Ransomware
Title: Orange Telecommunications Breach by Babuk Ransomware
Description: Major telecommunications provider Orange suffered a severe security breach by the Babuk ransomware gang, resulting in the theft of 4.5 TB of sensitive data. The compromised data includes customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, and other personal information. This cyberattack has put both customers and the company at significant risk, impacting the confidentiality, integrity, and availability of valuable data.
Type: Data Breach, Ransomware
Threat Actor: Babuk ransomware gang

Incident : Hack
Title: Hack Targeting Orange's Spanish Business
Description: An unknown number of consumers were unable to access specific websites as a result of a hack that targeted Orange's Spanish business, a telecom operator. Orange successfully identified and neutralised the majority of the unauthorised access to its IP network coordination centre. The French corporation said that there was no risk to client data in a message posted on the social networking platform X.
Type: Hack

Incident : Data Breach
Title: Data Breach at Orange Cyberdefense
Description: Orange Cyberdefense suffered a data breach incident after a popular forum offered data allegedly from their firm. The data in the sample included Contact Name, Email, Phone Number, Company Name, and Solution Name. The listing also offered to sell access to Orange Cyberdefenseโs servers.
Type: Data Breach
Motivation: Data Theft, Financial Gain

Incident : Ransomware
Title: Orange S.A. Nefilim Ransomware Attack
Description: French telecommunications company Orange S.A. was targeted by a Nefilim ransomware group which resulted in data loss.
Type: Ransomware
Threat Actor: Nefilim ransomware group

Incident : Cyber Attack
Title: Cyber Attack on Orange and Nordnet
Description: Cyber attackers targeted Orange and its subsidiary internet provider Nordnet in France, affecting thousands of internet users across Europe amid the Ukraine-Russia war.
Type: Cyber Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach, Ransomware ORA625031825
Data Compromised: customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information

Incident : Hack ORA214221124
Systems Affected: IP network coordination centre
Operational Impact: Consumers unable to access specific websites

Incident : Data Breach ORA2131141122
Data Compromised: Contact Name, Email, Phone Number, Company Name, Solution Name

Incident : Ransomware ORA2911822
Data Compromised: Data from about 20 customers on its virtual hosting service was accessed.

Incident : Cyber Attack ORA2548322
Systems Affected: Internet Services
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name and Solution Name.
Which entities were affected by each incident?

Incident : Data Breach, Ransomware ORA625031825
Entity Type: Telecommunications provider
Industry: Telecommunications

Incident : Hack ORA214221124
Entity Type: Telecom Operator
Industry: Telecommunications
Location: Spain
Customers Affected: Unknown number

Incident : Ransomware ORA2911822
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: France
Customers Affected: 20

Incident : Cyber Attack ORA2548322
Entity Type: Company
Industry: Telecommunications
Location: France
Customers Affected: 9000

Incident : Cyber Attack ORA2548322
Entity Type: Company
Industry: Internet Service Provider
Location: France
Customers Affected: 9000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Hack ORA214221124
Containment Measures: Identified and neutralised the majority of the unauthorised access
Communication Strategy: Posted a message on the social networking platform X

Incident : Ransomware ORA2911822
Containment Measures: The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach, Ransomware ORA625031825
Type of Data Compromised: customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Incident : Data Breach ORA2131141122
Type of Data Compromised: Contact Name, Email, Phone Number, Company Name, Solution Name
Personally Identifiable Information: Contact Name, Email, Phone Number
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Identified and neutralised the majority of the unauthorised access and The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware ORA2911822
Ransomware Strain: Nefilim
References
Where can I find more information about each incident?

Incident : Hack ORA214221124
Source: Social networking platform X
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Social networking platform X.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Posted a message on the social networking platform X.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach ORA2131141122
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an Babuk ransomware gang and Nefilim ransomware group.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name, Solution Name and Data from about 20 customers on its virtual hosting service was accessed..
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was IP network coordination centre and Internet Services.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Identified and neutralised the majority of the unauthorised access and The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name, Solution Name and Data from about 20 customers on its virtual hosting service was accessed..
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is Social networking platform X.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
