
Orange Polska Company Cyber Security Posture
orange.plOrange Polska is the principal supplier of telecommunications services in Poland. Orange Polska provides services, including fixed-line voice telecommunications, voice mail, fixed access to the Internet and Voice over Internet Protocol (โVoIPโ). Orange Polska provides telecommunications services on the basis of entry number 1 in the register of telecommunications companies carried out by the President of Office of Electronic Communication. Through its subsidiary, Polska Telefonia Komรณrkowa-Centertel Sp. z o.o., the Group is one of Polandโs major DCS 1800 and GSM 900 mobile telecommunications providers. PTK-Centertel also provides third generation UMTS services and services based on the CDMA technology. In addition, the Group provides leased lines, radio-communications and other telecommunications value added services, sells telecommunications equipment, electronic phone cards and provides data transmission, multimedia services and various Internet services. As at the end of 2012 Orange Polska had over 20 million customers of different services (mobile, fixed voice, broadband, TV). As at the end of 2012 we achieved revenue of PLN 14.1 billion, EBITDA margin at 34.2% and net free cash flows of PLN 1.5 billion.
Orange Polska Company Details
orangepolska
10,001+ employees
30927
517
Telecommunications
orange.pl
Scan still pending
ORA_2314275
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Orange Polska Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Orange Polska Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Orange | Cyber Attack | 100 | 6 | 03/2022 | ORA2548322 | Link | |
Rankiteo Explanation : Attack threatening the economy of a geographical regionDescription: The cyber attackers targeted Orange and its subsidiary internet provider Nordnet in France. The cyberattack affected thousands of internet users across Europe amid the Ukraine-Russia war. Nearly 9,000 subscribers were affected by this internet outage. | |||||||
Orange | Ransomware | 80 | 4 | 07/2020 | ORA2911822 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: French telecommunications company Orange S.A.was targeted by a Nefilim ransomware group which resulted in data loss. The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems. The data from about 20 customers on its virtual hosting service was accessed by those behind the ransomware attack. | |||||||
Orange Cyberdefense | Breach | 100 | 5 | 09/2022 | ORA2131141122 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: Orange Cyberdefense apparently suffered a data breach incident after a popular forum offered data allegedly from their firm. Data in the sample included Contact Name, Email, Phone Number, Company Name, and Solution Name. The listing also offered to sell access to Orange Cyberdefenseโs servers. | |||||||
Orange | Cyber Attack | 60 | 2 | 01/2024 | ORA214221124 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: An unknown number of consumers were unable to access specific websites as a result of a hack that targeted Orange's Spanish business, a telecom operator. Orange successfully identified and neutralised the majority of the unauthorised access to its IP network coordination centre. The French corporation said that there was no risk to client data in a message posted on the social networking platform X. | |||||||
Orange | Ransomware | 100 | 4 | 3/2025 | ORA625031825 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Major telecommunications provider Orange suffered a severe security breach by the Babuk ransomware gang, resulting in the theft of 4.5 TB of sensitive data. The compromised data includes customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, and other personal information. This cyberattack has put both customers and the company at significant risk, impacting the confidentiality, integrity, and availability of valuable data. |
Orange Polska Company Subsidiaries

Orange Polska is the principal supplier of telecommunications services in Poland. Orange Polska provides services, including fixed-line voice telecommunications, voice mail, fixed access to the Internet and Voice over Internet Protocol (โVoIPโ). Orange Polska provides telecommunications services on the basis of entry number 1 in the register of telecommunications companies carried out by the President of Office of Electronic Communication. Through its subsidiary, Polska Telefonia Komรณrkowa-Centertel Sp. z o.o., the Group is one of Polandโs major DCS 1800 and GSM 900 mobile telecommunications providers. PTK-Centertel also provides third generation UMTS services and services based on the CDMA technology. In addition, the Group provides leased lines, radio-communications and other telecommunications value added services, sells telecommunications equipment, electronic phone cards and provides data transmission, multimedia services and various Internet services. As at the end of 2012 Orange Polska had over 20 million customers of different services (mobile, fixed voice, broadband, TV). As at the end of 2012 we achieved revenue of PLN 14.1 billion, EBITDA margin at 34.2% and net free cash flows of PLN 1.5 billion.
Access Data Using Our API

Get company history
.png)
Orange Polska Cyber Security News
Play joins cybersecurity programme PWCyber
Polish operator Play, controlled by Iliad, has joined the Programme for Cooperation on Cybersecurity (PWCyber) initiated by the Polish Ministry ofย ...
Latest consolidated results
Orange posts robust first-quarter results and confirms its 2025 targets. Solid retail commercial performance. EBITDAaL up +3.2%. 2025 financial targetsย ...
Silk Cloud Partners with Orange Polskaโs Integrated Solutions to Boost Georgiaโs Digital Transformation
The collaboration will enable Silknet and its daughter company Silk Cloud to expand and improve digital services offered to businesses.
Emitel to build hundreds of towers for Orange Poland
Poland-based telecoms infrastructure company Emitel has signed an agreement with Orange to build several hundred new mobile towers across theย ...
Emitel signs mobile towers deal with Orange Poland
Emitel, the Polish arm of UK-based infrastructure investor Cordiant Digital Infrastructure, has signed an agreement to contract new mobileย ...
Orange's Polish unit targets strong cash flow through 2028
The Polish arm of France's Orange on Thursday announced its strategic plan for 2025-2028, forecasting low-to-mid single-digit percentageย ...
Orange Poland stops record 1.3 Tbps DDoS attack on customer
Earlier this March, Orange Poland installed a simulator of cyber-attacks like ransomware in its 5G Lab at the company's headquarters in Warsaw.
Orange Poland completes migration to Teradata Vantage on Google Cloud to speed time-to-market and ROI
Teradata Vantage is the connected multi-cloud data platform for enterprise analytics. It simplifies ecosystems by unifying analytics, data lakesย ...
Orange Moldova names Mariusz Gaca as new CEO
Mariusz Gaca (pictured), the current vice president of the management board of Orange Polska (Poland), has been appointed CEO of Orange Moldova,ย ...

Orange Polska Similar Companies

Tata Communications
Tata Communications is a digital ecosystem enabler that powers todayโs fast-growing digital economy. We enable the digital transformation of enterprises globally, including 300 of the Fortune 500. We carry around 30% of the worldโs internet routes and connects businesses to 60% of the worldโs cloud

Circet
A global player in the telecom infrastructure services industry, the Circet Group provides operators, local authorities and key accounts throughout the world with an integrated turnkey offering of fixed and mobile infrastructure services, including engineering, deployment, installation and maintenan

Ericsson
Our purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision

Motorola Solutions
Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our technologies support public safety agencies and enterprises alike, enabling the collaboration thatโs critical for safer communities, safe

Telmex
TELMEX, la empresa lรญder de telecomunicaciones y servicios TI en Mรฉxico, ha realizado importantes inversiones para desarrollar la plataforma tecnolรณgica mรกs robusta y vanguardista del paรญs, que le permite ofrecer la mรกs amplia gama de soluciones, con los mayores estรกndares de calidad, seguridad, con

Proximus Group
Proximus Group is a provider of future-proof connectivity and digital services, operating in the Benelux as well as global markets. As a major economic player in Belgium, we make the most of every opportunity to positively impact the world around us. The investments we make in our open fixed and mob

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Orange Polska CyberSecurity History Information
How many cyber incidents has Orange Polska faced?
Total Incidents: According to Rankiteo, Orange Polska has faced 5 incidents in the past.
What types of cybersecurity incidents have occurred at Orange Polska?
Incident Types: The types of cybersecurity incidents that have occurred incidents Cyber Attack, Ransomware and Breach.
How does Orange Polska detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Identified and neutralised the majority of the unauthorised access and communication strategy with Posted a message on the social networking platform X and containment measures with The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Incident Details
Can you provide details on each incident?

Incident : Data Breach, Ransomware
Title: Orange Telecommunications Breach by Babuk Ransomware
Description: Major telecommunications provider Orange suffered a severe security breach by the Babuk ransomware gang, resulting in the theft of 4.5 TB of sensitive data. The compromised data includes customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, and other personal information. This cyberattack has put both customers and the company at significant risk, impacting the confidentiality, integrity, and availability of valuable data.
Type: Data Breach, Ransomware
Threat Actor: Babuk ransomware gang

Incident : Hack
Title: Hack Targeting Orange's Spanish Business
Description: An unknown number of consumers were unable to access specific websites as a result of a hack that targeted Orange's Spanish business, a telecom operator. Orange successfully identified and neutralised the majority of the unauthorised access to its IP network coordination centre. The French corporation said that there was no risk to client data in a message posted on the social networking platform X.
Type: Hack

Incident : Data Breach
Title: Data Breach at Orange Cyberdefense
Description: Orange Cyberdefense suffered a data breach incident after a popular forum offered data allegedly from their firm. The data in the sample included Contact Name, Email, Phone Number, Company Name, and Solution Name. The listing also offered to sell access to Orange Cyberdefenseโs servers.
Type: Data Breach
Motivation: Data Theft, Financial Gain

Incident : Ransomware
Title: Orange S.A. Nefilim Ransomware Attack
Description: French telecommunications company Orange S.A. was targeted by a Nefilim ransomware group which resulted in data loss.
Type: Ransomware
Threat Actor: Nefilim ransomware group

Incident : Cyber Attack
Title: Cyber Attack on Orange and Nordnet
Description: Cyber attackers targeted Orange and its subsidiary internet provider Nordnet in France, affecting thousands of internet users across Europe amid the Ukraine-Russia war.
Type: Cyber Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach, Ransomware ORA625031825
Data Compromised: customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information

Incident : Hack ORA214221124
Systems Affected: IP network coordination centre
Operational Impact: Consumers unable to access specific websites

Incident : Data Breach ORA2131141122
Data Compromised: Contact Name, Email, Phone Number, Company Name, Solution Name

Incident : Ransomware ORA2911822
Data Compromised: Data from about 20 customers on its virtual hosting service was accessed.

Incident : Cyber Attack ORA2548322
Systems Affected: Internet Services
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name and Solution Name.
Which entities were affected by each incident?

Incident : Data Breach, Ransomware ORA625031825
Entity Type: Telecommunications provider
Industry: Telecommunications

Incident : Hack ORA214221124
Entity Type: Telecom Operator
Industry: Telecommunications
Location: Spain
Customers Affected: Unknown number

Incident : Ransomware ORA2911822
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: France
Customers Affected: 20

Incident : Cyber Attack ORA2548322
Entity Type: Company
Industry: Telecommunications
Location: France
Customers Affected: 9000

Incident : Cyber Attack ORA2548322
Entity Type: Company
Industry: Internet Service Provider
Location: France
Customers Affected: 9000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Hack ORA214221124
Containment Measures: Identified and neutralised the majority of the unauthorised access
Communication Strategy: Posted a message on the social networking platform X

Incident : Ransomware ORA2911822
Containment Measures: The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach, Ransomware ORA625031825
Type of Data Compromised: customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Incident : Data Breach ORA2131141122
Type of Data Compromised: Contact Name, Email, Phone Number, Company Name, Solution Name
Personally Identifiable Information: Contact Name, Email, Phone Number
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through were Identified and neutralised the majority of the unauthorised access and The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware ORA2911822
Ransomware Strain: Nefilim
References
Where can I find more information about each incident?

Incident : Hack ORA214221124
Source: Social networking platform X
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Social networking platform X.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Posted a message on the social networking platform X.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach ORA2131141122
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an Babuk ransomware gang and Nefilim ransomware group.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name, Solution Name and Data from about 20 customers on its virtual hosting service was accessed..
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was IP network coordination centre and Internet Services.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Identified and neutralised the majority of the unauthorised access and The company's security team was mobilized to identify the origin of the attack and put in place all necessary solutions required to ensure the security of its systems..
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were customer records, email addresses, user data, source code, invoices, internal documents, contracts, employee details, credit cards, messages, call logs, other personal information, Contact Name, Email, Phone Number, Company Name, Solution Name and Data from about 20 customers on its virtual hosting service was accessed..
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is Social networking platform X.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
