State of Oregon Company Cyber Security Posture

oregon.gov

Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate much of Oregon's northern and eastern boundaries, respectively. The area was inhabited by many indigenous tribes before the arrival of traders, explorers, and settlers who formed an autonomous government in Oregon Country in 1843. The Oregon Territory was created in 1848, and Oregon became the 33rd state on February 14, 1859.

SO Company Details

Linkedin ID:

state-of-oregon

Employees number:

10204 employees

Number of followers:

40740.0

NAICS:

922

Industry Type:

Government Administration

Homepage:

oregon.gov

IP Addresses:

Scan still pending

Company ID:

STA_3243538

Scan Status:

In-progress

AI scoreSO Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

State of Oregon Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

State of Oregon Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
Oregon Department of TransportationBreach100406/2023ORE61425623Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Millions of drivers and car owners had their personal information taken as a result of the MOVEit breach, including the departments of motor vehicles in Louisiana and Oregon. The company was hacked, exposing information from an estimated 3.5 million identity cards and driver's licences. Given that many people's personal information was exposed to potential unscrupulous actors, the Oregon DMV data breach could be risky for them. As of right now, there is no evidence that the MOVEit hacker group sold, exchanged, or publicly publicised the OMV information they stole.

Oregon Department of TransportationRansomware100511/2023ORE45181223Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: The MOVEit Transfer file transfer platform, created by Progress Software Corporation, was the subject of a recent, major hacking effort by the Cl0p ransomware group, according to alarming information disclosed by cybersecurity firm Emsisoft. The analysts estimate that 60,144,069 people and about 1,000 organisations were affected by the attacks. The Cl0p group's leak site, state breach reports, SEC filings, and other public disclosures are the sources of the data. The attacks affected tens of millions of people, according to the experts. Maximus, Pรดle emploi, Louisiana Office of Motor Vehicles, Colorado Department of Health Care Policy and Financing, Oregon Department of Transportation, Teachers Insurance and Annuity Association of America, Genworth, PH Tech, and Milliman Solutions are the organisations with the greatest number of affected persons.

State of Oregon Company Subsidiaries

SubsidiaryImage

Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate much of Oregon's northern and eastern boundaries, respectively. The area was inhabited by many indigenous tribes before the arrival of traders, explorers, and settlers who formed an autonomous government in Oregon Country in 1843. The Oregon Territory was created in 1848, and Oregon became the 33rd state on February 14, 1859.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=state-of-oregon' -H 'apikey: YOUR_API_KEY_HERE'
newsone

SO Cyber Security News

2025-04-10T07:00:00.000Z
Oregonโ€™s environmental agency shuts down network after cyberattack

The Qilin ransomware group did take credit on Thursday for an attack on Nebraska's North Platte Natural Resources District, which confirmed in aย ...

2025-04-29T07:00:00.000Z
Oregon agencyโ€™s sensitive data published to dark web, ransomware group claims

A ransomware group released millions of files they said were stolen from Oregon Department of Environmental Quality, Oregon Public Radioย ...

2025-04-09T07:00:00.000Z
Cyberattack hits Oregon Department of Environmental Quality

The cyberattack has put a near-halt to most office work at DEQ as employees can't use computers or access files on their shared network.

2024-10-02T07:00:00.000Z
Budget restrictions, staff issues, and AI are threats to statesโ€™ cybersecurity

Many state officials say they lack the budget, resources, staff or expertise to guard their government networks against cyberattacks.

2025-04-11T07:00:00.000Z
Cyber Attack Impacting Oregon Environmental Department

The Oregon Department of Environmental Quality has reported a cyber attack that is affecting communications and operations including vehicleย ...

2025-04-25T07:00:00.000Z
Hackers release millions of files after Oregon DEQ cyberattack

A ransomware group has released over a million files that the group says it stole from the Oregon Department of Environmental Quality. The filesย ...

2025-05-08T07:00:00.000Z
New DEI conditions put Oregon's access to election security funds at risk

States must agree to the new conditions in order to get federal funds for things that can make elections more secure.

2024-10-15T07:00:00.000Z
UIT brings spooky, scary fun to October cybersecurity outreach event

The theme of the event was Spam Mail Kids โ€“ a nod to the satirical Garbage Pail Kids trading cards that were popular in the 1980s. The eventย ...

2024-12-26T08:00:00.000Z
Portland Cybersecurity Job Market: Trends and Growth Areas for 2024

Explore Portland's cybersecurity job market, trends, top job roles, educational opportunities, and hiring companies for 2024 in Oregon, US.

similarCompanies

SO Similar Companies

City of Philadelphia

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

Ministero dell'Agricoltura, della Sovranitร  alimentare e delle Foreste

Il Ministero dell'Agricoltura, della Sovranitร  alimentare e delle Foreste (Masaf) si occupa dell'elaborazione e del coordinamento delle linee politiche agricole, agroalimentari, forestali, della pesca e dellโ€™ippica a livello nazionale e internazionale. Rappresenta l'Italia in sede europea nelle cont

State of Indiana

State government is more than senators, representatives, and elected officials. We build highways, provide drivers licenses, protect our children and vulnerable populations, create jobs, connect Hoosiers to job opportunities, maintain state parks, train law enforcement officers, and we run museums

TAHRI Mohamed Bechar University

L'Universitรฉ de Bรฉchar Est un รฉtablissement universitaire Algรฉrien crรฉe pour la premiรจre fois en 1986. INES puis CUB pour Centre Universitaire de Bรฉchar et le 07/01/2009 dรฉclarรฉ comme universitรฉ. Depuis peu, le monde est entrรฉ dans le 3รจme millรฉnaire. Un millรฉnaire qui nous impose des dรฉfis au

General Directorate of Forestry

GENERAL DIRECTORATE of FORESTRY (GDF) ORMAN GENEL MรœDรœRLรœฤžรœ (OGM) The first organization of forestry extends back to 1839, during rule of Ottoman Empire. The establishment of the first management planning team in 1916 and the preparation of the first management plan 1917 fall in this period. The

US Environmental Protection Agency (EPA)

U.S. Environmental Protection Agencyโ€™s (EPA) mission is to protect human health and the environment. EPA works to ensure that: - Americans have clean air, land and water; - National efforts to reduce environmental risks are based on the best available scientific information; - Federal laws protecti

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

SO CyberSecurity History Information

How many cyber incidents has SO faced?

Total Incidents: According to Rankiteo, SO has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at SO?

Incident Types: The types of cybersecurity incidents that have occurred incidents Ransomware and Breach.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: MOVEit Transfer Platform Hack by Cl0p Ransomware Group

Description: The MOVEit Transfer file transfer platform, created by Progress Software Corporation, was the subject of a recent, major hacking effort by the Cl0p ransomware group.

Type: Ransomware

Threat Actor: Cl0p ransomware group

Motivation: Data exfiltration and ransom

Incident : Data Breach

Title: MOVEit Data Breach

Description: Millions of drivers and car owners had their personal information taken as a result of the MOVEit breach, including the departments of motor vehicles in Louisiana and Oregon. The company was hacked, exposing information from an estimated 3.5 million identity cards and driver's licences. Given that many people's personal information was exposed to potential unscrupulous actors, the Oregon DMV data breach could be risky for them. As of right now, there is no evidence that the MOVEit hacker group sold, exchanged, or publicly publicised the OMV information they stole.

Type: Data Breach

Threat Actor: MOVEit hacker group

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware ORE45181223

Data Compromised: 60,144,069 people

Incident : Data Breach ORE61425623

Data Compromised: personal information, identity cards, driver's licences

Identity Theft Risk: High

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are personal information, identity cards and driver's licences.

Which entities were affected by each incident?

Incident : Ransomware ORE45181223

Entity Type: Corporation

Industry: Software

Customers Affected: 60,144,069 people and about 1,000 organisations

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Ransomware ORE45181223

Entity Type: Government

Incident : Ransomware ORE45181223

Entity Type: Government

Incident : Ransomware ORE45181223

Entity Type: Government

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Ransomware ORE45181223

Entity Type: Organization

Incident : Data Breach ORE61425623

Entity Type: Government

Industry: Public Sector

Location: Louisiana

Incident : Data Breach ORE61425623

Entity Type: Government

Industry: Public Sector

Location: Oregon

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware ORE45181223

Number of Records Exposed: 60,144,069

Data Exfiltration: True

Incident : Data Breach ORE61425623

Type of Data Compromised: personal information, identity cards, driver's licences

Number of Records Exposed: 3.5 million

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware ORE45181223

Ransomware Strain: Cl0p

Data Exfiltration: True

References

Where can I find more information about each incident?

Incident : Ransomware ORE45181223

Source: Emsisoft

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Emsisoft.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Cl0p ransomware group and MOVEit hacker group.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were 60,144,069 people, personal information, identity cards and driver's licences.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 60,144,069 people, personal information, identity cards and driver's licences.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 63.6M.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Emsisoft.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge