Company Details
us-navy
161,815
716,064
92811
navy.mil
322
US _1425552
Completed


US Navy Vendor Cyber Rating & Cyber Score
navy.milThe United States is a maritime nation, and the U.S. Navy protects America at sea. Alongside our allies and partners, we defend freedom, preserve economic prosperity, and keep the seas open and free. Our nation is engaged in long-term competition. To defend American interests around the globe, the U.S. Navy must remain prepared to execute our timeless role, as directed by Congress and the President.
Company Details
us-navy
161,815
716,064
92811
navy.mil
322
US _1425552
Completed
Between 750 and 799

US Navy Global Score (TPRM)XXXX

Description: The US Navy experienced potential vulnerabilities due to the integration of high-speed internet via SpaceX’s Starlink network on warships. The system, SEA2, aimed to improve morale and connectivity, enabling sailors to maintain contact with family and access data at sea. However, unauthorized disclosure of the press release about the installation of Starlink on USS Abraham Lincoln highlighted operational security issues, as the ship was heading to a tense Middle East region. The severity of the breach could be considered high due to possible exploitation by adversaries, leading to significant implications for national security.
Description: In October 2021, the official Facebook page of the USS Kidd, a U.S. Navy warship, was compromised by an unidentified hacker. The attacker took control of the page and streamed gameplay footage of *Age of Empires* for approximately four days before the Navy regained access. While no sensitive military data, operational details, or classified information was exposed, the incident resulted in a loss of reputational control and public embarrassment for the U.S. Navy. The hack demonstrated vulnerabilities in the Navy’s social media security protocols, raising concerns about the potential for more severe cyber intrusions targeting military public-facing platforms. Although the breach did not directly impact national security or operational capabilities, the unauthorized access and prolonged loss of control over an official military communication channel highlighted gaps in cybersecurity oversight for non-classified but high-visibility digital assets. The incident also prompted internal reviews of social media account management practices across Defense Department entities.
Description: A 57-year-old Indian-origin Singaporean woman was jailed up to three years for most extensive bribery and fraud conspiracy in the history of the United States Navy. She had the responsibility of managing ship husbanding contracts worth millions of dollar, with duties such as drafting contract requirements, including negotiating and evaluating bids. Gursharan disclosed non-public information from the US Navy to Francis, which helped GDMA clinch 11 contracts worth a total of about USD 48 million, out of 14 contracts that the company bid for. Gursharan provided sensitive information pertaining to pricing strategies, price information of GDMA’s competitors and questions that the contracts review board had posed to GDMA’s competitors. The scandal has also resulted in the arrest and conviction of several Navy officials in the US.
Description: The United States Navy exposed personal information belonging to 134,386 active and retired sailors. An investigation is being conducted by HPE and NCIS. The infected laptop belonged to an employee of Hewlett Packard Enterprise Services and contained the names and social security numbers of internal staff. It was found that "unknown individuals" had access to the personal information of US Navy personnel by the Naval Criminal Investigative Service (NCIS) and HPE, who are studying the incident. On Nov. 22, 2016, it was concluded through analysis by HPES and an ongoing investigation by the Naval Criminal Investigative Service (NCIS) that 134,386 present and retired sailors' Social Security numbers (SSNs) and other sensitive information had been accessed by unidentified persons.
Description: Cybersecurity Roundup: Mandiant Exposes Legacy Protocol Risks, Espionage Sentencing, and More Mandiant Releases Tools to Demonstrate Net-NTLMv1 Vulnerabilities Google’s Mandiant has released rainbow tables capable of cracking Microsoft’s outdated Net-NTLMv1 authentication protocol in under 12 hours using consumer-grade hardware costing less than $600. The protocol, known for over 20 years to be vulnerable to credential theft, remains in use despite repeated warnings. Mandiant’s principal red team consultant, Nic Losby, urged organizations to disable Net-NTLMv1 immediately, echoing advice first issued by *The Register* in 2010. US Navy Sailor Sentenced for Selling Secrets to China A US Navy sailor, Wei, was sentenced to 16 years and eight months in prison for selling classified technical manuals and operational intelligence to a Chinese intelligence official between 2022 and 2023. The Department of Justice revealed Wei earned $12,000 from the espionage, despite acknowledging the illegality of his actions. Supreme Court Hacker Pleads Guilty Nicholas Moore, a 24-year-old from Tennessee, pleaded guilty to computer fraud after illegally accessing the US Supreme Court’s electronic filing system for 25 days in 2023. Details of his activities remain undisclosed, but the charge carries a potential 10-year prison sentence and fines. The incident follows repeated breaches of US court systems, including a 2023 attack on the PACER system allegedly by Russian hackers. Interpol Arrests 34 Linked to Nigerian ‘Black Axe’ Cybercrime Syndicate Interpol detained 34 individuals in Spain, including 10 core members of the Nigeria-based Black Axe gang, known for cyber fraud, human trafficking, and armed robbery. With an estimated 30,000 members and countless affiliates, the arrests mark the group’s third major bust in recent years, following 75 arrests in 2022 and 14 in 2023. US Bill Targets ICE’s Surveillance App Over Civil Liberties Concerns A new bill, led by Rep. Bennie Thompson (D-MS), seeks to restrict ICE’s Mobile Fortify app used to identify suspects and protesters exclusively to US ports of entry. The legislation would also ban DHS from sharing the app externally, require its deactivation on non-government devices, and mandate the deletion of biometric data collected from US citizens. Critics argue the app enables overreach and privacy violations, with ICE also deploying license plate readers for broader surveillance.


No incidents recorded for US Navy in 2026.
No incidents recorded for US Navy in 2026.
No incidents recorded for US Navy in 2026.
US Navy cyber incidents detection timeline including parent company and subsidiaries

The United States is a maritime nation, and the U.S. Navy protects America at sea. Alongside our allies and partners, we defend freedom, preserve economic prosperity, and keep the seas open and free. Our nation is engaged in long-term competition. To defend American interests around the globe, the U.S. Navy must remain prepared to execute our timeless role, as directed by Congress and the President.


Welcome to the Army National Guard's page on LinkedIn. The Army National Guard, also known as the National Guard, is one component of The Army (which consists of the Active Army, the Army National Guard, and the Army Reserve). National Guard Soldiers serve both community and country. Our versatili

Welcome to the official U.S. Army LinkedIn page. The U.S. Army’s mission is to fight and win our Nation’s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders. If you're looking for news about t

The United States Marine Corps (USMC) is a branch of the United States Armed Forces responsible for providing power projection, using the mobility of the United States Navy, by Congressional mandate, to deliver rapidly, combined-arms task forces on land, at sea, and in the air. The U.S. Marine Corps

The Air Force Reserve is an integral component of our Nation's air defense and military support network. Reservists bring knowledge, skills and expertise from their civilian experiences to support critical missions and training around the globe, while working alongside their Active Duty Air Force me

MISSION Throughout all 50 states and around the world, the Navy Reserve force delivers real-world capabilities and expertise to support the Navy mission — building a more lethal, warfighting culture focused on great power competition. VISION The Navy Reserve provides essential naval warfighting cap

Official LinkedIn account of the U.S. Coast Guard — The Nation’s premier maritime military service and leading counter-drug force, protecting the maritime domain and advancing national security in service to the American people. Semper Paratus! As one of the six branches of the Armed Forces, the U.

The mission of the Department of War is to provide military forces necessary to protect the security of our country. The U.S. military defends the homeland, deters adversaries, and builds security around the world by projecting U.S. influence and working with allies and partners. In case deterrence

The Department of National Defence (DND) is a Canadian government department responsible for defending Canada's interests and values at home and abroad, as well as contributing to international peace and security. DND is the largest department of the Government of Canada in terms of budget as well a

A career in the Canadian Armed Forces is more than a way to make a living. It’s a passport to a whole-life experience that will change you and allow you to change the lives of others. Join an organization that offers more than 100 different trades and professions. Obtain world-class qualification
.png)
CACI International Inc (NYSE: CACI) announced today that it has been awarded a five-year expertise task order valued at up to $85 million to...
CACI International Inc (NYSE: CACI) announced today that it has been awarded a five-year expertise task order valued at up to $85 million to...
Strahinja Janjusevic, a master's degree student in the MIT Technology and Policy Program, focuses on applying AI techniques to cybersecurity...
The Navy has the chance to bake in cybersecurity from the beginning as it builds its Golden Fleet concept.
The US Navy has awarded Sev1Tech a contract to provide cybersecurity, engineering, and network support for the NIWC Atlantic.
Computer Science senior and ROTC Midshipman Scott Nicholson is working hard, pursuing professional development and gearing up for fulfilling...
Cybersecurity training, beards, and body fat have something in common, according to the Pentagon. They're not helping the US military fight...
Backup data: A cybersecurity blogger, Jeremiah Fowler, discovered an unsecured backup database apparently belonging to Navy Federal Credit...
The Navy's chief information officer announced her sudden retirement on Aug. 22, the same day two other senior Navy officials were fired.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of US Navy is http://www.navy.mil/.
According to Rankiteo, US Navy’s AI-generated cybersecurity score is 794, reflecting their Fair security posture.
According to Rankiteo, US Navy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, US Navy has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, US Navy is not certified under SOC 2 Type 1.
According to Rankiteo, US Navy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, US Navy is not listed as GDPR compliant.
According to Rankiteo, US Navy does not currently maintain PCI DSS compliance.
According to Rankiteo, US Navy is not compliant with HIPAA regulations.
According to Rankiteo,US Navy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
US Navy operates primarily in the Armed Forces industry.
US Navy employs approximately 161,815 people worldwide.
US Navy presently has no subsidiaries across any sectors.
US Navy’s official LinkedIn profile has approximately 716,064 followers.
US Navy is classified under the NAICS code 92811, which corresponds to National Security.
No, US Navy does not have a profile on Crunchbase.
Yes, US Navy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/us-navy.
As of April 04, 2026, Rankiteo reports that US Navy has experienced 5 cybersecurity incidents.
US Navy has an estimated 861 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Cyber Attack, Breach and Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes, and third party assistance with hpe, and law enforcement notified with ncis, and remediation measures with regained control of the facebook page after 4 days, and law enforcement notified with interpol, law enforcement notified with us department of justice, and containment measures with disabling net-ntlmv1 protocol..
Title: Extensive Bribery and Fraud Conspiracy in the US Navy
Description: A 57-year-old Indian-origin Singaporean woman was jailed for bribery and fraud conspiracy in the US Navy, resulting in the arrest and conviction of several Navy officials.
Type: Bribery and Fraud
Attack Vector: Insider Threat
Vulnerability Exploited: Non-public information disclosure
Threat Actor: Gursharan
Motivation: Financial Gain
Title: US Navy Data Breach
Description: The United States Navy exposed personal information belonging to 134,386 active and retired sailors. An investigation is being conducted by HPE and NCIS.
Date Detected: 2016-11-22
Type: Data Breach
Threat Actor: Unknown individuals
Title: Operational Security Breach in US Navy via Starlink Integration
Description: The US Navy experienced potential vulnerabilities due to the integration of high-speed internet via SpaceX’s Starlink network on warships. The system, SEA2, aimed to improve morale and connectivity, enabling sailors to maintain contact with family and access data at sea. However, unauthorized disclosure of the press release about the installation of Starlink on USS Abraham Lincoln highlighted operational security issues, as the ship was heading to a tense Middle East region. The severity of the breach could be considered high due to possible exploitation by adversaries, leading to significant implications for national security.
Type: Operational Security Breach
Attack Vector: Unauthorized Disclosure of Information
Vulnerability Exploited: Operational Security
Title: Mandiant Exposes Net-NTLMv1 Vulnerabilities, Espionage Sentencing, and Cybercrime Arrests
Description: Google’s Mandiant released tools to demonstrate vulnerabilities in Microsoft’s Net-NTLMv1 authentication protocol, a US Navy sailor was sentenced for selling secrets to China, a hacker pleaded guilty to accessing the US Supreme Court’s filing system, Interpol arrested members of the Nigerian 'Black Axe' cybercrime syndicate, and a US bill targets ICE’s surveillance app over civil liberties concerns.
Type: Vulnerability Disclosure
Attack Vector: Legacy Protocol ExploitationInsider ThreatUnauthorized System AccessCyber FraudSurveillance App Misuse
Vulnerability Exploited: Net-NTLMv1 Authentication Protocol
Threat Actor: Chinese Intelligence OfficialNigerian 'Black Axe' Cybercrime SyndicateNicholas Moore
Motivation: Financial GainEspionageCyber FraudUnauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Laptop.

Data Compromised: Pricing strategies, Price information of competitors, Questions posed to competitors by the contracts review board

Data Compromised: Social security numbers, Names
Systems Affected: Laptop

Systems Affected: Starlink NetworkSEA2 System
Operational Impact: Possible exploitation by adversaries

Data Compromised: Classified technical manuals, Operational intelligence, Supreme court electronic filings
Systems Affected: Microsoft Net-NTLMv1 Authentication ProtocolUS Supreme Court’s electronic filing system
Brand Reputation Impact: US NavyUS Supreme CourtInterpol
Legal Liabilities: 16 years and eight months prison sentence for WeiPotential 10-year prison sentence for Nicholas Moore
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Pricing Strategies, Price Information Of Competitors, Questions Posed To Competitors By The Contracts Review Board, , Social Security Numbers, Names, , Classified Technical Manuals, Operational Intelligence, Supreme Court Electronic Filings and .

Entity Name: US Navy
Entity Type: Military
Industry: Defense
Location: United States

Entity Name: United States Navy
Entity Type: Government
Industry: Military
Location: United States
Customers Affected: 134386

Entity Name: US Navy
Entity Type: Military
Industry: Defense
Location: USS Abraham LincolnMiddle East Region

Entity Name: Microsoft
Entity Type: Corporation
Industry: Technology
Location: Global

Entity Name: US Navy
Entity Type: Government
Industry: Defense
Location: United States

Entity Name: US Supreme Court
Entity Type: Government
Industry: Judicial
Location: United States

Entity Name: Interpol
Entity Type: International Organization
Industry: Law Enforcement
Location: Global

Entity Name: ICE (Immigration and Customs Enforcement)
Entity Type: Government
Industry: Law Enforcement
Location: United States

Law Enforcement Notified: Yes

Law Enforcement Notified: Interpol, US Department of Justice,
Containment Measures: Disabling Net-NTLMv1 protocol
Third-Party Assistance: The company involves third-party assistance in incident response through HPE.

Type of Data Compromised: Pricing strategies, Price information of competitors, Questions posed to competitors by the contracts review board
Sensitivity of Data: High

Type of Data Compromised: Social security numbers, Names
Number of Records Exposed: 134386
Sensitivity of Data: High

Type of Data Compromised: Classified technical manuals, Operational intelligence, Supreme court electronic filings
Sensitivity of Data: High
Data Exfiltration: Classified technical manualsOperational intelligence
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Regained control of the Facebook page after 4 days.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabling net-ntlmv1 protocol and .

Legal Actions: Arrest and conviction of several Navy officials,

Regulations Violated: Espionage laws, Computer Fraud and Abuse Act,
Legal Actions: 16 years and eight months prison sentence for Wei, Guilty plea for Nicholas Moore,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Arrest and conviction of several Navy officials, , 16 years and eight months prison sentence for Wei, Guilty plea for Nicholas Moore, .

Lessons Learned: Organizations should disable outdated and vulnerable protocols like Net-NTLMv1 immediately to prevent credential theft. Insider threats and unauthorized access to sensitive systems pose significant risks to national security and judicial integrity.

Recommendations: Disable Net-NTLMv1 protocol, Enhance monitoring of insider threats, Strengthen access controls for sensitive systems, Review and restrict surveillance app usage to prevent overreachDisable Net-NTLMv1 protocol, Enhance monitoring of insider threats, Strengthen access controls for sensitive systems, Review and restrict surveillance app usage to prevent overreachDisable Net-NTLMv1 protocol, Enhance monitoring of insider threats, Strengthen access controls for sensitive systems, Review and restrict surveillance app usage to prevent overreachDisable Net-NTLMv1 protocol, Enhance monitoring of insider threats, Strengthen access controls for sensitive systems, Review and restrict surveillance app usage to prevent overreach
Key Lessons Learned: The key lessons learned from past incidents are Organizations should disable outdated and vulnerable protocols like Net-NTLMv1 immediately to prevent credential theft. Insider threats and unauthorized access to sensitive systems pose significant risks to national security and judicial integrity.

Source: Mandiant

Source: The Register

Source: US Department of Justice

Source: Interpol

Source: Rep. Bennie Thompson (D-MS)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Mandiant, and Source: The Register, and Source: US Department of Justice, and Source: Interpol, and Source: Rep. Bennie Thompson (D-MS).

Investigation Status: Ongoing

Investigation Status: Ongoing

Entry Point: Laptop

Root Causes: Use Of Outdated And Vulnerable Protocols, Insider Threats, Inadequate Access Controls,
Corrective Actions: Disable Net-Ntlmv1, Enhance Insider Threat Monitoring, Strengthen Access Controls,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as HPE.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Disable Net-Ntlmv1, Enhance Insider Threat Monitoring, Strengthen Access Controls, .
Last Attacking Group: The attacking group in the last incident were an Gursharan, Unknown individuals, Unknown and Chinese Intelligence OfficialNigerian 'Black Axe' Cybercrime SyndicateNicholas Moore.
Most Recent Incident Detected: The most recent incident detected was on 2016-11-22.
Most Recent Incident Resolved: The most recent incident resolved was on 2021-10-XX (approximately 4 days after detection).
Most Significant Data Compromised: The most significant data compromised in an incident were Pricing strategies, Price information of competitors, Questions posed to competitors by the contracts review board, , Social Security numbers, Names, , Classified technical manuals, Operational intelligence, Supreme Court electronic filings and .
Most Significant System Affected: The most significant system affected in an incident was Laptop and Starlink NetworkSEA2 System and Facebook page of USS Kidd and Microsoft Net-NTLMv1 Authentication ProtocolUS Supreme Court’s electronic filing system.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was HPE.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disabling Net-NTLMv1 protocol.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Pricing strategies, Classified technical manuals, Names, Questions posed to competitors by the contracts review board, Operational intelligence, Price information of competitors, Supreme Court electronic filings and Social Security numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 520.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Arrest and conviction of several Navy officials, , 16 years and eight months prison sentence for Wei, Guilty plea for Nicholas Moore, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Organizations should disable outdated and vulnerable protocols like Net-NTLMv1 immediately to prevent credential theft. Insider threats and unauthorized access to sensitive systems pose significant risks to national security and judicial integrity.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance monitoring of insider threats, Strengthen access controls for sensitive systems, Review and restrict surveillance app usage to prevent overreach and Disable Net-NTLMv1 protocol.
Most Recent Source: The most recent source of information about an incident are The Register, US Department of Justice, Interpol, Rep. Bennie Thompson (D-MS) and Mandiant.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Laptop.
.png)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.