Company Details
beeline-russia
2,017
14,400
517
beeline.ru
0
BEE_6183571
In-progress

beeline Russia Company CyberSecurity Posture
beeline.ruVimpelCom is one of the world’s largest integrated telecommunications services operators providing voice and data services through a range of traditional and broadband mobile and fixed technologies in Russia, Italy, Ukraine, Kazakhstan, Uzbekistan, Tajikistan, Armenia, Georgia, Kyrgyzstan, Laos, Algeria, Bangladesh, Pakistan, and Zimbabwe. VimpelCom’s operations around the globe cover territory with a total population of approximately 740 million people. VimpelCom provides services under the "Beeline", "Kyivstar", “WIND”, "Infostrada" “Mobilink”, “Banglalink”, “Telecel”, and “Djezzy” brands. As of 6 August, 2015 VimpelCom had 213 million mobile customers on a combined basis. VimpelCom is headquartered in Amsterdam, the Netherlands and is traded on the NASDAQ Global Select Market under the symbol "VIP". With annual 2014 revenue of USD 19.6 billion and EBITDA of USD 8 billion, we are one of the largest telecommunications companies in the industry and have established the scale for successful growth and development of our group of companies going forward.
Company Details
beeline-russia
2,017
14,400
517
beeline.ru
0
BEE_6183571
In-progress
Between 700 and 749

beeline Russia Global Score (TPRM)XXXX

Description: Personal data relating to the Russian mobile operator Beeline’s 2016 database of 8.7 million clients has been leaked. Kommersant checked the database, which list Beeline’s internet clients, and found that it includes full names, addresses and phone numbers. Beeline’s press office told Kommersant the leak was a small part of the 2017 customer database, not the full 2016 list. All of the guilty were found and punished. Now most of the information is outdated,” a Beeline press office representative said.


No incidents recorded for beeline Russia in 2025.
No incidents recorded for beeline Russia in 2025.
No incidents recorded for beeline Russia in 2025.
beeline Russia cyber incidents detection timeline including parent company and subsidiaries

VimpelCom is one of the world’s largest integrated telecommunications services operators providing voice and data services through a range of traditional and broadband mobile and fixed technologies in Russia, Italy, Ukraine, Kazakhstan, Uzbekistan, Tajikistan, Armenia, Georgia, Kyrgyzstan, Laos, Algeria, Bangladesh, Pakistan, and Zimbabwe. VimpelCom’s operations around the globe cover territory with a total population of approximately 740 million people. VimpelCom provides services under the "Beeline", "Kyivstar", “WIND”, "Infostrada" “Mobilink”, “Banglalink”, “Telecel”, and “Djezzy” brands. As of 6 August, 2015 VimpelCom had 213 million mobile customers on a combined basis. VimpelCom is headquartered in Amsterdam, the Netherlands and is traded on the NASDAQ Global Select Market under the symbol "VIP". With annual 2014 revenue of USD 19.6 billion and EBITDA of USD 8 billion, we are one of the largest telecommunications companies in the industry and have established the scale for successful growth and development of our group of companies going forward.

🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

vivo is a technology company that creates great products based on a design-driven value, with smart devices and intelligent services as its core. The company aims to build a bridge between humans and the digital world. Through unique creativity, vivo provides users with an increasingly convenient mo

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives. With stc, You will always be empowered to focus on delivering what’s next through collaborati

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public sh

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout

ACN is the leading direct selling telecommunications and essential services provider. ACN Inc. was founded in 1993 by four entrepreneurs and is now operating in North America. ACN offers essential products and services that people use every day, while also offering a powerful business ownership oppo

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022). We are committed to responsible business conduct and driven by the ambition

Bharti Enterprises is one of India’s leading business group with diversified interests in telecom, financial services, real estate, hospitality, agri and food. Bharti has been a pioneering force in the Indian telecom sector with many firsts and innovations to its credit. Bharti Airtel, the group's
.png)
Russian operators MTS an Megafon have signed an agreement on a strategic partnership in the adtech field, reports Russian Business.
Finnish cybersecurity authorities say they did not know a Russian data centre was being established in the capital.
Ukrainian cyber operatives have targeted Filanco Group, disrupting internet services for Russian security agencies and rendering critical...
Russian telecom operator Beeline has opened a data centre in Helsinki to improve data transfer speeds, including for apps like Telegram.
Finnish cybersecurity authorities say they are monitoring the situation. The Beeline logo on a storefront written cyrillic script.
DDoS Attack on Beeline Russia ... Beeline, one of Russia's largest telecommunications providers, recently experienced a significant cyber attack, which experts...
TECH NEWS : Russian telecom operator Beeline experienced a major cyberattack affecting its IT systems, marking the second attack in weeks.
Some Russians had their internet disrupted on Monday due to a targeted distributed denial-of-service (DDoS) attack on the telecom Beeline.
YEREVAN, May 21, /ARKA/. ArmenTel telecom operator said today it will compensate for inconveniences that were caused to its Beeline Armenian mobile...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of beeline Russia is http://www.beeline.ru.
According to Rankiteo, beeline Russia’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, beeline Russia currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, beeline Russia is not certified under SOC 2 Type 1.
According to Rankiteo, beeline Russia does not hold a SOC 2 Type 2 certification.
According to Rankiteo, beeline Russia is not listed as GDPR compliant.
According to Rankiteo, beeline Russia does not currently maintain PCI DSS compliance.
According to Rankiteo, beeline Russia is not compliant with HIPAA regulations.
According to Rankiteo,beeline Russia is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
beeline Russia operates primarily in the Telecommunications industry.
beeline Russia employs approximately 2,017 people worldwide.
beeline Russia presently has no subsidiaries across any sectors.
beeline Russia’s official LinkedIn profile has approximately 14,400 followers.
beeline Russia is classified under the NAICS code 517, which corresponds to Telecommunications.
No, beeline Russia does not have a profile on Crunchbase.
Yes, beeline Russia maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/beeline-russia.
As of November 28, 2025, Rankiteo reports that beeline Russia has experienced 1 cybersecurity incidents.
beeline Russia has an estimated 9,533 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Full names, Addresses, Phone numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Full Names, Addresses, Phone Numbers and .

Entity Name: Beeline
Entity Type: Mobile Operator
Industry: Telecommunications
Location: Russia
Customers Affected: 8.7 million

Type of Data Compromised: Full names, Addresses, Phone numbers
Number of Records Exposed: 8.7 million
Personally Identifiable Information: full namesaddressesphone numbers

Source: Kommersant
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Kommersant.

Investigation Status: Resolved
Most Significant Data Compromised: The most significant data compromised in an incident were full names, addresses, phone numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were phone numbers, full names and addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 8.7M.
Most Recent Source: The most recent source of information about an incident is Kommersant.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.