Company Details
boost-mobile
6,380
34,599
517
dish.com
0
BOO_6178347
In-progress

Boost Mobile Company CyberSecurity Posture
dish.comA fresh take on wireless.
Company Details
boost-mobile
6,380
34,599
517
dish.com
0
BOO_6178347
In-progress
Between 750 and 799

Boost Mobile Global Score (TPRM)XXXX

Description: On May 9, 2019, the California Office of the Attorney General reported a data breach involving Boost Mobile (Sprint Corporation). The breach occurred on March 14, 2019, and involved unauthorized access to customer accounts through phone numbers and PIN codes. The number of affected individuals is currently unknown.
Description: The American satellite broadcast provider Dish Network was a victim of the Black Basta ransomware attack that exposed 300,000 individuals. The American satellite broadcast provider Dish Network went offline, the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. The customer databases were not accessed in this incident. However, they have confirmed that certain employee-related records and personal information (along with information of some former employees, family members and a limited number of other individuals). The company recommends the impacted individuals regularly review their account statements and credit history for any suspicious activity and remain vigilant against threats of identity theft or fraud. Individuals that suspect they are the victim of fraudulent activities are urged to contact their local police.
Description: The American satellite broadcast provider Dish Network went offline, the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. The threat actors initially compromised the company’s Windows domain controllers and then encrypted the VMware ESXi servers and backups. Now the Satellite TV giant has started notifying the impacted 296,851 individuals. The company pointed out that there is no evidence of misuse of stolen information and confirmed that its customer databases were not accessed. It was found that the company paid a ransom to avoid their data being leaked online, in fact, it highlights that it has received confirmation that the extracted data has been delete.


No incidents recorded for Boost Mobile in 2025.
No incidents recorded for Boost Mobile in 2025.
No incidents recorded for Boost Mobile in 2025.
Boost Mobile cyber incidents detection timeline including parent company and subsidiaries

A fresh take on wireless.


TM is the national connectivity and digital infrastructure provider and Malaysia’s leading integrated telco; offering a comprehensive suite of communication services and solutions in fixed (telephony and broadband), mobility, content, WiFi, ICT, Cloud and smart services. TM is driven by stakeholder

A TIM é a empresa de telefonia móvel que mais cresce no Brasil. Atualmente, possui mais de 13 mil colaboradores em todo o país que trabalham entregando serviços inovadores e de qualidade em telefonia móvel, fixa e internet banda larga. É uma companhia feita de pessoas criativas, com energia real

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022). We are committed to responsible business conduct and driven by the ambition
EchoStar Corporation (Nasdaq: SATS) is a premier provider of technology, networking services, television entertainment and connectivity, offering consumer, enterprise, operator and government solutions worldwide under its EchoStar®, Boost Mobile®, Sling TV, DISH TV, Hughes®, HughesNet®, HughesON™ an

At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

About Motorola Solutions | Solving for safer Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, sa
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s
At Nokia, we create technology that helps the world act together. As a B2B technology innovation leader, we are pioneering the future where networks meet cloud to realize the full potential of digital in every industry. Through networks that sense, think and act, we work with our customers and pa
.png)
Interns James Dawson and Andrew Bonilla excel at INL Cybercore, gaining hands-on cybersecurity and operational technology experience in...
Vietnam has officially launched the NCA southern branch in Ho Chi Minh City to strengthen cybersecurity, protect children and vulnerable...
Orange and École Polytechnique announced the signing of a strategic partnership aimed at strengthening research, innovation and training in...
Jonathan Monk, CIO at the Institute of Cancer Research, discusses a novel approach to helping executives make informed decisions about...
Top Cyber Security Projects: 1. Cybersecurity Incident Response Simulation Tool 2. Biometric Authentication System 3.
MTN's Anti-DDoS Solution detects and mitigates malicious cyber traffic aimed at overwhelming online services, such as websites or servers,...
Cyber criminals are stepping up their surveillance of British businesses, scanning online devices more than 4,000 times a day to identify gaps in security,...
Google and Singapore's Cyber Security Agency renew partnership to enhance national cybersecurity with AI tools and public-private training...
Amazon's AWS outage meant big problems for large swaths of the internet. What have we learned in the past 24 hours?

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Boost Mobile is https://careers.dish.com/boostmobile/.
According to Rankiteo, Boost Mobile’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Boost Mobile currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Boost Mobile is not certified under SOC 2 Type 1.
According to Rankiteo, Boost Mobile does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Boost Mobile is not listed as GDPR compliant.
According to Rankiteo, Boost Mobile does not currently maintain PCI DSS compliance.
According to Rankiteo, Boost Mobile is not compliant with HIPAA regulations.
According to Rankiteo,Boost Mobile is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Boost Mobile operates primarily in the Telecommunications industry.
Boost Mobile employs approximately 6,380 people worldwide.
Boost Mobile presently has no subsidiaries across any sectors.
Boost Mobile’s official LinkedIn profile has approximately 34,599 followers.
Boost Mobile is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Boost Mobile does not have a profile on Crunchbase.
Yes, Boost Mobile maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/boost-mobile.
As of December 17, 2025, Rankiteo reports that Boost Mobile has experienced 3 cybersecurity incidents.
Boost Mobile has an estimated 9,749 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with recommended impacted individuals to review account statements and credit history..
Title: Dish Network Ransomware Attack
Description: The American satellite broadcast provider Dish Network was a victim of the Black Basta ransomware attack that exposed 300,000 individuals. The outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. While customer databases were not accessed, certain employee-related records and personal information were compromised.
Type: Ransomware Attack
Attack Vector: Ransomware
Threat Actor: Black Basta
Motivation: Financial Gain
Title: Dish Network Ransomware Attack
Description: The American satellite broadcast provider Dish Network went offline, the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. The threat actors initially compromised the company’s Windows domain controllers and then encrypted the VMware ESXi servers and backups. Now the Satellite TV giant has started notifying the impacted 296,851 individuals. The company pointed out that there is no evidence of misuse of stolen information and confirmed that its customer databases were not accessed. It was found that the company paid a ransom to avoid their data being leaked online, in fact, it highlights that it has received confirmation that the extracted data has been deleted.
Type: Ransomware
Attack Vector: Compromised Windows domain controllers
Motivation: Ransom
Title: Boost Mobile Data Breach
Description: Unauthorized access to customer accounts through phone numbers and PIN codes.
Date Detected: 2019-05-09
Date Publicly Disclosed: 2019-05-09
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Weak Authentication
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phone Numbers and PIN Codes.

Data Compromised: Employee-related records, Personal information
Systems Affected: Dish.comDish Anywhere appOther services owned by Dish Network
Downtime: Services went offline
Identity Theft Risk: High

Data Compromised: VMware ESXi servers and backups
Systems Affected: Dish.comDish Anywhere appOther services owned by the company
Operational Impact: Services went offline

Data Compromised: Customer Account Information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Employee-Related Records, Personal Information, and Customer Account Information.

Entity Name: Dish Network
Entity Type: Company
Industry: Satellite Broadcasting
Location: United States
Size: Large
Customers Affected: 300000

Entity Name: Dish Network
Entity Type: Company
Industry: Satellite Broadcasting
Location: United States
Customers Affected: 296851

Entity Name: Boost Mobile (Sprint Corporation)
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: California

Communication Strategy: Recommended impacted individuals to review account statements and credit history

Type of Data Compromised: Employee-related records, Personal information
Number of Records Exposed: 300000
Sensitivity of Data: High

Type of Data Compromised: Customer Account Information

Ransomware Strain: Black Basta

Recommendations: Regularly review account statements and credit history, Remain vigilant against threats of identity theft or fraudRegularly review account statements and credit history, Remain vigilant against threats of identity theft or fraud

Source: California Office of the Attorney General
Date Accessed: 2019-05-09
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2019-05-09.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Recommended impacted individuals to review account statements and credit history.

Entry Point: Phone Numbers and PIN Codes
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident was an Black Basta.
Most Recent Incident Detected: The most recent incident detected was on 2019-05-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-05-09.
Most Significant Data Compromised: The most significant data compromised in an incident were Employee-related records, Personal information, , VMware ESXi servers and backups and Customer Account Information.
Most Significant System Affected: The most significant system affected in an incident was Dish.comDish Anywhere appOther services owned by Dish Network and Dish.comDish Anywhere appOther services owned by the company.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information, VMware ESXi servers and backups, Customer Account Information and Employee-related records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 300.0.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was True.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Remain vigilant against threats of identity theft or fraud and Regularly review account statements and credit history.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phone Numbers and PIN Codes.
.png)
Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.
Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.