Company Details
cash-app
4,152
281,514
513
cash.app
0
CAS_2682181
In-progress

Cash App Company CyberSecurity Posture
cash.appIt all started with an idea at Block in 2013. Initially built to take the pain out of peer-to-peer payments, Cash App has gone from a simple product with a single purpose to a dynamic ecosystem, developing unique financial products, including Afterpay, to provide a better way to send, spend, invest, borrow and save to our 50+ million monthly active customers. We want to redefine the world’s relationship with money to make it more relatable, instantly available, and universally accessible. This is our mission, and it’s why working at Cash App means so much more than a job. Today, Cash App has thousands of employees working globally across office and remote locations, with a culture geared toward innovation, collaboration and impact. We’ve been a distributed team since day one, and many of our roles can be done remotely from the countries where Cash App operates. No matter the location, we tailor our experience to ensure our employees are creative, productive, and happy.
Company Details
cash-app
4,152
281,514
513
cash.app
0
CAS_2682181
In-progress
Between 700 and 749

Cash App Global Score (TPRM)XXXX

Description: The customer data of about 8.2 million past and present customers of the Cash App was compromised in a data breach incident by a former employee recently. The compromised data included brokerage portfolio values and account numbers, Social Security numbers, birthdays, payment card info, and most other personal information of the customers. The company immediately took action and blocked the employee's access and informed the targeted customers to be alerted.
Description: In December 2021, Block, Inc. disclosed a cybersecurity incident involving its subsidiary company, Cash App. A former employee exploited insider access to download internal reports, impacting more than 8 million former and current Cash App Investing customers. Despite the breach, the company assured that no personally identifiable information, such as usernames, passwords, or Social Security Numbers, was compromised in the incident. This insider data theft underscores the significant risks associated with insider threats and highlights the necessity for stringent data access controls and monitoring.
Description: A former employee of Block formerly known as Square downloaded reports from its Cash App containing some U.S. customer information. The report contained the information regarding the users’ full names and brokerage account numbers, brokerage portfolio value, brokerage portfolio holdings, and stock trading activity for one trading day. The employee always had regular access to these reports as part of their past job responsibilities but these reports were accessed without permission after their employment ended. The company immediately launched an investigation to know the extent of the breach.
Description: Block, the parent company of Cash App, faced a significant data breach in December 2021 when a former employee unlawfully downloaded personal information of approximately **8.2 million Cash App users**. The breach was not disclosed until **April 4, 2022**, nearly four months later, raising concerns about transparency and data security practices. Shareholders filed a class-action lawsuit, alleging Block misled investors by failing to disclose inadequate security measures before the breach and during its $29 billion acquisition of Afterpay. While the lawsuit was dismissed due to lack of evidence of fraudulent intent, the incident exposed vulnerabilities in Block’s data protection framework. Additionally, Block settled separate regulatory cases in 2024, paying **$80 million** to 48 states and **$40 million** to New York for anti-money laundering deficiencies in Cash App. The breach involved **customer data leakage**, though no ransomware was reported. Cash App, with **57 million monthly users** and **$283 billion in inflows (2024)**, faced reputational and financial risks, though the direct operational impact appeared contained to data exposure and legal repercussions.


No incidents recorded for Cash App in 2025.
No incidents recorded for Cash App in 2025.
No incidents recorded for Cash App in 2025.
Cash App cyber incidents detection timeline including parent company and subsidiaries

It all started with an idea at Block in 2013. Initially built to take the pain out of peer-to-peer payments, Cash App has gone from a simple product with a single purpose to a dynamic ecosystem, developing unique financial products, including Afterpay, to provide a better way to send, spend, invest, borrow and save to our 50+ million monthly active customers. We want to redefine the world’s relationship with money to make it more relatable, instantly available, and universally accessible. This is our mission, and it’s why working at Cash App means so much more than a job. Today, Cash App has thousands of employees working globally across office and remote locations, with a culture geared toward innovation, collaboration and impact. We’ve been a distributed team since day one, and many of our roles can be done remotely from the countries where Cash App operates. No matter the location, we tailor our experience to ensure our employees are creative, productive, and happy.

Cimpress plc (Nasdaq: CMPR) invests in and builds customer-focused, entrepreneurial, mass-customization businesses for the long term. Mass customization is a competitive strategy which seeks to produce goods and services to meet individual customer needs with near mass production efficiency. Cimpr

Türk internet kullanıcılarının en çok tercih ettiği dijital platform olan Mynet, 1999 yılından bugüne liderliğini koruyor. Kendi alanında sayısız ilki gerçekleştiren öncü internet devi Mynet, Türkiye'nin dijital ekosisteminin kalkınmasına ve gelişmesine destek olmayı sürdürüyor. Her ay ortalama 4

The mission of the Death Star is to keep the local systems "in line". As we have recently dissolved our Board of Directors, there is little resistance to our larger goal of universal domination. Our Stormtroopers are excellent shots and operate with our Navy, and are fielded like marines - sep

Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thi

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology lands

www.primaryschool.com.au is a directory of sites for students and lesson plans and reference material for teachers and parents. It is currently averaging up to 350,000 unique visitors a month and has over 44,000 subscribers to its free weekly newsletter which showcases the latest internet based reso

We are a technology company that unlocks access to energy for the benefit of all. As innovators, that’s been our mission for nearly a century. Today, we face a global imperative to create a future with more energy, but less carbon. Our diverse, innovative change makers are focused on going further i

At Myntra, we don’t just follow fashion - we define it. As India's leading fashion, lifestyle, and beauty destination, we bring together the best of style, technology, and innovation to create a seamless shopping experience for our customers. With a commitment to empowering self-expression, we cura

IndiaMART is India's largest online B2B marketplace, connecting buyers with suppliers across a wide array of industries. IndiaMART provides a platform for Small & Medium Enterprises (SMEs), large enterprises, and individual buyers, helping them access diverse portfolios of quality products. Since
.png)
Smartphone brands have been given three months to integrate Sanchar Saathi into all new units and ensure the app is visible during device...
Stay safe online with these tips for doing your holiday shopping online safely – a complete guide for 2025!
Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.
Mobile banking is secure when you use official apps and follow best practices. Major banks invest billions in cybersecurity, but user habits...
Cash App released a slate of new features as part of its fall update, including an AI chatbot that can answer questions about users'...
Here's what to know about cybersecurity stocks and ETFs, and how they respond to cybersecurity crises.
Cybersecurity is touted as having a zero unemployment rate. It is one of the fastest-growing and in-demand professions in the world today as...
October is Cybersecurity Awareness Month, and for campus IT teams, that means more than patching servers and updating firewalls.
You could be eligible to recover compensation from several class action settlements accepting claims in October. These settlements provide...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cash App is http://cash.app.
According to Rankiteo, Cash App’s AI-generated cybersecurity score is 736, reflecting their Moderate security posture.
According to Rankiteo, Cash App currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cash App is not certified under SOC 2 Type 1.
According to Rankiteo, Cash App does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cash App is not listed as GDPR compliant.
According to Rankiteo, Cash App does not currently maintain PCI DSS compliance.
According to Rankiteo, Cash App is not compliant with HIPAA regulations.
According to Rankiteo,Cash App is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cash App operates primarily in the Technology, Information and Internet industry.
Cash App employs approximately 4,152 people worldwide.
Cash App presently has no subsidiaries across any sectors.
Cash App’s official LinkedIn profile has approximately 281,514 followers.
Cash App is classified under the NAICS code 513, which corresponds to Others.
Yes, Cash App has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/cash-app-c230.
Yes, Cash App maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cash-app.
As of December 10, 2025, Rankiteo reports that Cash App has experienced 4 cybersecurity incidents.
Cash App has an estimated 12,993 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with blocked the employee's access, and communication strategy with informed the targeted customers to be alerted, and incident response plan activated with yes, and containment measures with launched an investigation, and communication strategy with delayed disclosure (4 months), communication strategy with regulatory filings, communication strategy with public statements via court proceedings..
Title: Cash App Data Breach
Description: The customer data of about 8.2 million past and present customers of the Cash App was compromised in a data breach incident by a former employee recently.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Unauthorized Access
Threat Actor: Former Employee
Title: Unauthorized Data Access by Former Employee at Block (formerly Square)
Description: A former employee of Block formerly known as Square downloaded reports from its Cash App containing some U.S. customer information. The report contained the information regarding the users’ full names and brokerage account numbers, brokerage portfolio value, brokerage portfolio holdings, and stock trading activity for one trading day. The employee always had regular access to these reports as part of their past job responsibilities but these reports were accessed without permission after their employment ended. The company immediately launched an investigation to know the extent of the breach.
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Insider Threat
Threat Actor: Former Employee
Motivation: Unknown
Title: Block, Inc. Cash App Data Breach
Description: In December 2021, Block, Inc. disclosed a cybersecurity incident involving its subsidiary company, Cash App. A former employee exploited insider access to download internal reports, impacting more than 8 million former and current Cash App Investing customers. Despite the breach, the company assured that no personally identifiable information, such as usernames, passwords, or Social Security Numbers, was compromised in the incident. This insider data theft underscores the significant risks associated with insider threats and highlights the necessity for stringent data access controls and monitoring.
Date Detected: December 2021
Date Publicly Disclosed: December 2021
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Insider Access
Threat Actor: Former Employee
Motivation: Unknown
Title: Block (Cash App) Data Breach and Shareholder Litigation Dismissal
Description: Block, led by Jack Dorsey, won the dismissal of litigation claiming it misled shareholders regarding a December 2021 data breach at its Cash App service. A former employee downloaded personal information of ~8.2 million users. Shareholders alleged Block failed to disclose inadequate data security and delayed breach notification by nearly four months. The company also faced accusations of misleading Afterpay shareholders during its $29B acquisition. Block previously settled AML-related charges for $80M (48 states) and $40M (New York).
Date Detected: 2021-12-10
Date Publicly Disclosed: 2022-04-04
Type: Data Breach
Attack Vector: Insider Threat (former employee)
Vulnerability Exploited: Inadequate data security controls / unauthorized access by insider
Threat Actor: Former employee
Motivation: Financial Gain (alleged by shareholders)Unauthorized Data Access
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Internal (former employee with authorized access).

Data Compromised: Brokerage portfolio values, Account numbers, Social security numbers, Birthdays, Payment card info, Other personal information

Data Compromised: Full names, Brokerage account numbers, Brokerage portfolio value, Brokerage portfolio holdings, Stock trading activity

Data Compromised: Internal Reports

Data Compromised: Personal information of ~8.2 million Cash App users
Brand Reputation Impact: LitigationRegulatory Settlements ($120M total)
Legal Liabilities: Shareholder litigation (dismissed)AML settlements ($80M + $40M)
Identity Theft Risk: High (personal information exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Brokerage Portfolio Values, Account Numbers, Social Security Numbers, Birthdays, Payment Card Info, Other Personal Information, , Full Names, Brokerage Account Numbers, Brokerage Portfolio Value, Brokerage Portfolio Holdings, Stock Trading Activity, , Internal Reports and Personal information.

Entity Name: Cash App
Entity Type: Company
Industry: Financial Services
Customers Affected: 8.2 million

Entity Name: Block (formerly Square)
Entity Type: Company
Industry: Financial Services
Location: United States

Entity Name: Block, Inc.
Entity Type: Company
Industry: Financial Services
Customers Affected: More than 8 million

Entity Name: Block, Inc. (Cash App)
Entity Type: Public Company
Industry: Financial Services, Technology, Mobile Payments
Location: Oakland, California, USA
Size: Large (57M monthly users as of 2024)
Customers Affected: 8.2 million

Entity Name: Afterpay (acquired by Block)
Entity Type: Subsidiary
Industry: Financial Services (Buy Now, Pay Later)
Location: Australia

Containment Measures: Blocked the employee's access
Communication Strategy: Informed the targeted customers to be alerted

Incident Response Plan Activated: Yes
Containment Measures: Launched an investigation

Communication Strategy: Delayed disclosure (4 months)Regulatory filingsPublic statements via court proceedings
Incident Response Plan: The company's incident response plan is described as Yes.

Type of Data Compromised: Brokerage portfolio values, Account numbers, Social security numbers, Birthdays, Payment card info, Other personal information
Number of Records Exposed: 8.2 million
Sensitivity of Data: High
Personally Identifiable Information: Social Security numbersbirthdayspayment card infoother personal information

Type of Data Compromised: Full names, Brokerage account numbers, Brokerage portfolio value, Brokerage portfolio holdings, Stock trading activity
Sensitivity of Data: Medium to High

Type of Data Compromised: Internal Reports
Number of Records Exposed: More than 8 million
Personally Identifiable Information: None

Type of Data Compromised: Personal information
Number of Records Exposed: 8.2 million
Sensitivity of Data: High
Data Exfiltration: Yes (downloaded by former employee)
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by blocked the employee's access, and launched an investigation.

Regulations Violated: Anti-Money Laundering (AML) policies, Potential securities disclosure violations (alleged),
Fines Imposed: ['$80 million (48 states)', '$40 million (New York)']
Legal Actions: Shareholder class-action litigation (dismissed), State regulatory settlements,
Regulatory Notifications: Delayed (disclosed 4 months post-breach)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Shareholder class-action litigation (dismissed), State regulatory settlements, .

Lessons Learned: Stringent data access controls and monitoring are necessary to mitigate insider threats.
Key Lessons Learned: The key lessons learned from past incidents are Stringent data access controls and monitoring are necessary to mitigate insider threats.

Source: Reuters

Source: U.S. District Court, Southern District of New York (Case No. 22-08636)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Reuters, and Source: U.S. District Court, Southern District of New York (Case No. 22-08636).

Investigation Status: Ongoing

Investigation Status: Closed (litigation dismissed; regulatory settlements reached)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Informed The Targeted Customers To Be Alerted, Delayed Disclosure (4 Months), Regulatory Filings and Public Statements Via Court Proceedings.

Stakeholder Advisories: Court Filings, Regulatory Disclosures.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Court Filings and Regulatory Disclosures.

Entry Point: Internal (former employee with authorized access)
High Value Targets: Cash App user database
Data Sold on Dark Web: Cash App user database

Root Causes: Inadequate Data Security Controls, Insider Threat Risk Management Failure, Delayed Breach Disclosure,
Corrective Actions: Regulatory Settlements ($120M), Potential Internal Policy Reforms (Unspecified),
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Regulatory Settlements ($120M), Potential Internal Policy Reforms (Unspecified), .
Last Attacking Group: The attacking group in the last incident were an Former Employee, Former Employee, Former Employee and Former employee.
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-04-04.
Most Significant Data Compromised: The most significant data compromised in an incident were brokerage portfolio values, account numbers, Social Security numbers, birthdays, payment card info, other personal information, , Full names, Brokerage account numbers, Brokerage portfolio value, Brokerage portfolio holdings, Stock trading activity, , Internal Reports and Personal information of ~8.2 million Cash App users.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Blocked the employee's access and Launched an investigation.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, payment card info, Internal Reports, Full names, account numbers, Brokerage portfolio value, Brokerage account numbers, Personal information of ~8.2 million Cash App users, Stock trading activity, birthdays, other personal information, brokerage portfolio values and Brokerage portfolio holdings.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 24.4M.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $80 million (48 states), $40 million (New York), .
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Shareholder class-action litigation (dismissed), State regulatory settlements, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Stringent data access controls and monitoring are necessary to mitigate insider threats.
Most Recent Source: The most recent source of information about an incident are U.S. District Court, Southern District of New York (Case No. 22-08636) and Reuters.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Court filings, Regulatory disclosures, .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Internal (former employee with authorized access).
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.