ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Cell C Limited, launched in 2001, is a proudly South African customer-first digital provider of services that promotes digital inclusion. The organisation does this by championing the needs, passions, interests and motivations of customers to be at their best, empowering them to achieve and enjoy what they want to, by offering better value, differentiated propositions, connection and access. Cell C is committed to bridging the digital divide in South Africa and ensuring that everyone enjoys the benefits of a modern, connected world. Cell C is a Level 1 Broad-based Black Economic Empowerment (B-BBEE) contributor, with a focused transformation strategy premised on delivering meaningful diversity, inclusion and empowerment that has a positive impact on our economy and society as a whole. Our CSI Programmes: • SEE YOUTH powered by Cell C • Acts of Kindness • Cell C Bursary Fund • Equitable Digital Access • Employee Volunteerism View our privacy policy at www.cellc.co.za

Cell C A.I CyberSecurity Scoring

Cell C

Company Details

Linkedin ID:

cell-c

Employees number:

4,059

Number of followers:

100,866

NAICS:

517

Industry Type:

Telecommunications

Homepage:

cellc.co.za

IP Addresses:

0

Company ID:

CEL_4083330

Scan Status:

In-progress

AI scoreCell C Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/cell-c.jpeg
Cell C Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCell C Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cell-c.jpeg
Cell C Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Cell C Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Cell CRansomware10044/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: South Africa's Cell C suffered a severe cyberattack by the group RansomHouse, resulting in the leak of 2TB of sensitive customer data on the dark web. Compromised information includes full names, contact details, ID numbers, and financial information among others. Although the number of impacted individuals is not specified, the leak poses significant threats to privacy and financial security, leaving customers vulnerable to identity theft and fraud.

Cell C
Ransomware
Severity: 100
Impact: 4
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: South Africa's Cell C suffered a severe cyberattack by the group RansomHouse, resulting in the leak of 2TB of sensitive customer data on the dark web. Compromised information includes full names, contact details, ID numbers, and financial information among others. Although the number of impacted individuals is not specified, the leak poses significant threats to privacy and financial security, leaving customers vulnerable to identity theft and fraud.

Ailogo

Cell C Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Cell C

Incidents vs Telecommunications Industry Average (This Year)

Cell C has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Cell C has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types Cell C vs Telecommunications Industry Avg (This Year)

Cell C reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Cell C (X = Date, Y = Severity)

Cell C cyber incidents detection timeline including parent company and subsidiaries

Cell C Company Subsidiaries

SubsidiaryImage

Cell C Limited, launched in 2001, is a proudly South African customer-first digital provider of services that promotes digital inclusion. The organisation does this by championing the needs, passions, interests and motivations of customers to be at their best, empowering them to achieve and enjoy what they want to, by offering better value, differentiated propositions, connection and access. Cell C is committed to bridging the digital divide in South Africa and ensuring that everyone enjoys the benefits of a modern, connected world. Cell C is a Level 1 Broad-based Black Economic Empowerment (B-BBEE) contributor, with a focused transformation strategy premised on delivering meaningful diversity, inclusion and empowerment that has a positive impact on our economy and society as a whole. Our CSI Programmes: • SEE YOUTH powered by Cell C • Acts of Kindness • Cell C Bursary Fund • Equitable Digital Access • Employee Volunteerism View our privacy policy at www.cellc.co.za

Loading...
similarCompanies

Cell C Similar Companies

Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

Telefónica

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

BT Group

We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co

Orange

Orange is one of the world’s leading telecommunications operators with revenues of 40.3 billion euros in 2024 and 127,000 employees worldwide at 31 December 2024, including 71,000 employees in France. The Group has a total customer base of 291 million customers worldwide at 31 December 2024, inclu

DISH Network

Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wi

Huawei

Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. With integrated solutions across four key domains – telecom networks, IT, smart devices, and cloud services – we are committed to bringing digital to every person, home and organi

Idea Cellular Ltd

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

newsone

Cell C CyberSecurity News

November 28, 2025 08:00 AM
SPEEDRUN – The revival of Cell C?

Cell C has reached a major milestone by officially listing on the Johannesburg Stock Exchange under the ticker CCD. The company closed its...

November 27, 2025 08:00 AM
R2.7 billion raised: Here’s what the future holds for the new Cell C

The Johannesburg Stock Exchange (JSE) welcomed Cell C on its main board on Thursday after raising R2.7 billion through its initial public...

October 17, 2025 07:00 AM
Wits University IT system hit by ‘zero-day’ event

The University of the Witwatersrand has confirmed its Oracle E-Business system has been hit by a cyber attack that has compromised its...

October 14, 2025 07:00 AM
Satellites Have Exposed Sensitive Data From T-Mobile and Others, Research Reveals

Satellite signals carrying unencrypted calls, texts and information from military and corporate accounts were found to be open to...

September 05, 2025 07:00 AM
Cell C majority owner gets approval to take control

The Competition Tribunal approved The Prepaid Company's acquisition of 4.04% in additional Cell C shares, bringing its total shareholding in...

September 01, 2025 07:00 AM
Major restructuring hitting Cell C

Blue Label is pushing ahead with a restructuring of Cell C ahead of the planned IPO of the telcos company.

August 27, 2025 07:00 AM
Cell C still technically insolvent

Blue Label Telecoms has reversed its impairment of Cell C and started recognising its share of the mobile operator's profits and losses.

August 21, 2025 07:00 AM
End of an era for Cell C owner Blue Label

Cell C owner Blue Label Telecoms has received the requisite shareholder approval to change its name, as the company goes through a major...

August 01, 2025 07:00 AM
10 Biggest Data Breaches in South Africa [2025]

Learn about the biggest data breaches in South Africa, why South Africa is an attractive target for cyber attacks and how these could have...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Cell C CyberSecurity History Information

Official Website of Cell C

The official website of Cell C is http://www.cellc.co.za.

Cell C’s AI-Generated Cybersecurity Score

According to Rankiteo, Cell C’s AI-generated cybersecurity score is 675, reflecting their Weak security posture.

How many security badges does Cell C’ have ?

According to Rankiteo, Cell C currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Cell C have SOC 2 Type 1 certification ?

According to Rankiteo, Cell C is not certified under SOC 2 Type 1.

Does Cell C have SOC 2 Type 2 certification ?

According to Rankiteo, Cell C does not hold a SOC 2 Type 2 certification.

Does Cell C comply with GDPR ?

According to Rankiteo, Cell C is not listed as GDPR compliant.

Does Cell C have PCI DSS certification ?

According to Rankiteo, Cell C does not currently maintain PCI DSS compliance.

Does Cell C comply with HIPAA ?

According to Rankiteo, Cell C is not compliant with HIPAA regulations.

Does Cell C have ISO 27001 certification ?

According to Rankiteo,Cell C is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Cell C

Cell C operates primarily in the Telecommunications industry.

Number of Employees at Cell C

Cell C employs approximately 4,059 people worldwide.

Subsidiaries Owned by Cell C

Cell C presently has no subsidiaries across any sectors.

Cell C’s LinkedIn Followers

Cell C’s official LinkedIn profile has approximately 100,866 followers.

NAICS Classification of Cell C

Cell C is classified under the NAICS code 517, which corresponds to Telecommunications.

Cell C’s Presence on Crunchbase

No, Cell C does not have a profile on Crunchbase.

Cell C’s Presence on LinkedIn

Yes, Cell C maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cell-c.

Cybersecurity Incidents Involving Cell C

As of December 23, 2025, Rankiteo reports that Cell C has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Cell C has an estimated 9,764 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Cell C ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Cyberattack on South Africa's Cell C

Description: South Africa's Cell C suffered a severe cyberattack by the group RansomHouse, resulting in the leak of 2TB of sensitive customer data on the dark web. Compromised information includes full names, contact details, ID numbers, and financial information among others. Although the number of impacted individuals is not specified, the leak poses significant threats to privacy and financial security, leaving customers vulnerable to identity theft and fraud.

Type: Data Breach

Threat Actor: RansomHouse

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach CEL420041025

Data Compromised: Full names, Contact details, Id numbers, Financial information

Identity Theft Risk: High

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Full Names, Contact Details, Id Numbers, Financial Information and .

Which entities were affected by each incident ?

Incident : Data Breach CEL420041025

Entity Name: Cell C

Entity Type: Telecommunications Company

Industry: Telecommunications

Location: South Africa

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CEL420041025

Type of Data Compromised: Full names, Contact details, Id numbers, Financial information

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach CEL420041025

Data Exfiltration: Yes

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an RansomHouse.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were full names, contact details, ID numbers, financial information and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were contact details, full names, financial information and ID numbers.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cell-c' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge