Company Details
cell-c
4,059
100,866
517
cellc.co.za
0
CEL_4083330
In-progress

Cell C Company CyberSecurity Posture
cellc.co.zaCell C Limited, launched in 2001, is a proudly South African customer-first digital provider of services that promotes digital inclusion. The organisation does this by championing the needs, passions, interests and motivations of customers to be at their best, empowering them to achieve and enjoy what they want to, by offering better value, differentiated propositions, connection and access. Cell C is committed to bridging the digital divide in South Africa and ensuring that everyone enjoys the benefits of a modern, connected world. Cell C is a Level 1 Broad-based Black Economic Empowerment (B-BBEE) contributor, with a focused transformation strategy premised on delivering meaningful diversity, inclusion and empowerment that has a positive impact on our economy and society as a whole. Our CSI Programmes: • SEE YOUTH powered by Cell C • Acts of Kindness • Cell C Bursary Fund • Equitable Digital Access • Employee Volunteerism View our privacy policy at www.cellc.co.za
Company Details
cell-c
4,059
100,866
517
cellc.co.za
0
CEL_4083330
In-progress
Between 650 and 699

Cell C Global Score (TPRM)XXXX

Description: South Africa's Cell C suffered a severe cyberattack by the group RansomHouse, resulting in the leak of 2TB of sensitive customer data on the dark web. Compromised information includes full names, contact details, ID numbers, and financial information among others. Although the number of impacted individuals is not specified, the leak poses significant threats to privacy and financial security, leaving customers vulnerable to identity theft and fraud.


Cell C has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.
Cell C has 28.21% more incidents than the average of all companies with at least one recorded incident.
Cell C reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Cell C cyber incidents detection timeline including parent company and subsidiaries

Cell C Limited, launched in 2001, is a proudly South African customer-first digital provider of services that promotes digital inclusion. The organisation does this by championing the needs, passions, interests and motivations of customers to be at their best, empowering them to achieve and enjoy what they want to, by offering better value, differentiated propositions, connection and access. Cell C is committed to bridging the digital divide in South Africa and ensuring that everyone enjoys the benefits of a modern, connected world. Cell C is a Level 1 Broad-based Black Economic Empowerment (B-BBEE) contributor, with a focused transformation strategy premised on delivering meaningful diversity, inclusion and empowerment that has a positive impact on our economy and society as a whole. Our CSI Programmes: • SEE YOUTH powered by Cell C • Acts of Kindness • Cell C Bursary Fund • Equitable Digital Access • Employee Volunteerism View our privacy policy at www.cellc.co.za

Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f
We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co
Orange is one of the world’s leading telecommunications operators with revenues of 40.3 billion euros in 2024 and 127,000 employees worldwide at 31 December 2024, including 71,000 employees in France. The Group has a total customer base of 291 million customers worldwide at 31 December 2024, inclu
Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wi
Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. With integrated solutions across four key domains – telecom networks, IT, smart devices, and cloud services – we are committed to bringing digital to every person, home and organi

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs
.png)
Cell C has reached a major milestone by officially listing on the Johannesburg Stock Exchange under the ticker CCD. The company closed its...
The Johannesburg Stock Exchange (JSE) welcomed Cell C on its main board on Thursday after raising R2.7 billion through its initial public...
The University of the Witwatersrand has confirmed its Oracle E-Business system has been hit by a cyber attack that has compromised its...
Satellite signals carrying unencrypted calls, texts and information from military and corporate accounts were found to be open to...
The Competition Tribunal approved The Prepaid Company's acquisition of 4.04% in additional Cell C shares, bringing its total shareholding in...
Blue Label is pushing ahead with a restructuring of Cell C ahead of the planned IPO of the telcos company.
Blue Label Telecoms has reversed its impairment of Cell C and started recognising its share of the mobile operator's profits and losses.
Cell C owner Blue Label Telecoms has received the requisite shareholder approval to change its name, as the company goes through a major...
Learn about the biggest data breaches in South Africa, why South Africa is an attractive target for cyber attacks and how these could have...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cell C is http://www.cellc.co.za.
According to Rankiteo, Cell C’s AI-generated cybersecurity score is 675, reflecting their Weak security posture.
According to Rankiteo, Cell C currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cell C is not certified under SOC 2 Type 1.
According to Rankiteo, Cell C does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cell C is not listed as GDPR compliant.
According to Rankiteo, Cell C does not currently maintain PCI DSS compliance.
According to Rankiteo, Cell C is not compliant with HIPAA regulations.
According to Rankiteo,Cell C is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cell C operates primarily in the Telecommunications industry.
Cell C employs approximately 4,059 people worldwide.
Cell C presently has no subsidiaries across any sectors.
Cell C’s official LinkedIn profile has approximately 100,866 followers.
Cell C is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Cell C does not have a profile on Crunchbase.
Yes, Cell C maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cell-c.
As of December 23, 2025, Rankiteo reports that Cell C has experienced 1 cybersecurity incidents.
Cell C has an estimated 9,764 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Cyberattack on South Africa's Cell C
Description: South Africa's Cell C suffered a severe cyberattack by the group RansomHouse, resulting in the leak of 2TB of sensitive customer data on the dark web. Compromised information includes full names, contact details, ID numbers, and financial information among others. Although the number of impacted individuals is not specified, the leak poses significant threats to privacy and financial security, leaving customers vulnerable to identity theft and fraud.
Type: Data Breach
Threat Actor: RansomHouse
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Full names, Contact details, Id numbers, Financial information
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Full Names, Contact Details, Id Numbers, Financial Information and .

Entity Name: Cell C
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: South Africa

Type of Data Compromised: Full names, Contact details, Id numbers, Financial information
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Data Exfiltration: Yes
Last Attacking Group: The attacking group in the last incident was an RansomHouse.
Most Significant Data Compromised: The most significant data compromised in an incident were full names, contact details, ID numbers, financial information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were contact details, full names, financial information and ID numbers.
.png)
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.