Company Details
checkout
2,214
262,397
52
checkout.com
0
CHE_3118574
In-progress

Checkout.com Company CyberSecurity Posture
checkout.comCheckout.com is a financial technology company that delivers a high-performance payments platform. Enterprise and scaling businesses use our cloud-based platform to process payments, send payouts, and manage card programs. Checkout.com is headquartered in London, with offices in New York, Paris, Dubai, Hong Kong, and other locations across six continents. Customers include global brands such as Sony, SHEIN, Wise, Patreon, and GE HealthCare.
Company Details
checkout
2,214
262,397
52
checkout.com
0
CHE_3118574
In-progress
Between 600 and 649

Checkout.com Global Score (TPRM)XXXX

Description: Checkout.com was targeted by the cybercriminal group **ShinyHunters** in early November 2025 via a **ransomware attack** exploiting a decommissioned third-party cloud storage system. The breach exposed **internal operational documents and merchant onboarding materials from 2020 and earlier**, affecting **less than 25% of its current merchant base**. While **no live payment systems, merchant funds, or card numbers were compromised**, the incident involved unauthorized access to legacy data. The company **refused to pay the ransom**, instead donating the demanded amount to **Carnegie Mellon University and the University of Oxford Cyber Security Center** to combat cybercrime. Checkout.com emphasized **transparency, accountability, and collaboration with law enforcement**, while contacting impacted customers and regulators. The breach highlighted vulnerabilities in legacy system decommissioning but did not disrupt core financial operations or expose sensitive financial data.
Description: UK-based payment services provider **Checkout.com** experienced a security breach involving its **legacy third-party cloud file storage system**, compromised by the **ShinyHunters extortion group**. The attackers demanded a ransom, which the company refused to pay directly. Instead, Checkout.com redirected the demanded amount to **Carnegie Mellon University** and the **University of Oxford Cyber Security Center** to fund cybercrime research. The incident highlights risks associated with third-party cloud vulnerabilities, exposing potential data leaks or operational disruptions. While the company avoided direct ransom payment, the attack underscores the persistent threat of **ransomware-driven extortion** targeting financial service providers. The breach’s scope—whether customer or internal data was accessed—remains undisclosed, but the involvement of a high-profile threat actor suggests significant exposure risks. The decision to fund research rather than pay ransom aligns with ethical cybersecurity practices but does not eliminate the initial compromise’s impact on trust and system integrity.


Checkout.com has 31.58% more incidents than the average of same-industry companies with at least one recorded incident.
Checkout.com has 56.25% more incidents than the average of all companies with at least one recorded incident.
Checkout.com reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Checkout.com cyber incidents detection timeline including parent company and subsidiaries

Checkout.com is a financial technology company that delivers a high-performance payments platform. Enterprise and scaling businesses use our cloud-based platform to process payments, send payouts, and manage card programs. Checkout.com is headquartered in London, with offices in New York, Paris, Dubai, Hong Kong, and other locations across six continents. Customers include global brands such as Sony, SHEIN, Wise, Patreon, and GE HealthCare.


From rescue helicopters to signing the Equator Principles, from paying super during parental leave to adding 'Touch ID' biometric technology to our banking apps and being first on the scene with a helping hand in times of crisis... we have a proud history of stepping up to be first for our customer
From gaining new experiences in different roles to acquiring fresh knowledge and skills – at UBS we believe that you should never stop growing and learning because life never stops teaching. We know that it's our people – with their unique backgrounds, skills, experience levels and interests – who d
Australia’s leading provider of financial services including retail, premium, business and institutional banking, funds management, superannuation, insurance, investment and sharebroking products and services. We are a business with more than 800,000 shareholders and over 52,000 employees. We offer

KPMG is one of the world’s leading professional services firms and the fastest growing Big Four accounting firm in the United States. With 75+ offices and more than 40,000 employees and partners throughout the US, we’re leading the industry in new and exciting ways. Our size and strength make us muc

FactSet creates flexible, open data and software solutions for tens of thousands of investment professionals around the world, providing instant access to financial data and analytics that investors use to make crucial decisions. For 40 years, through market changes and technological progress, our

A XP Inc. é uma das maiores instituições financeiras independente do Brasil, dona das marcas XP, Rico, Clear, XP Educação, InfoMoney, entre outras. Com mais de 4,6 milhões de clientes ativos e um valor superior a R$ 1,1 trilhão de ativos sob custódia, há 23 anos vem transformando o mercado financeir

Bienvenido a la página oficial del Banco BBVA Bancomer. Institución financiera de México desde 1932. Es una empresa filial de Banco Bilbao Vizcaya Argentaria (BBVA), uno de los grupos financieros líderes en Europa y considerado entre uno de los más grandes de la Zona Euro. El Grupo trabaja por un f

Northwestern Mutual is here for what’s most important—helping families and businesses experience the freedom of financial security for over 160 years. Through our personalized, holistic approach, including both insurance and investments, we’re helping people make the most of life today, and for days

At Chase, we’re dedicated to helping you succeed. Whether you’re in need of banking, credit cards, mortgages, auto financing, investment guidance, small business support, or payment solutions, we’re beside you every step of the way. For customer service, contact us via chase.com/customerservice. S
.png)
The cybersecurity landscape continues to evolve at unprecedented speed, with new vulnerabilities, data breaches, and threat actor activities...
In a defiant move against cyber extortion, London-based payment processor Checkout.com has refused to pay hackers from the notorious...
According to early findings, the Checkout.com data breach occurred when ShinyHunters accessed a legacy storage system last used in 2020.
In a striking rebuke to cybercriminals, Checkout.com's chief technology officer has turned a ransomware attack into an opportunity for...
Cyber laws are back as shutdown bill signed, Microsoft launches screen capture prevention for Teams, FBI calls Akira top five ransomware.
Payment processor Checkout.com has disclosed a significant data breach following a targeted attack by the notorious cybercrime group...
The threat group accessed a poorly decommissioned third-party system last used by the company in 2020 but that still contained merchant...
Payment processor Checkout.com recently experienced a data breach after being targeted by the cybercrime group “ShinyHunters.”
UK financial technology company Checkout announced that the ShinyHunters threat group has breached one of its legacy cloud storage systems...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Checkout.com is https://www.checkout.com.
According to Rankiteo, Checkout.com’s AI-generated cybersecurity score is 630, reflecting their Poor security posture.
According to Rankiteo, Checkout.com currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Checkout.com is not certified under SOC 2 Type 1.
According to Rankiteo, Checkout.com does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Checkout.com is not listed as GDPR compliant.
According to Rankiteo, Checkout.com does not currently maintain PCI DSS compliance.
According to Rankiteo, Checkout.com is not compliant with HIPAA regulations.
According to Rankiteo,Checkout.com is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Checkout.com operates primarily in the Financial Services industry.
Checkout.com employs approximately 2,214 people worldwide.
Checkout.com presently has no subsidiaries across any sectors.
Checkout.com’s official LinkedIn profile has approximately 262,397 followers.
Checkout.com is classified under the NAICS code 52, which corresponds to Finance and Insurance.
Yes, Checkout.com has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/checkout-com.
Yes, Checkout.com maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/checkout.
As of December 04, 2025, Rankiteo reports that Checkout.com has experienced 2 cybersecurity incidents.
Checkout.com has an estimated 29,912 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with contacting impacted customers, remediation measures with coordinating with regulators, and communication strategy with public apology by cto, communication strategy with transparency in disclosure, communication strategy with donation to cybersecurity research centers, and and remediation measures with donated ransom amount to cybercrime research (carnegie mellon university, university of oxford), and communication strategy with public denial of ransom payment via the register..
Title: Checkout.com Ransomware Extortion Attempt by ShinyHunters (November 2025)
Description: Checkout.com was targeted by a digital extortion attempt by the threat actor group ShinyHunters in November 2025. Attackers accessed a legacy third-party cloud file storage system that had not been properly decommissioned, exposing internal operation documents and merchant onboarding materials from 2020 and earlier. The company refused to pay the ransom, opting instead to donate the demanded amount to Carnegie Mellon University and the University of Oxford Cyber Security Center. Live payment processing systems, merchant funds, and card numbers were not compromised.
Date Detected: 2025-11-01
Date Publicly Disclosed: 2025-11-01
Type: data breach
Attack Vector: legacy third-party cloud file storage system (improperly decommissioned)
Vulnerability Exploited: improper decommissioning of legacy cloud storage
Threat Actor: ShinyHunters
Motivation: financial extortion
Title: Checkout.com Ransomware Incident by ShinyHunters (2025)
Description: UK-based payment services provider Checkout.com experienced a compromise of its legacy third-party cloud file storage system by the ShinyHunters extortion group. Instead of paying the ransom, Checkout.com donated the demanded amount to Carnegie Mellon University and the University of Oxford Cyber Security Center for cybercrime research.
Date Publicly Disclosed: 2025-11-14
Type: ransomware
Attack Vector: compromised legacy third-party cloud file storage
Threat Actor: ShinyHunters
Motivation: financial gainextortion
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through legacy third-party cloud file storage system and legacy third-party cloud file storage.

Data Compromised: Internal operation documents, Merchant onboarding materials (pre-2021)
Systems Affected: legacy third-party cloud file storage
Downtime: none (live payment processing systems unaffected)
Operational Impact: limited (less than 25% of current merchant base affected)
Brand Reputation Impact: positive (praised for transparency and refusal to pay ransom)
Identity Theft Risk: none (no card numbers or merchant funds accessed)
Payment Information Risk: none

Systems Affected: legacy third-party cloud file storage
Brand Reputation Impact: potential negative impact (public disclosure of breach)
Payment Information Risk: potential (payment services provider)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal Operation Documents, Merchant Onboarding Materials and .

Entity Name: Checkout.com
Entity Type: payment processing company
Industry: fintech
Customers Affected: less than 25% of current merchant base

Entity Name: Checkout.com
Entity Type: payment services provider
Industry: financial services (payments)
Location: United Kingdom

Incident Response Plan Activated: True
Remediation Measures: contacting impacted customerscoordinating with regulators
Communication Strategy: public apology by CTOtransparency in disclosuredonation to cybersecurity research centers

Incident Response Plan Activated: True
Remediation Measures: donated ransom amount to cybercrime research (Carnegie Mellon University, University of Oxford)
Communication Strategy: public denial of ransom payment via The Register

Type of Data Compromised: Internal operation documents, Merchant onboarding materials
Sensitivity of Data: moderate (historical operational and onboarding data)

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: contacting impacted customers, coordinating with regulators, , donated ransom amount to cybercrime research (Carnegie Mellon University, University of Oxford), .


Lessons Learned: Importance of proper decommissioning of legacy systems, transparency in incident response, and refusal to fund criminal activity through ransom payments.

Recommendations: ensure thorough decommissioning of legacy systems, invest in cybersecurity research and collaboration with academic institutions, maintain transparency with stakeholders during incidentsensure thorough decommissioning of legacy systems, invest in cybersecurity research and collaboration with academic institutions, maintain transparency with stakeholders during incidentsensure thorough decommissioning of legacy systems, invest in cybersecurity research and collaboration with academic institutions, maintain transparency with stakeholders during incidents
Key Lessons Learned: The key lessons learned from past incidents are Importance of proper decommissioning of legacy systems, transparency in incident response, and refusal to fund criminal activity through ransom payments.

Source: TechRadar
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: TechRadar, and Source: The RegisterDate Accessed: 2025-11-14.

Investigation Status: ongoing (coordinating with law enforcement and regulators)

Investigation Status: ongoing (implied by public disclosure)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Apology By Cto, Transparency In Disclosure, Donation To Cybersecurity Research Centers and Public Denial Of Ransom Payment Via The Register.

Stakeholder Advisories: Public Statement By Cto Mariano Albera, Contacting Impacted Merchants.
Customer Advisories: notifications to affected merchants
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public Statement By Cto Mariano Albera, Contacting Impacted Merchants, Notifications To Affected Merchants and .

Entry Point: legacy third-party cloud file storage system

Entry Point: Legacy Third-Party Cloud File Storage,

Root Causes: Improper Decommissioning Of Legacy Cloud Storage, Oversight In Third-Party System Management,
Corrective Actions: Donation To Cybersecurity Research, Enhanced Coordination With Law Enforcement And Regulators,

Root Causes: Compromise Of Legacy Third-Party Cloud Storage,
Corrective Actions: Donation To Cybercrime Research Instead Of Ransom Payment,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Donation To Cybersecurity Research, Enhanced Coordination With Law Enforcement And Regulators, , Donation To Cybercrime Research Instead Of Ransom Payment, .
Last Ransom Demanded: The amount of the last ransom demanded was True.
Last Attacking Group: The attacking group in the last incident were an ShinyHunters and ShinyHunters.
Most Recent Incident Detected: The most recent incident detected was on 2025-11-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-14.
Most Significant Data Compromised: The most significant data compromised in an incident were internal operation documents, merchant onboarding materials (pre-2021), and .
Most Significant System Affected: The most significant system affected in an incident was legacy third-party cloud file storage and legacy third-party cloud file storage.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were internal operation documents and merchant onboarding materials (pre-2021).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Importance of proper decommissioning of legacy systems, transparency in incident response, and refusal to fund criminal activity through ransom payments.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was ensure thorough decommissioning of legacy systems, maintain transparency with stakeholders during incidents and invest in cybersecurity research and collaboration with academic institutions.
Most Recent Source: The most recent source of information about an incident are TechRadar and The Register.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (coordinating with law enforcement and regulators).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was public statement by CTO Mariano Albera, contacting impacted merchants, .
Most Recent Customer Advisory: The most recent customer advisory issued was an notifications to affected merchants.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an legacy third-party cloud file storage system.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was improper decommissioning of legacy cloud storageoversight in third-party system management, compromise of legacy third-party cloud storage.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was donation to cybersecurity researchenhanced coordination with law enforcement and regulators, donation to cybercrime research instead of ransom payment.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.