Company Details
cleafy
82
3,381
541514
cleafy.com
0
CLE_6164758
In-progress

Cleafy Company CyberSecurity Posture
cleafy.comWe are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers that since 2014 share the same dream: make technology a safer place. Every day, we work side by side with our customers to help them safely navigate digital opportunities, while growing their business. And we do it with passion, determination, and constant curiosity about the unexpected. Our purpose is to make people’s life easier and free from the threats hidden in the digital ecosystem. That’s why we designed a real-time technology that enables fraud management teams in financial institutions to detect and prevent financial fraud across all digital channels, while ensuring a safe and seamless experience for the end-users. Recognized as a market leader by industry analysts, today we protect over 60M+ users of top-tier retail and corporate banks against financial online fraud.
Company Details
cleafy
82
3,381
541514
cleafy.com
0
CLE_6164758
In-progress
Between 650 and 699

Cleafy Global Score (TPRM)XXXX

Description: Cleafy, a cybersecurity firm, encountered a new Android malware known as 'BingoMod' which targets victims' bank accounts for fraudulent transfers and then wipes the devices to obstruct forensic analysis. This malware utilizes On Device Fraud (ODF) techniques to bypass authentication and identification processes established by banks. The attack mainly affected devices using English, Romanian, and Italian languages. Consequences include compromised financial information and significant personal data leaks of customers using the affected banking services. The nature of the attack also implies a potential ruinous impact on the banks' reputations and operational integrity.


No incidents recorded for Cleafy in 2025.
No incidents recorded for Cleafy in 2025.
No incidents recorded for Cleafy in 2025.
Cleafy cyber incidents detection timeline including parent company and subsidiaries

We are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers that since 2014 share the same dream: make technology a safer place. Every day, we work side by side with our customers to help them safely navigate digital opportunities, while growing their business. And we do it with passion, determination, and constant curiosity about the unexpected. Our purpose is to make people’s life easier and free from the threats hidden in the digital ecosystem. That’s why we designed a real-time technology that enables fraud management teams in financial institutions to detect and prevent financial fraud across all digital channels, while ensuring a safe and seamless experience for the end-users. Recognized as a market leader by industry analysts, today we protect over 60M+ users of top-tier retail and corporate banks against financial online fraud.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly
.png)
Hackers are now targeting more than 400 financial applications worldwide, deploying a new strain of Android malware in a push to drain...
A dangerous new mobile threat called Albiriox has emerged, giving criminals a tool to completely take over victims' Android phones and steal...
Company: Cleafy. Co-founders: Matteo Bogana (CEO), Nicolò Pastore (Chief Technology Officer), and Carmine Giangregorio (Product Manager).
A newly discovered Android banking trojan is giving hackers the ability to hijack mobile devices and drain accounts while victims sleep.
A recent report on the Klopatra malware operation shows hackers taking advantage of a surge in VPN use.
Cybersecurity researchers are urgently warning Android users to delete a fake VPN and streaming app that is silently stealing banking...
Cleafy, cyber security experts, say at least an eye-watering 3000 devices are thought to have been infected so far.
Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000...
A scam that combines social engineering, previously undocumented malware and mobile phones' near-field communication (NFC) capabilities to compromise payment...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cleafy is http://www.cleafy.com.
According to Rankiteo, Cleafy’s AI-generated cybersecurity score is 670, reflecting their Weak security posture.
According to Rankiteo, Cleafy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cleafy is not certified under SOC 2 Type 1.
According to Rankiteo, Cleafy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cleafy is not listed as GDPR compliant.
According to Rankiteo, Cleafy does not currently maintain PCI DSS compliance.
According to Rankiteo, Cleafy is not compliant with HIPAA regulations.
According to Rankiteo,Cleafy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cleafy operates primarily in the Computer and Network Security industry.
Cleafy employs approximately 82 people worldwide.
Cleafy presently has no subsidiaries across any sectors.
Cleafy’s official LinkedIn profile has approximately 3,381 followers.
Cleafy is classified under the NAICS code 541514, which corresponds to Others.
No, Cleafy does not have a profile on Crunchbase.
Yes, Cleafy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cleafy.
As of December 24, 2025, Rankiteo reports that Cleafy has experienced 1 cybersecurity incidents.
Cleafy has an estimated 3,179 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: BingoMod Android Malware Incident
Description: Cleafy, a cybersecurity firm, encountered a new Android malware known as 'BingoMod' which targets victims' bank accounts for fraudulent transfers and then wipes the devices to obstruct forensic analysis. This malware utilizes On Device Fraud (ODF) techniques to bypass authentication and identification processes established by banks. The attack mainly affected devices using English, Romanian, and Italian languages. Consequences include compromised financial information and significant personal data leaks of customers using the affected banking services. The nature of the attack also implies a potential ruinous impact on the banks' reputations and operational integrity.
Type: Malware
Attack Vector: Mobile Devices
Vulnerability Exploited: On Device Fraud (ODF) techniques
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Android Devices.

Data Compromised: Financial information, Personal data
Systems Affected: Android Devices
Brand Reputation Impact: Potentially Ruinous
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Financial Information, Personal Data and .

Entity Type: Banking Services
Industry: Financial
Location: English-speaking regionsRomaniaItaly

Type of Data Compromised: Financial information, Personal data
Sensitivity of Data: High

Entry Point: Android Devices
Most Significant Data Compromised: The most significant data compromised in an incident were Financial Information, Personal Data and .
Most Significant System Affected: The most significant system affected in an incident was Android Devices.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Financial Information and Personal Data.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Android Devices.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.