Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At Cooper Steel, our reputation is built on more than just our services. For more than six decades, clients have trusted us to deliver precision craftsmanship and quality throughout every project stage including estimating, fabrication, erection, project management, and detailing. With grit and determination, we tackle every project head-on, ensuring our customers' expectations are exceeded at every touchpoint.

Cooper Steel A.I CyberSecurity Scoring

Cooper Steel

Company Details

Linkedin ID:

cooper-steel-usa

Employees number:

232

Number of followers:

13,555

NAICS:

23

Industry Type:

Construction

Homepage:

coopersteel.com

IP Addresses:

0

Company ID:

COO_7067528

Scan Status:

In-progress

AI scoreCooper Steel Risk Score (AI oriented)

Between 600 and 649

https://images.rankiteo.com/companyimages/cooper-steel-usa.jpeg
Cooper Steel Construction
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCooper Steel Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cooper-steel-usa.jpeg
Cooper Steel Construction
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Cooper Steel Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Cooper SteelBreach100511/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Cooper Steel Fabricators, a prominent U.S.-based structural steel fabricator serving high-profile clients like Amazon, suffered a significant data breach. A threat actor claimed to have exfiltrated a complete mirror of the company’s FTP server (330 GB), including proprietary 3D models, engineering drawings, and structural specifications for critical projects. Among the compromised data were hyperscale data center designs for Amazon’s Ohio facility, structural details for Publix Greensboro Refrigerated Distribution Center, and blueprints for Walmart distribution centers, cold storage facilities, and a Massachusetts-based Amazon sorting hub.The attacker demanded $28,500 in cryptocurrency for the stolen data, which includes sensitive intellectual property (IP) vital to Cooper Steel’s operations and client trust. The breach exposes not only the company’s internal project documentation but also confidential client infrastructure details, risking competitive disadvantage, reputational harm, and potential legal liabilities. As of now, Cooper Steel has not publicly acknowledged the breach, leaving the extent of operational or financial fallout uncertain. The incident underscores vulnerabilities in supply chain security, particularly for firms handling critical infrastructure designs for tech and logistics giants.

Cooper SteelBreach10055/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Cooper Steel Fabricators, a prominent U.S.-based structural steel fabricator serving high-profile clients like Amazon, suffered a significant data breach. A threat actor claimed responsibility, exfiltrating a complete mirror (330 GB) of the company’s FTP server likely containing proprietary designs, contracts, financial records, or operational data. The attacker demanded $28,500 in cryptocurrency for the stolen data, posing risks of intellectual property theft, competitive disadvantage, or further exploitation if the data is leaked or sold. The breach exposes the company to financial loss (ransom payment or recovery costs), reputational damage among clients (e.g., Amazon), and potential legal liabilities if sensitive third-party data was compromised. The scale of the exfiltrated data suggests a targeted attack aimed at crippling operations or extracting maximum value, with long-term consequences for trust and business continuity.

Cooper Steel Fabricators
Breach
Severity: 100
Impact: 5
Seen: 11/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Cooper Steel Fabricators, a prominent U.S.-based structural steel fabricator serving high-profile clients like Amazon, suffered a significant data breach. A threat actor claimed to have exfiltrated a complete mirror of the company’s FTP server (330 GB), including proprietary 3D models, engineering drawings, and structural specifications for critical projects. Among the compromised data were hyperscale data center designs for Amazon’s Ohio facility, structural details for Publix Greensboro Refrigerated Distribution Center, and blueprints for Walmart distribution centers, cold storage facilities, and a Massachusetts-based Amazon sorting hub.The attacker demanded $28,500 in cryptocurrency for the stolen data, which includes sensitive intellectual property (IP) vital to Cooper Steel’s operations and client trust. The breach exposes not only the company’s internal project documentation but also confidential client infrastructure details, risking competitive disadvantage, reputational harm, and potential legal liabilities. As of now, Cooper Steel has not publicly acknowledged the breach, leaving the extent of operational or financial fallout uncertain. The incident underscores vulnerabilities in supply chain security, particularly for firms handling critical infrastructure designs for tech and logistics giants.

Cooper Steel Fabricators
Breach
Severity: 100
Impact: 5
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Cooper Steel Fabricators, a prominent U.S.-based structural steel fabricator serving high-profile clients like Amazon, suffered a significant data breach. A threat actor claimed responsibility, exfiltrating a complete mirror (330 GB) of the company’s FTP server likely containing proprietary designs, contracts, financial records, or operational data. The attacker demanded $28,500 in cryptocurrency for the stolen data, posing risks of intellectual property theft, competitive disadvantage, or further exploitation if the data is leaked or sold. The breach exposes the company to financial loss (ransom payment or recovery costs), reputational damage among clients (e.g., Amazon), and potential legal liabilities if sensitive third-party data was compromised. The scale of the exfiltrated data suggests a targeted attack aimed at crippling operations or extracting maximum value, with long-term consequences for trust and business continuity.

Ailogo

Cooper Steel Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Cooper Steel

Incidents vs Construction Industry Average (This Year)

No incidents recorded for Cooper Steel in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Cooper Steel in 2026.

Incident Types Cooper Steel vs Construction Industry Avg (This Year)

No incidents recorded for Cooper Steel in 2026.

Incident History — Cooper Steel (X = Date, Y = Severity)

Cooper Steel cyber incidents detection timeline including parent company and subsidiaries

Cooper Steel Company Subsidiaries

SubsidiaryImage

At Cooper Steel, our reputation is built on more than just our services. For more than six decades, clients have trusted us to deliver precision craftsmanship and quality throughout every project stage including estimating, fabrication, erection, project management, and detailing. With grit and determination, we tackle every project head-on, ensuring our customers' expectations are exceeded at every touchpoint.

Loading...
similarCompanies

Cooper Steel Similar Companies

Skanska

Skanska Group uses knowledge & foresight to shape the way people live, work, and connect. More than 138 years in the making, we’re one of the world’s largest development and construction companies, with 2024 revenue totaling SEK 177 billion. We operate in select markets throughout the Nordics, Europ

VINCI Construction

Premier groupe français et acteur mondial de premier plan de la construction, VINCI Construction réunit plus de 830 entreprises et près de 69000 collaborateurs dans une centaine de pays. Ses expertises s’étendent à l’ensemble des métiers du bâtiment, du génie civil, et des activités spécialisées ass

D.R. Horton

America's Builder is a lofty title, but it's a goal we work toward every day. D.R. Horton started in 1978 in Fort Worth, Texas, and has grown into a national Fortune 500 company. Since 2002, D.R. Horton has been the number one homebuilder in America. We build across the country, bringing our home

Bechtel Corporation

Bechtel is a trusted engineering, construction and project management partner to industry and government. Differentiated by the quality of our people and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers’ objectives to create a lasting positive

NCC Limited

Across decades, across disciplines, NCC Ltd has dedicated itself to building infrastructure of uncompromising standards. Infrastructure that is a constant reminder of the Company’s holistic construction expertise, which in turn is the result of relentless innovation and sheer dedication. Today, NCC

Kiewit

At Kiewit, the projects we deliver make a difference, and we offer opportunities for you to make one, too. Our construction and engineering professionals work on some of the industry’s most complex, challenging and rewarding projects – whether it’s boring tunnels through mountains, turning rivers in

Bouygues Construction

Bouygues Construction employs 35,600 people around the world, all driven by the greatest and most exciting responsibility of all – building for life. For our customers in more than 50 countries, we deliver much more than projects. We build to create spaces, connections and opportunities. We impro

International Brotherhood of Electrical Workers (IBEW)

The IBEW represents 860,000 active. and retired who work in a wide variety of fields, including utilities, construction, telecommunications, broadcasting, manufacturing, railroads and government. The IBEW has members in both the United States and Canada and stands out among the American unions in t

Holcim

Holcim is the leading partner for sustainable construction, creating value across the built environment from infrastructure and industry to buildings. We offer high-value end-to-end Building Materials and Building Solutions - from foundations and flooring to roofing and walling - powered by premium

newsone

Cooper Steel CyberSecurity News

August 29, 2025 07:00 AM
Mike Philbrick’s Top Picks for August 29, 2025

Mike Philbrick, CEO, ReSolve Asset Management. Focus: Exchange-Traded Funds. ADVERTISEMENT. Top picks: iShares Silver Bullion ETF,...

July 30, 2025 07:00 AM
Trump slaps universal 50% tariff on copper imports; metal's price plunges

The Trump administration says that the tariffs on metals imports are aimed at boosting domestic industries and addressing "trade imbalances.

July 09, 2025 07:00 AM
Trump's tariffs on cars, copper, drugs, aluminum could hit harder than other levies

The sector-specific tariffs are putting pressure on businesses and foreign nations as they try to navigate Trump's constantly evolving trade...

April 03, 2025 07:00 AM
US exempts steel, aluminium and copper from reciprocal tariffs

Imports of steel, aluminium, copper and specific minerals not available in the US are exempt from the reciprocal tariff.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Cooper Steel CyberSecurity History Information

Official Website of Cooper Steel

The official website of Cooper Steel is http://www.coopersteel.com.

Cooper Steel’s AI-Generated Cybersecurity Score

According to Rankiteo, Cooper Steel’s AI-generated cybersecurity score is 641, reflecting their Poor security posture.

How many security badges does Cooper Steel’ have ?

According to Rankiteo, Cooper Steel currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Cooper Steel been affected by any supply chain cyber incidents ?

According to Rankiteo, Cooper Steel has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Cooper Steel have SOC 2 Type 1 certification ?

According to Rankiteo, Cooper Steel is not certified under SOC 2 Type 1.

Does Cooper Steel have SOC 2 Type 2 certification ?

According to Rankiteo, Cooper Steel does not hold a SOC 2 Type 2 certification.

Does Cooper Steel comply with GDPR ?

According to Rankiteo, Cooper Steel is not listed as GDPR compliant.

Does Cooper Steel have PCI DSS certification ?

According to Rankiteo, Cooper Steel does not currently maintain PCI DSS compliance.

Does Cooper Steel comply with HIPAA ?

According to Rankiteo, Cooper Steel is not compliant with HIPAA regulations.

Does Cooper Steel have ISO 27001 certification ?

According to Rankiteo,Cooper Steel is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Cooper Steel

Cooper Steel operates primarily in the Construction industry.

Number of Employees at Cooper Steel

Cooper Steel employs approximately 232 people worldwide.

Subsidiaries Owned by Cooper Steel

Cooper Steel presently has no subsidiaries across any sectors.

Cooper Steel’s LinkedIn Followers

Cooper Steel’s official LinkedIn profile has approximately 13,555 followers.

NAICS Classification of Cooper Steel

Cooper Steel is classified under the NAICS code 23, which corresponds to Construction.

Cooper Steel’s Presence on Crunchbase

No, Cooper Steel does not have a profile on Crunchbase.

Cooper Steel’s Presence on LinkedIn

Yes, Cooper Steel maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cooper-steel-usa.

Cybersecurity Incidents Involving Cooper Steel

As of January 24, 2026, Rankiteo reports that Cooper Steel has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Cooper Steel has an estimated 39,311 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Cooper Steel ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : data breach

Title: Cooper Steel Fabricators Data Breach and FTP Server Leak

Description: Cooper Steel Fabricators, a U.S.-based structural steel fabricator serving clients like Amazon, was allegedly breached by a threat actor. The actor offered a 'complete mirror' of the company's FTP server (330 GB of data) for $28,500 in cryptocurrency. The leaked data reportedly includes 3D models, drawings, and structural specifications for high-profile projects such as Amazon's Ohio data center (hyperscale operations), Publix Greensboro Refrigerated Distribution Center, Walmart distribution centers, cold storage facilities, and a Massachusetts-based Amazon sorting facility. Cooper Steel has not yet acknowledged the breach claims.

Type: data breach

Threat Actor: Type: cybercriminal (extortionist)Motivation: ['financial gain', 'data monetization']

Motivation: financial gaindata sale

Incident : data breach

Title: Cooper Steel Fabricators Data Breach and Extortion Attempt

Description: Cooper Steel Fabricators, a leading U.S. structural steel fabricator serving clients like Amazon, was breached by a threat actor. The attacker claimed to possess a 'complete mirror' of the company's FTP server (330 GB of data) and demanded $28,500 in cryptocurrency in exchange for not leaking the data.

Date Publicly Disclosed: 2025-11-25

Type: data breach

Threat Actor: Type: extortionistMotivation: financial gain

Motivation: financial gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : data breach COO11101911112525

Data Compromised: 3d models, Drawings, Frames, Structural specifications (e.g., hyperscale data center operations), Project data for publix greensboro refrigerated distribution center, Amazon ohio data center details, Massachusetts-based amazon sorting facility data, Walmart distribution center data, Cold storage facility data

Systems Affected: FTP server

Brand Reputation Impact: potential (unconfirmed; breach claims unacknowledged)

Incident : data breach COO2762127112725

Data Compromised: 330 GB (FTP server contents)

Systems Affected: FTP server

Brand Reputation Impact: potential (due to public disclosure of breach and extortion)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Proprietary Engineering Data, 3D Models, Drawings, Structural Specifications, Project Documentation, and FTP server contents (330 GB).

Which entities were affected by each incident ?

Incident : data breach COO11101911112525

Entity Name: Cooper Steel Fabricators

Entity Type: private company

Industry: structural steel fabrication

Location: United States

Customers Affected: Amazon (Ohio data center, Massachusetts sorting facility), Publix (Greensboro Refrigerated Distribution Center), Walmart (distribution centers, cold storage facilities)

Incident : data breach COO11101911112525

Entity Name: Amazon

Entity Type: corporation (client of Cooper Steel)

Industry: e-commerce/cloud services

Location: United States

Incident : data breach COO11101911112525

Entity Name: Publix

Entity Type: corporation (client of Cooper Steel)

Industry: retail/grocery

Location: United States (Greensboro, NC)

Incident : data breach COO11101911112525

Entity Name: Walmart

Entity Type: corporation (client of Cooper Steel)

Industry: retail

Location: United States

Incident : data breach COO2762127112725

Entity Name: Cooper Steel Fabricators

Entity Type: private company

Industry: structural steel fabrication

Location: United States

Data Breach Information

What type of data was compromised in each breach ?

Incident : data breach COO11101911112525

Type of Data Compromised: Proprietary engineering data, 3d models, Drawings, Structural specifications, Project documentation

Sensitivity of Data: high (proprietary client project details, hyperscale data center specifications)

File Types Exposed: CAD filesPDFsproject documentsFTP server files

Incident : data breach COO2762127112725

Type of Data Compromised: FTP server contents (330 GB)

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : data breach COO11101911112525

Ransom Demanded: $28,500 (in cryptocurrency)

Data Exfiltration: True

Incident : data breach COO2762127112725

Ransom Demanded: $28,500 (in cryptocurrency)

Data Exfiltration: True

References

Where can I find more information about each incident ?

Incident : data breach COO11101911112525

Source: Cybernews

Incident : data breach COO2762127112725

Source: Cybernews

Date Accessed: 2025-11-25

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybernews, and Source: CybernewsDate Accessed: 2025-11-25.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach COO11101911112525

Investigation Status: unconfirmed (Cooper Steel has not acknowledged the breach)

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach COO11101911112525

High Value Targets: Amazon Hyperscale Data Center Specifications, Publix Distribution Center Designs, Walmart Infrastructure Data,

Data Sold on Dark Web: Amazon Hyperscale Data Center Specifications, Publix Distribution Center Designs, Walmart Infrastructure Data,

Incident : data breach COO2762127112725

High Value Targets: Ftp Server,

Data Sold on Dark Web: Ftp Server,

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was $28,500 (in cryptocurrency).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Type: cybercriminal (extortionist)Motivation: ['financial gain', 'data monetization'] and Type: extortionistMotivation: financial gain.

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-25.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were 3D models, drawings, frames, structural specifications (e.g., hyperscale data center operations), project data for Publix Greensboro Refrigerated Distribution Center, Amazon Ohio data center details, Massachusetts-based Amazon sorting facility data, Walmart distribution center data, cold storage facility data, and 330 GB (FTP server contents).

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was FTP server and FTP server.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 3D models, cold storage facility data, structural specifications (e.g., hyperscale data center operations), 330 GB (FTP server contents), drawings, Massachusetts-based Amazon sorting facility data, Amazon Ohio data center details, project data for Publix Greensboro Refrigerated Distribution Center, Walmart distribution center data and frames.

Ransomware Information

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Cybernews.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is unconfirmed (Cooper Steel has not acknowledged the breach).

cve

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cooper-steel-usa' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge