Company Details
ee-uk
11,299
121,061
517
ee.co.uk
0
EE_6851764
In-progress

EE Company CyberSecurity Posture
ee.co.ukEE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was the first European operator to surpass 14 million 4G customers in December 2015. We have more than 550 shops across the UK and we’re dedicated to making EE an outstanding place to work for our 13,000 employees. Our 4G coverage reaches 80% of the UK geography and we have plans to extend 4G geographic coverage to 95% by 2020. We’ve received extensive independent recognition, including being ranked the UK's best overall network by RootMetrics®; Best Network at the 2015, 2016 and 2017 Mobile News Awards; Best Network at the Mobile Choice Consumer Awards 2016; Best Consumer Network at the 2015 & 2016 Mobile Industry Awards; as well as Fastest Network and Best Network Coverage at the 2017 uSwitch Mobile Awards.
Company Details
ee-uk
11,299
121,061
517
ee.co.uk
0
EE_6851764
In-progress
Between 750 and 799

EE Global Score (TPRM)XXXX

Description: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack.
Description: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users. According to reports, EE, the massive British mobile network, left a crucial code repository on an open-source tool that is password-protected by default. Malicious hackers can use this to examine the source code and find weaknesses in it. An attacker might use the keys' accessibility to examine the employee payment systems' code and find weaknesses that they could use for malevolent intent.


No incidents recorded for EE in 2025.
No incidents recorded for EE in 2025.
No incidents recorded for EE in 2025.
EE cyber incidents detection timeline including parent company and subsidiaries

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was the first European operator to surpass 14 million 4G customers in December 2015. We have more than 550 shops across the UK and we’re dedicated to making EE an outstanding place to work for our 13,000 employees. Our 4G coverage reaches 80% of the UK geography and we have plans to extend 4G geographic coverage to 95% by 2020. We’ve received extensive independent recognition, including being ranked the UK's best overall network by RootMetrics®; Best Network at the 2015, 2016 and 2017 Mobile News Awards; Best Network at the Mobile Choice Consumer Awards 2016; Best Consumer Network at the 2015 & 2016 Mobile Industry Awards; as well as Fastest Network and Best Network Coverage at the 2017 uSwitch Mobile Awards.


AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout
Welcome to Deutsche Telekom. As one of the world's most valuable brands, we design innovative solutions and products in the areas of connectivity, networks, digitalization and security. #connectingyourworld At Deutsche Telekom, we believe that each and every one of us has the power to move society

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

VEON is a global digital operator headquartered in Dubai, providing connectivity and digital services across dynamic frontier markets that are home to more than 6% of the world’s population. With our digital operators, we transform lives through technology-driven services that empower millions and

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

תכירו את השחקנים הראשיים שלנו: העובדות והעובדים. אנחנו לא עובדים עם תסריט קבוע, חושבים מחוץ לקופסא, ומייצרים ז'אנר משלנו. כש-יס קמה, בשנת 1998, הבאנו את בשורת הלווין אל עולם שידורי הטלוויזיה והיינו הראשונים להציע שידורים דיגיטליים ושירותי טלוויזיה אינטראקטיביים - כשבחירת התכנים היא בידיים של הלקוח

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives. With stc, You will always be empowered to focus on delivering what’s next through collaborati

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu
.png)
The key principles of Secure by Design include defense in depth, attack surface minimization and privilege access management, all with the goal of increasing...
With rapid innovation sweeping the automotive landscape, ensuring the safety and cybersecurity of modern vehicles is becoming increasingly complex and...
This discussion looks at how to ensure AV safety through robust cybersecurity measures, examining protocols, standards and hardware integrity against...
The Estonian Maritime Academy of TalTech and the MariCybERA project team have released Maritime Cybersecurity, a groundbreaking scientific...
Designers are moving from microcontrollers to microprocessors, with added functionalities and access to more memory, but need all of this to...
As industry heads towards SDVs, cybersecurity protection from malicious actors are becoming more important over time.
This article explains how energy companies can avoid regulatory headaches by strengthening connectivity resilience.
Chief supply chain officers (CSCOs) navigating an increasingly Cybersecurity GenAI landscape are facing contrasts in technology maturity.
AI and quantum computing offer transformative opportunities but pose an urgent cybersecurity threat that demands an immediate response.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of EE is http://ee.co.uk.
According to Rankiteo, EE’s AI-generated cybersecurity score is 764, reflecting their Fair security posture.
According to Rankiteo, EE currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, EE is not certified under SOC 2 Type 1.
According to Rankiteo, EE does not hold a SOC 2 Type 2 certification.
According to Rankiteo, EE is not listed as GDPR compliant.
According to Rankiteo, EE does not currently maintain PCI DSS compliance.
According to Rankiteo, EE is not compliant with HIPAA regulations.
According to Rankiteo,EE is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
EE operates primarily in the Telecommunications industry.
EE employs approximately 11,299 people worldwide.
EE presently has no subsidiaries across any sectors.
EE’s official LinkedIn profile has approximately 121,061 followers.
EE is classified under the NAICS code 517, which corresponds to Telecommunications.
No, EE does not have a profile on Crunchbase.
Yes, EE maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ee-uk.
As of December 14, 2025, Rankiteo reports that EE has experienced 2 cybersecurity incidents.
EE has an estimated 9,723 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Ransomware.
Title: EE Operator Code Repository Exposure
Description: A vital code system with a default password has been left exposed online by the EE operator, the biggest cellular network operator in the UK, which serves almost 30 million users.
Type: Data Exposure
Attack Vector: Exposed Default Password
Vulnerability Exploited: Default Password on Code Repository
Threat Actor: Unknown
Motivation: Unintentional Exposure
Title: BT Group Ransomware Attack
Description: BT Group experienced a ransomware attack from the Black Basta group, leading to the shutdown of some of its servers. This cyberattack put sensitive data at risk, with the group claiming to have stolen 500GB encompassing financial data, organizational records, user and personal documents, NDAs, and confidential information. Although live BT Conferencing services remained operational and other customer services were unaffected, the incident raises concerns about potential data breaches and the overall cybersecurity posture of the company. Screenshots of the compromised data, including passports, were published as proof of the attack.
Type: Ransomware
Threat Actor: Black Basta group
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Source code, Employee payment systems code
Systems Affected: Code Repository

Data Compromised: Financial data, Organizational records, User and personal documents, Ndas, Confidential information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Source Code, Employee Payment Systems Code, , Financial Data, Organizational Records, User And Personal Documents, Ndas, Confidential Information and .

Entity Name: EE Operator
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: UK
Customers Affected: Almost 30 million users

Type of Data Compromised: Source code, Employee payment systems code

Type of Data Compromised: Financial data, Organizational records, User and personal documents, Ndas, Confidential information

Data Exfiltration: True
Last Attacking Group: The attacking group in the last incident were an Unknown and Black Basta group.
Most Significant Data Compromised: The most significant data compromised in an incident were Source Code, Employee Payment Systems Code, , financial data, organizational records, user and personal documents, NDAs, confidential information and .
Most Significant System Affected: The most significant system affected in an incident was Code Repository.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were organizational records, Employee Payment Systems Code, Source Code, user and personal documents, NDAs, confidential information and financial data.
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.