Company Details
emcor-group-inc
3,551
44,047
23
emcorgroup.com
0
EMC_3306597
In-progress

EMCOR Group, Inc. Company CyberSecurity Posture
emcorgroup.comA Fortune 500® company with 2022 revenue of $11.1B, EMCOR Group, Inc. (NYSE: EME) is a leader in mechanical and electrical construction, industrial and energy infrastructure, and building services. With unmatched experience, broad reach, and local execution, EMCOR Group companies specialize in planning, installing, operating, maintaining, and protecting the sophisticated and dynamic systems that create facility environments. This includes systems such as electrical, mechanical, lighting, air conditioning, heating, security, fire protection, and power generation. EMCOR companies work in virtually every sector of the economy for a diverse range of businesses, organizations, and public sector clients. Combining the strength of an industry leader with the knowledge and care of over 180 locations, the 33,000+ skilled employees of EMCOR have undertaken and completed some of the country’s most ambitious projects.
Company Details
emcor-group-inc
3,551
44,047
23
emcorgroup.com
0
EMC_3306597
In-progress
Between 750 and 799

EGI Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that EMCOR Services Mesa Energy Systems experienced a data breach due to the theft of a laptop on or around November 25, 2014. The incident potentially compromised personal information including names, Social Security numbers, dates of birth, and other sensitive data, although the exact number of individuals affected is unknown. The company is offering one year of identity theft protection services through Kroll.
Description: On November 17, 2020, the Maine Office of the Attorney General disclosed a data breach affecting **Quebe Holdings, Inc.**, stemming from an external system compromise discovered on October 16, 2020. The incident exposed **Social Security numbers (SSNs) of certain employees**, impacting **4,302 individuals**, including three Maine residents. While the breach did not involve customer data, the exposure of SSNs—highly sensitive personally identifiable information (PII)—poses significant risks, including identity theft and financial fraud. In response, Quebe Holdings is providing **24 months of identity theft protection services through Kroll** to mitigate potential harm. The breach highlights vulnerabilities in external systems, raising concerns about third-party security controls and the protection of employee data. The compromised SSNs could enable long-term fraudulent activities, underscoring the severity of internal data leaks within corporate environments.


No incidents recorded for EMCOR Group, Inc. in 2025.
No incidents recorded for EMCOR Group, Inc. in 2025.
No incidents recorded for EMCOR Group, Inc. in 2025.
EGI cyber incidents detection timeline including parent company and subsidiaries

A Fortune 500® company with 2022 revenue of $11.1B, EMCOR Group, Inc. (NYSE: EME) is a leader in mechanical and electrical construction, industrial and energy infrastructure, and building services. With unmatched experience, broad reach, and local execution, EMCOR Group companies specialize in planning, installing, operating, maintaining, and protecting the sophisticated and dynamic systems that create facility environments. This includes systems such as electrical, mechanical, lighting, air conditioning, heating, security, fire protection, and power generation. EMCOR companies work in virtually every sector of the economy for a diverse range of businesses, organizations, and public sector clients. Combining the strength of an industry leader with the knowledge and care of over 180 locations, the 33,000+ skilled employees of EMCOR have undertaken and completed some of the country’s most ambitious projects.


Premier groupe français et acteur mondial de premier plan de la construction, VINCI Construction réunit plus de 830 entreprises et près de 69000 collaborateurs dans une centaine de pays. Ses expertises s’étendent à l’ensemble des métiers du bâtiment, du génie civil, et des activités spécialisées ass
Fluor Corporation is a global engineering, procurement and construction company. We work with leaders in the energy, infrastructure, life sciences, advanced technologies, mining and metals industries, as well as government agencies, to build a better world. Since our founding in 1912, we have been

🏗️ Building a Sustainable Tomorrow at BAM! As leaders in the construction industry, we are committed to pioneering sustainable practices that not only enhance our projects but also contribute to a better future for generations to come. Our strategy revolves around focusing to protect profitabilit
Bechtel is a trusted engineering, construction and project management partner to industry and government. Differentiated by the quality of our people and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers’ objectives to create a lasting positive

Consolidated Contractors International company is a leading diversified company carrying out construction, engineering, procurement, development and investment activities internationally. We are committed to providing reliable, amicable, and professional service to our valuable clients, and to being
NCC is one of the leading construction companies in the Nordics. Based on its expertise in managing complex construction processes, NCC contributes to a positive impact of construction for its customers and society. NCC is one of the largest players in the Nordic construction market, and operates

At Burns & McDonnell, our engineers, construction professionals, architects, planners, technologists and scientists do more than plan, design and construct. With a mission unchanged since 1898 — make our clients successful — we partner with you on the toughest challenges, constantly working to make

With 32,500 employees working in 60 countries, Bouygues Construction designs, builds and rehabilitates the infrastructures and buildings that are essential for a sustainable society. All over the world, the teams support the development of low-carbon energy production and public transport infrastruc

Tekfen Contracting Group is one of the two most prominent groups of Tekfen Holding, with its more than 17 thousand employees, nearly 2 billion USD of active portfolio and over 330 projects undertaken successfully to date. The Group is considered as one of the biggest institutions in Turkey, in terms
.png)
Emcor Group (EME) has been one of the stocks most watched by Zacks.com users lately. So, it is worth exploring what lies ahead for the...
Emcor Group (EME) has received quite a bit of attention from Zacks.com users lately. Therefore, it is wise to be aware of the facts that can...
--(BUSINESS WIRE)-- EMCOR Group, Inc. (NYSE: EME) announced today that Tony Guzzi, Chairman, President, and Chief Executive Officer,...
NORWALK, Conn., October 30, 2025--EMCOR Group, Inc. (NYSE: EME) today reported results for the quarter ended September 30, 2025.
EMCOR Group Inc (EME) reports a robust 16.4% revenue increase and strategic acquisitions, despite challenges in the Industrial Services...
NORWALK, Conn., October 29, 2025--EMCOR Group, Inc. (the "Company") (NYSE: EME) announced today the election of Pat Roche to the Company's...
NORWALK, Conn., October 16, 2025--EMCOR Group, Inc. (NYSE: EME) announced today that it will release its financial results for the third...
Zacks.com users have recently been watching Emcor Group (EME) quite a bit. Thus, it is worth knowing the facts that could determine the...
EMCOR Group, Inc. declared a $0.25 per share quarterly dividend payable Oct 30, 2025 to shareholders of record on Oct 15, 2025.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of EMCOR Group, Inc. is http://www.emcorgroup.com.
According to Rankiteo, EMCOR Group, Inc.’s AI-generated cybersecurity score is 799, reflecting their Fair security posture.
According to Rankiteo, EMCOR Group, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, EMCOR Group, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, EMCOR Group, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, EMCOR Group, Inc. is not listed as GDPR compliant.
According to Rankiteo, EMCOR Group, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, EMCOR Group, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,EMCOR Group, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
EMCOR Group, Inc. operates primarily in the Construction industry.
EMCOR Group, Inc. employs approximately 3,551 people worldwide.
EMCOR Group, Inc. presently has no subsidiaries across any sectors.
EMCOR Group, Inc.’s official LinkedIn profile has approximately 44,047 followers.
EMCOR Group, Inc. is classified under the NAICS code 23, which corresponds to Construction.
No, EMCOR Group, Inc. does not have a profile on Crunchbase.
Yes, EMCOR Group, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/emcor-group-inc.
As of November 27, 2025, Rankiteo reports that EMCOR Group, Inc. has experienced 2 cybersecurity incidents.
EMCOR Group, Inc. has an estimated 38,703 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with kroll, and third party assistance with kroll (identity theft protection services), and recovery measures with 24 months of identity theft protection services for affected individuals..
Title: EMCOR Services Mesa Energy Systems Data Breach
Description: The California Office of the Attorney General reported that EMCOR Services Mesa Energy Systems experienced a data breach due to the theft of a laptop on or around November 25, 2014. The incident potentially compromised personal information including names, Social Security numbers, dates of birth, and other sensitive data, although the exact number of individuals affected is unknown. The company is offering one year of identity theft protection services through Kroll.
Date Detected: 2014-11-25
Type: Data Breach
Attack Vector: Theft of Laptop
Title: Quebe Holdings, Inc. Data Breach (2020)
Description: The Maine Office of the Attorney General reported a data breach involving Quebe Holdings, Inc. on November 17, 2020. The breach, discovered on October 16, 2020, was due to an external system breach that may have compromised the Social Security numbers of certain employees, affecting three Maine residents, with a total of 4,302 individuals impacted. Quebe Holdings is offering 24 months of identity theft protection services via Kroll.
Date Detected: 2020-10-16
Date Publicly Disclosed: 2020-11-17
Type: Data Breach
Attack Vector: External System Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Dates of birth, Other sensitive data
Identity Theft Risk: High

Data Compromised: Social security numbers
Identity Theft Risk: High (Social Security numbers exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Dates Of Birth, Other Sensitive Data, , Social Security Numbers and .

Entity Name: EMCOR Services Mesa Energy Systems
Entity Type: Company
Industry: Energy Services
Location: California

Entity Name: Quebe Holdings, Inc.
Entity Type: Corporation
Customers Affected: 4,302 individuals (including 3 Maine residents)

Third Party Assistance: Kroll

Third Party Assistance: Kroll (Identity Theft Protection Services).
Recovery Measures: 24 months of identity theft protection services for affected individuals
Third-Party Assistance: The company involves third-party assistance in incident response through Kroll, Kroll (identity theft protection services), .

Type of Data Compromised: Names, Social security numbers, Dates of birth, Other sensitive data
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Social security numbers
Number of Records Exposed: 4,302
Sensitivity of Data: High
Personally Identifiable Information: Social Security numbers
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through 24 months of identity theft protection services for affected individuals, .

Regulatory Notifications: Maine Office of the Attorney General

Source: California Office of the Attorney General

Source: Maine Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: Maine Office of the Attorney General.

Customer Advisories: 24 months of identity theft protection services offered to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were 24 Months Of Identity Theft Protection Services Offered To Affected Individuals and .
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Kroll, Kroll (Identity Theft Protection Services), .
Most Recent Incident Detected: The most recent incident detected was on 2014-11-25.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-11-17.
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, dates of birth, other sensitive data, , Social Security numbers and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll, kroll (identity theft protection services), .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were other sensitive data, Social Security numbers, names and dates of birth.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.3K.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and California Office of the Attorney General.
Most Recent Customer Advisory: The most recent customer advisory issued was an 24 months of identity theft protection services offered to affected individuals.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.