ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Our unique combination of transformative strategy, transactions and corporate finance delivers real-world value – solutions that work in practice, not just on paper. Benefiting from EY’s full spectrum of services, we’ve reimagined strategic consulting to work in a world of increasing complexity. With deep functional and sector expertise, paired with innovative AI-powered technology and an investor mindset, we partner with CEOs, boards, private equity and governments every step of the way – enabling you to shape your future with confidence. EY-Parthenon is a brand under which a number of EY member firms across the globe provide strategy consulting services. For more information, please visit ey.com/parthenon.

EY-Parthenon A.I CyberSecurity Scoring

EY-Parthenon

Company Details

Linkedin ID:

ey-parthenon

Employees number:

15,690

Number of followers:

418,663

NAICS:

5416

Industry Type:

Business Consulting and Services

Homepage:

http://www.ey.com/parthenon

IP Addresses:

0

Company ID:

EY-_1929556

Scan Status:

In-progress

AI scoreEY-Parthenon Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/ey-parthenon.jpeg
EY-Parthenon Business Consulting and Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreEY-Parthenon Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ey-parthenon.jpeg
EY-Parthenon Business Consulting and Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

EY-Parthenon Company CyberSecurity News & History

Past Incidents
4
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Ernst & Young (EY)Breach60311/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Ernst & Young (EY), a global accounting and consulting firm, inadvertently exposed a **4-terabyte (TB) SQL Server database backup** on the public internet. The unsecured **.BAK file**, discovered by a Neo Security researcher, contained highly sensitive internal data, including **database schemas, stored procedures, API keys, session tokens, user credentials, and service account passwords**—effectively a 'master blueprint' to EY’s digital infrastructure. While EY confirmed the exposure and claimed **no client, personal, or confidential data was compromised**, the incident stemmed from an acquired entity under **EY Italy**, disconnected from its global systems. The file remained accessible for an **estimated week** before remediation, raising concerns about potential access by malicious actors. EY’s response was praised for professionalism, though the delayed fix highlighted operational vulnerabilities. The exposure risked **unauthorized access to critical systems**, credential theft, and potential lateral movement within EY’s network, though the firm asserted no evidence of exploitation.

Ernst & Young LLPBreach8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: On August 9, 2023, the Washington State Office of the Attorney General reported a data breach affecting Ernst & Young LLP (EY US). The breach occurred from May 27, 2023, to May 31, 2023, involving a third-party service vulnerability in Progress Software’s MOVEit Transfer solution. The breach affected 1,129 Washington residents, compromising personal data including names, Social Security numbers, and financial information.

Ernst & Young (EY)Breach8546/2020
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A 4TB SQL Server backup file belonging to Ernst & Young (EY) was discovered publicly exposed on Microsoft Azure by cybersecurity firm Neo Security. The unencrypted .BAK file, identified during routine passive network analysis, likely contained sensitive data such as database schemas, user credentials, API keys, and authentication tokens. Ownership was confirmed via DNS SOA lookup linking to **ey.com**, though initial searches showed no explicit owner. While EY remediated the exposure swiftly and claimed no client or confidential data was compromised, the incident underscored the high risk of automated scanning tools discovering such leaks. The exposure duration and potential access by malicious actors remained unclear, but past incidents demonstrated that even brief cloud exposures could lead to PII and credential theft. The case highlighted critical gaps in cloud visibility and leak detection, emphasizing the need for continuous attack surface monitoring in complex cloud environments.

EY (Ernst & Young)Breach10055/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: A Dutch cybersecurity firm, Neo Security, discovered a **4TB+ unencrypted SQL Server backup file** belonging to EY exposed publicly on the internet due to a **misconfigured cloud bucket**. The leaked data included **API keys, cached authentication tokens, session tokens, service account passwords, and user credentials**—essentially a full blueprint for accessing EY’s internal systems. The exposure was caused by a trivial error, likely a misconfigured bucket setting, which made the sensitive backup accessible to anyone. While the exact duration of exposure is unclear, such incidents typically assume compromise from the moment of discovery.The breach mirrors a past case Neo Security investigated, where a **lazy database migration** (temporarily setting a bucket to public) led to a **ransomware attack and the eventual collapse of the affected company** after data theft. EY responded professionally upon notification, remediating the issue within a week. However, the exposed credentials and trade secrets pose severe risks, including **potential follow-on attacks, financial fraud, or espionage** by threat actors who may have already downloaded the data.

Ernst & Young (EY)
Breach
Severity: 60
Impact: 3
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Ernst & Young (EY), a global accounting and consulting firm, inadvertently exposed a **4-terabyte (TB) SQL Server database backup** on the public internet. The unsecured **.BAK file**, discovered by a Neo Security researcher, contained highly sensitive internal data, including **database schemas, stored procedures, API keys, session tokens, user credentials, and service account passwords**—effectively a 'master blueprint' to EY’s digital infrastructure. While EY confirmed the exposure and claimed **no client, personal, or confidential data was compromised**, the incident stemmed from an acquired entity under **EY Italy**, disconnected from its global systems. The file remained accessible for an **estimated week** before remediation, raising concerns about potential access by malicious actors. EY’s response was praised for professionalism, though the delayed fix highlighted operational vulnerabilities. The exposure risked **unauthorized access to critical systems**, credential theft, and potential lateral movement within EY’s network, though the firm asserted no evidence of exploitation.

Ernst & Young LLP
Breach
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: On August 9, 2023, the Washington State Office of the Attorney General reported a data breach affecting Ernst & Young LLP (EY US). The breach occurred from May 27, 2023, to May 31, 2023, involving a third-party service vulnerability in Progress Software’s MOVEit Transfer solution. The breach affected 1,129 Washington residents, compromising personal data including names, Social Security numbers, and financial information.

Ernst & Young (EY)
Breach
Severity: 85
Impact: 4
Seen: 6/2020
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A 4TB SQL Server backup file belonging to Ernst & Young (EY) was discovered publicly exposed on Microsoft Azure by cybersecurity firm Neo Security. The unencrypted .BAK file, identified during routine passive network analysis, likely contained sensitive data such as database schemas, user credentials, API keys, and authentication tokens. Ownership was confirmed via DNS SOA lookup linking to **ey.com**, though initial searches showed no explicit owner. While EY remediated the exposure swiftly and claimed no client or confidential data was compromised, the incident underscored the high risk of automated scanning tools discovering such leaks. The exposure duration and potential access by malicious actors remained unclear, but past incidents demonstrated that even brief cloud exposures could lead to PII and credential theft. The case highlighted critical gaps in cloud visibility and leak detection, emphasizing the need for continuous attack surface monitoring in complex cloud environments.

EY (Ernst & Young)
Breach
Severity: 100
Impact: 5
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: A Dutch cybersecurity firm, Neo Security, discovered a **4TB+ unencrypted SQL Server backup file** belonging to EY exposed publicly on the internet due to a **misconfigured cloud bucket**. The leaked data included **API keys, cached authentication tokens, session tokens, service account passwords, and user credentials**—essentially a full blueprint for accessing EY’s internal systems. The exposure was caused by a trivial error, likely a misconfigured bucket setting, which made the sensitive backup accessible to anyone. While the exact duration of exposure is unclear, such incidents typically assume compromise from the moment of discovery.The breach mirrors a past case Neo Security investigated, where a **lazy database migration** (temporarily setting a bucket to public) led to a **ransomware attack and the eventual collapse of the affected company** after data theft. EY responded professionally upon notification, remediating the issue within a week. However, the exposed credentials and trade secrets pose severe risks, including **potential follow-on attacks, financial fraud, or espionage** by threat actors who may have already downloaded the data.

Ailogo

EY-Parthenon Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for EY-Parthenon

Incidents vs Business Consulting and Services Industry Average (This Year)

No incidents recorded for EY-Parthenon in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for EY-Parthenon in 2025.

Incident Types EY-Parthenon vs Business Consulting and Services Industry Avg (This Year)

No incidents recorded for EY-Parthenon in 2025.

Incident History — EY-Parthenon (X = Date, Y = Severity)

EY-Parthenon cyber incidents detection timeline including parent company and subsidiaries

EY-Parthenon Company Subsidiaries

SubsidiaryImage

Our unique combination of transformative strategy, transactions and corporate finance delivers real-world value – solutions that work in practice, not just on paper. Benefiting from EY’s full spectrum of services, we’ve reimagined strategic consulting to work in a world of increasing complexity. With deep functional and sector expertise, paired with innovative AI-powered technology and an investor mindset, we partner with CEOs, boards, private equity and governments every step of the way – enabling you to shape your future with confidence. EY-Parthenon is a brand under which a number of EY member firms across the globe provide strategy consulting services. For more information, please visit ey.com/parthenon.

Loading...
similarCompanies

EY-Parthenon Similar Companies

Bain & Company

Bain & Company is a global consultancy that helps the world’s most ambitious change makers define the future. Across 65 cities in 40 countries, we work alongside our clients as one team with a shared ambition to achieve extraordinary results, outperform the competition, and redefine industries. We

Choosing a digital partner is about more than capabilities — it’s about collaboration and character. Unrealistic overhauls and off-the-shelf products ignore what matters most — your unique needs, culture, goals, and your legacy data and technology environments. At EXL, our collaboration is built o

Genpact

Genpact (NYSE: G) is a global professional services and solutions firm delivering outcomes that shape the future. Our 125,000+ people across 30+ countries are driven by our innate curiosity, entrepreneurial agility, and desire to create lasting value for clients. Powered by our purpose – the relentl

Boston Consulting Group (BCG)

Boston Consulting Group partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. BCG was the pioneer in business strategy when it was founded in 1963. Today, we work closely with clients to embrace a transformational approach a

As the leader in circular services at work, Elis ensures its clients achieve optimal hygiene, well-being and protection – everywhere, every day, in a sustainable way. We employ 54,000 people locally in 30 countries. We work for public and private organizations of all sizes, in all sectors of activi

Accenture

Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are

Advantage Solutions

At Advantage Solutions, we're the unseen architects behind your everyday purchases. From pantry staples to your online shopping carts, we ensure your favorite goods are always in stock and within reach by connecting manufacturers to the right retailers and teaming up with retailers to figure out the

VENTRA

Ventra – один из крупнейших федеральных игроков рынка аутсорсинга бизнес-процессов. Внимание, мы объединяем профили с https://www.linkedin.com/company/2928612 присоединяйтесь! Более 20 лет компании работает на территории России, Казахстана и Республики Беларусь. У Ventra большой опыт работы с круп

Acosta Group

Acosta Group fuses storied expertise, unmatched connectivity and advanced insight to accelerate brand growth – everywhere you sell. Our collective of the most trusted retail, marketing and foodservice agencies is reimagining how people connect with brands at every point in the consumer journey. Co

newsone

EY-Parthenon CyberSecurity News

November 23, 2025 08:00 AM
Newsroom

Get the latest EY India news, insights, and updates. Stay informed about EY India's innovations, industry impact, and how we're building a...

November 20, 2025 08:34 PM
Epic transformation: securing the mine of the future

Explore how advanced mining technologies demand robust cybersecurity to secure operations, protect assets and ensure sustainable growth.

November 19, 2025 08:00 AM
EY US - Home | Building a better working world

Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...

November 17, 2025 08:00 AM
US M&A activity insights: October 2025

Read the latest Merger Monthly, with insights on recent US M&A activity and what M&A trends to expect as we look ahead.

October 14, 2025 07:00 AM
Cyber and AI oversight disclosures: what companies shared in 2025

Companies are expanding disclosures on artificial intelligence (AI) and cybersecurity governance as technology's role in business evolves.

October 08, 2025 02:02 PM
2025 EY Cybersecurity Leadership Insights Study Breakfast | EY - Switzerland

At this exclusive and insightful breakfast event, the spotlight will be on the “2025 EY Global Cybersecurity Leadership Insights Study.”

October 08, 2025 07:00 AM
AI threat detection: strengthening cybersecurity measures

Learn how your cybersecurity team can become a model for the entire organization by embracing AI-driven innovation to thwart cyberattacks.

September 10, 2025 07:00 AM
EY-Parthenon practice unveils neurosymbolic AI capabilities to empower businesses to identify, predict and unlock revenue at scale

New York, 10 September 2025. Jeff Schumacher, architect behind the groundbreaking AI solution, to steer EY Growth Platforms.

August 07, 2025 07:00 AM
Enhancing cybersecurity metrics: CISO strategies

Cybersecurity is a board-level concern, yet many chief information security officers (CISOs) struggle to translate technical risks into...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

EY-Parthenon CyberSecurity History Information

Official Website of EY-Parthenon

The official website of EY-Parthenon is http://www.ey.com/parthenon.

EY-Parthenon’s AI-Generated Cybersecurity Score

According to Rankiteo, EY-Parthenon’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.

How many security badges does EY-Parthenon’ have ?

According to Rankiteo, EY-Parthenon currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does EY-Parthenon have SOC 2 Type 1 certification ?

According to Rankiteo, EY-Parthenon is not certified under SOC 2 Type 1.

Does EY-Parthenon have SOC 2 Type 2 certification ?

According to Rankiteo, EY-Parthenon does not hold a SOC 2 Type 2 certification.

Does EY-Parthenon comply with GDPR ?

According to Rankiteo, EY-Parthenon is not listed as GDPR compliant.

Does EY-Parthenon have PCI DSS certification ?

According to Rankiteo, EY-Parthenon does not currently maintain PCI DSS compliance.

Does EY-Parthenon comply with HIPAA ?

According to Rankiteo, EY-Parthenon is not compliant with HIPAA regulations.

Does EY-Parthenon have ISO 27001 certification ?

According to Rankiteo,EY-Parthenon is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of EY-Parthenon

EY-Parthenon operates primarily in the Business Consulting and Services industry.

Number of Employees at EY-Parthenon

EY-Parthenon employs approximately 15,690 people worldwide.

Subsidiaries Owned by EY-Parthenon

EY-Parthenon presently has no subsidiaries across any sectors.

EY-Parthenon’s LinkedIn Followers

EY-Parthenon’s official LinkedIn profile has approximately 418,663 followers.

NAICS Classification of EY-Parthenon

EY-Parthenon is classified under the NAICS code 5416, which corresponds to Management, Scientific, and Technical Consulting Services.

EY-Parthenon’s Presence on Crunchbase

No, EY-Parthenon does not have a profile on Crunchbase.

EY-Parthenon’s Presence on LinkedIn

Yes, EY-Parthenon maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ey-parthenon.

Cybersecurity Incidents Involving EY-Parthenon

As of November 30, 2025, Rankiteo reports that EY-Parthenon has experienced 4 cybersecurity incidents.

Number of Peer and Competitor Companies

EY-Parthenon has an estimated 17,871 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at EY-Parthenon ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does EY-Parthenon detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (professional and effective response), and third party assistance with yes (neo security reported the incident), and containment measures with remediation of cloud bucket access controls, and remediation measures with securing the exposed backup file, and communication strategy with cold messaging on linkedin to reach incident responders, and incident response plan activated with yes (described as 'textbook perfect' by the researcher), and third party assistance with neo security (reporting party), and containment measures with securing the exposed backup file, and remediation measures with remediated within ~1 week, and communication strategy with swift acknowledgment, communication strategy with professional response to researcher, communication strategy with public statement downplaying impact, and incident response plan activated with yes (ey's csirt engaged after disclosure), and third party assistance with neo security (disclosure), and containment measures with restricted public access to the azure blob, and remediation measures with secured misconfigured storage permissions, and communication strategy with public disclosure via securityaffairs, communication strategy with statement confirming no client/confidential data affected..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Ernst & Young LLP (EY US)

Description: A data breach affecting Ernst & Young LLP (EY US) occurred from May 27, 2023, to May 31, 2023, involving a third-party service vulnerability in Progress Software’s MOVEit Transfer solution.

Date Detected: 2023-08-09

Date Publicly Disclosed: 2023-08-09

Type: Data Breach

Attack Vector: Third-party service vulnerability

Vulnerability Exploited: Progress Software’s MOVEit Transfer solution

Incident : data breach

Title: EY 4TB+ SQL Server Backup File Exposure

Description: A Dutch cybersecurity firm, Neo Security, discovered a 4TB+ SQL Server backup file belonging to EY (Ernst & Young) exposed to the public internet. The unencrypted BAK file contained sensitive data such as API keys, cached authentication tokens, session tokens, service account passwords, and user credentials. The exposure was due to a misconfigured cloud bucket, reminiscent of a past incident where a company collapsed after a similar breach. EY's response was praised as professional and effective, with remediation completed within a week.

Type: data breach

Attack Vector: cloud bucket misconfiguration (publicly accessible storage)

Vulnerability Exploited: improper access controls on cloud storage (public bucket setting)

Incident : data exposure

Title: Ernst & Young (EY) Exposes 4TB Database Backup on Public Internet

Description: Ernst & Young (EY), one of the world’s largest accounting and consulting firms, reportedly left a 4-terabyte (TB) database backup exposed on the public internet, potentially revealing vast amounts of sensitive company information. The unprotected .BAK file, believed to be a full SQL Server database backup, was discovered by a security researcher at Neo Security. The file contained critical internal data, including schema, stored procedures, API keys, session tokens, user credentials, and service account passwords. EY was alerted and responded swiftly, though remediation took about a week. EY confirmed the incident but stated no client information, personal data, or confidential EY data was impacted, localizing the issue to an acquired entity in Italy.

Type: data exposure

Attack Vector: publicly accessible unprotected database backup (.BAK file)

Vulnerability Exploited: misconfigured public-facing storage/exposure of sensitive backup file

Incident : data exposure

Title: EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure

Description: A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure during a routine scan by cybersecurity firm Neo Security. The file, identified by its .BAK extension, was unencrypted and likely contained sensitive data such as schemas, user information, API keys, credentials, and authentication tokens. Neo Security responsibly disclosed the exposure to EY, which quickly remediated the issue, confirming no client or confidential data was affected. The incident underscores the risks of automated scanning and the need for continuous cloud visibility and leak detection tools.

Date Detected: 2025-10-31

Date Publicly Disclosed: 2025-10-31

Type: data exposure

Attack Vector: publicly accessible cloud storage (Azure Blob)

Vulnerability Exploited: misconfigured Azure Blob storage permissions

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through publicly accessible cloud bucket.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach ERN447072725

Data Compromised: Names, Social security numbers, Financial information

Incident : data breach ERN2092220102925

Data Compromised: Api keys, Cached authentication tokens, Session tokens, Service account passwords, User credentials, Potential trade secrets

Systems Affected: SQL Server backup (BAK file)

Brand Reputation Impact: potential reputational damage (high-profile exposure)

Identity Theft Risk: high (due to exposed credentials)

Incident : data exposure ERN0755607110525

Data Compromised: Internal database schema, Stored procedures, Api keys, Session tokens, User credentials, Service account passwords

Systems Affected: SQL Server database backup (.BAK file)

Brand Reputation Impact: potential reputational harm due to exposure of sensitive internal data

Identity Theft Risk: high (due to exposed credentials and tokens)

Incident : data exposure ERN3000430110625

Data Compromised: Potential schemas, User information, Api keys, Credentials, Authentication tokens

Systems Affected: Microsoft Azure Blob Storage

Brand Reputation Impact: potential reputational risk due to exposure of sensitive backup

Identity Theft Risk: high (if credentials/PII were exposed)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Financial Information, , Api Keys, Authentication Tokens (Cached), Session Tokens, Service Account Passwords, User Credentials, Potential Trade Secrets, , Internal Database Schema, Stored Procedures, Api Keys, Session Tokens, User Credentials, Service Account Passwords, , Sql Server Database Backup (.Bak File), Potential: Schemas, User Information, Api Keys, Credentials, Authentication Tokens and .

Which entities were affected by each incident ?

Incident : Data Breach ERN447072725

Entity Name: Ernst & Young LLP (EY US)

Entity Type: Company

Industry: Professional Services

Customers Affected: 1129

Incident : data breach ERN2092220102925

Entity Name: Ernst & Young (EY)

Entity Type: multinational professional services firm

Industry: accounting, consulting, financial services

Location: global (headquartered in London, UK)

Size: large (one of the 'Big Four' accounting firms)

Incident : data exposure ERN0755607110525

Entity Name: Ernst & Young (EY)

Entity Type: accounting firm, consulting firm

Industry: professional services, financial services

Location: global (incident localized to EY Italy)

Size: large (one of the 'Big Four' accounting firms)

Customers Affected: none (per EY's statement)

Incident : data exposure ERN3000430110625

Entity Name: Ernst & Young (EY)

Entity Type: global accounting firm

Industry: professional services (accounting, consulting)

Location: global (headquartered in London, UK)

Size: large (multinational)

Customers Affected: none (per EY's statement)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : data breach ERN2092220102925

Incident Response Plan Activated: yes (professional and effective response)

Third Party Assistance: yes (Neo Security reported the incident)

Containment Measures: remediation of cloud bucket access controls

Remediation Measures: securing the exposed backup file

Communication Strategy: cold messaging on LinkedIn to reach incident responders

Incident : data exposure ERN0755607110525

Incident Response Plan Activated: yes (described as 'textbook perfect' by the researcher)

Third Party Assistance: Neo Security (Reporting Party).

Containment Measures: securing the exposed backup file

Remediation Measures: remediated within ~1 week

Communication Strategy: swift acknowledgmentprofessional response to researcherpublic statement downplaying impact

Incident : data exposure ERN3000430110625

Incident Response Plan Activated: yes (EY's CSIRT engaged after disclosure)

Third Party Assistance: Neo Security (Disclosure).

Containment Measures: restricted public access to the Azure Blob

Remediation Measures: secured misconfigured storage permissions

Communication Strategy: public disclosure via SecurityAffairsstatement confirming no client/confidential data affected

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Neo Security (reporting party), , Neo Security (disclosure), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach ERN447072725

Type of Data Compromised: Names, Social security numbers, Financial information

Number of Records Exposed: 1129

Sensitivity of Data: High

Incident : data breach ERN2092220102925

Type of Data Compromised: Api keys, Authentication tokens (cached), Session tokens, Service account passwords, User credentials, Potential trade secrets

Sensitivity of Data: high (credentials, secrets, and potentially proprietary information)

Data Exfiltration: likely (researcher downloaded first 1000 bytes; attackers may have downloaded full file)

Data Encryption: no (unencrypted BAK file)

File Types Exposed: SQL Server backup (.BAK)

Personally Identifiable Information: potentially (if user credentials included PII)

Incident : data exposure ERN0755607110525

Type of Data Compromised: Internal database schema, Stored procedures, Api keys, Session tokens, User credentials, Service account passwords

Sensitivity of Data: high (internal credentials, tokens, and technical blueprints)

Data Exfiltration: unknown (assumed possible due to public exposure)

Data Encryption: no (file was unprotected)

File Types Exposed: .BAK (SQL Server backup)

Personally Identifiable Information: no (per EY's statement)

Incident : data exposure ERN3000430110625

Type of Data Compromised: Sql server database backup (.bak file), Potential: schemas, user information, api keys, credentials, authentication tokens

Sensitivity of Data: high (potentially included credentials and PII)

Data Exfiltration: none confirmed (per EY)

Data Encryption: no (file was unencrypted)

File Types Exposed: .BAK (SQL Server backup)

Personally Identifiable Information: potential (not confirmed)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: securing the exposed backup file, , remediated within ~1 week, , secured misconfigured storage permissions, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by remediation of cloud bucket access controls, , securing the exposed backup file, , restricted public access to the azure blob and .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : data breach ERN2092220102925

Lessons Learned: Cloud storage misconfigurations can lead to massive data exposures with minimal effort., Automated scans by attackers can exploit even brief periods of public exposure., Convenience in cloud tools (e.g., one-click exports) does not prioritize security by default., Proactive monitoring and access reviews are critical for cloud storage.

Incident : data exposure ERN3000430110625

Lessons Learned: Even resource-rich organizations can accidentally expose sensitive data in complex cloud environments., Automated scanning tools make exposures inevitable; continuous monitoring and attack surface management are critical., Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.

What recommendations were made to prevent future incidents ?

Incident : data breach ERN2092220102925

Recommendations: Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.Implement strict access controls and default-deny policies for cloud storage., Use encryption for sensitive backups, even in 'temporary' public states., Enable automated alerts for changes in bucket permissions or public exposure., Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups.

Incident : data exposure ERN3000430110625

Recommendations: Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.Implement continuous cloud visibility and leak detection tools., Enforce strict access controls and encryption for cloud-stored backups., Regularly audit cloud storage permissions to prevent misconfigurations., Establish clear channels for third-party vulnerability disclosures.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Cloud storage misconfigurations can lead to massive data exposures with minimal effort.,Automated scans by attackers can exploit even brief periods of public exposure.,Convenience in cloud tools (e.g., one-click exports) does not prioritize security by default.,Proactive monitoring and access reviews are critical for cloud storage.Even resource-rich organizations can accidentally expose sensitive data in complex cloud environments.,Automated scanning tools make exposures inevitable; continuous monitoring and attack surface management are critical.,Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.

References

Where can I find more information about each incident ?

Incident : Data Breach ERN447072725

Source: Washington State Office of the Attorney General

Date Accessed: 2023-08-09

Incident : data breach ERN2092220102925

Source: The Register

Incident : data breach ERN2092220102925

Source: Neo Security (Dutch cybersecurity firm)

Incident : data exposure ERN0755607110525

Source: TechRadar Pro

Incident : data exposure ERN3000430110625

Source: SecurityAffairs

URL: https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.html

Date Accessed: 2025-10-31

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-08-09, and Source: The Register, and Source: Neo Security (Dutch cybersecurity firm), and Source: TechRadar Pro, and Source: SecurityAffairsUrl: https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.htmlDate Accessed: 2025-10-31.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach ERN2092220102925

Investigation Status: resolved (remediated within a week)

Incident : data exposure ERN0755607110525

Investigation Status: resolved (per EY's statement)

Incident : data exposure ERN3000430110625

Investigation Status: resolved (per EY's statement)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Cold Messaging On Linkedin To Reach Incident Responders, Swift Acknowledgment, Professional Response To Researcher, Public Statement Downplaying Impact, Public Disclosure Via Securityaffairs and Statement Confirming No Client/Confidential Data Affected.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : data exposure ERN0755607110525

Customer Advisories: EY issued a public statement downplaying impact

Incident : data exposure ERN3000430110625

Customer Advisories: EY confirmed no client or confidential data was affected.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were EY issued a public statement downplaying impact, Ey Confirmed No Client Or Confidential Data Was Affected. and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach ERN2092220102925

Entry Point: publicly accessible cloud bucket

High Value Targets: Sql Server Backup Containing Credentials And Secrets,

Data Sold on Dark Web: Sql Server Backup Containing Credentials And Secrets,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : data breach ERN2092220102925

Root Causes: Human Error (Misconfigured Cloud Bucket Permissions), Lack Of Safeguards Against Accidental Public Exposure, Over-Reliance On Convenience Features In Cloud Tools Without Security Checks,

Corrective Actions: Secured The Exposed Backup File, Likely Reviewed And Hardened Cloud Storage Access Controls (Inferred From Remediation),

Incident : data exposure ERN0755607110525

Root Causes: Misconfigured Public Exposure Of Sensitive Backup File,

Corrective Actions: Secured The Exposed File, Remediated Within ~1 Week,

Incident : data exposure ERN3000430110625

Root Causes: Misconfigured Azure Blob Storage Permissions, Lack Of Continuous Monitoring For Exposed Assets,

Corrective Actions: Secured Exposed Backup, Likely Internal Review Of Cloud Security Practices (Inferred),

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Neo Security (Reporting Party), , Neo Security (Disclosure), .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Secured The Exposed Backup File, Likely Reviewed And Hardened Cloud Storage Access Controls (Inferred From Remediation), , Secured The Exposed File, Remediated Within ~1 Week, , Secured Exposed Backup, Likely Internal Review Of Cloud Security Practices (Inferred), .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-08-09.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-31.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, financial information, , API keys, cached authentication tokens, session tokens, service account passwords, user credentials, potential trade secrets, , internal database schema, stored procedures, API keys, session tokens, user credentials, service account passwords, , potential schemas, user information, API keys, credentials, authentication tokens and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was SQL Server backup (BAK file) and SQL Server database backup (.BAK file) and Microsoft Azure Blob Storage.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was neo security (reporting party), , neo security (disclosure), .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were remediation of cloud bucket access controls, securing the exposed backup file and restricted public access to the Azure Blob.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were API keys, credentials, Social Security numbers, stored procedures, service account passwords, cached authentication tokens, financial information, potential trade secrets, session tokens, internal database schema, potential schemas, names, user information, user credentials and authentication tokens.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 121.0.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Responsible disclosure by third-party researchers can mitigate risks before malicious exploitation.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Conduct regular audits of cloud storage configurations., Train employees on secure data handling during migrations or backups., Use encryption for sensitive backups, even in 'temporary' public states., Implement continuous cloud visibility and leak detection tools., Establish clear channels for third-party vulnerability disclosures., Enforce strict access controls and encryption for cloud-stored backups., Enable automated alerts for changes in bucket permissions or public exposure., Implement strict access controls and default-deny policies for cloud storage. and Regularly audit cloud storage permissions to prevent misconfigurations..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are TechRadar Pro, SecurityAffairs, The Register, Washington State Office of the Attorney General and Neo Security (Dutch cybersecurity firm).

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://securityaffairs.com/153422/data-breach/ey-exposes-4tb-sql-server-backup.html .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is resolved (remediated within a week).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an EY issued a public statement downplaying impact and EY confirmed no client or confidential data was affected.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an publicly accessible cloud bucket.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human error (misconfigured cloud bucket permissions)Lack of safeguards against accidental public exposureOver-reliance on convenience features in cloud tools without security checks, misconfigured public exposure of sensitive backup file, misconfigured Azure Blob storage permissionslack of continuous monitoring for exposed assets.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Secured the exposed backup fileLikely reviewed and hardened cloud storage access controls (inferred from remediation), secured the exposed fileremediated within ~1 week, secured exposed backuplikely internal review of cloud security practices (inferred).

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ey-parthenon' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge