ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The companies comprising the Farmers Insurance Group of Companies® currently make up one of the country's largest insurers of vehicles, homes and small businesses, and provide a wide range of other specialty insurance and financial services products. In business since 1928, today at Farmers® we proudly serve more than 10 million households with more than 19 million individual insurance policies across all 50 states through the efforts of nearly 48,000 exclusive and independent agents and approximately 21,000 employees. Our experience provides a rich history and legacy of service and strong customer relationships, while our focus on smart innovation, technology and entrepreneurship helps us to stay creative, to continually improve our product offerings and to drive the evolution of the insurance industry. Farmers Insurance Exchange®, the largest of the three primary insurance insurers that make up Farmers Insurance, is recognized as one of the largest U.S. companies on the 2017 Fortune 500 list. At Farmers®, we understand that every encounter with customers is an opportunity to differentiate ourselves with our personalized service and have an overall positive impact on their lives. We pride ourselves on helping the individuals and businesses we serve become smarter and better prepared to protect the things that matter most to them. We are also deeply committed to giving back. The Farmers culture is built around opportunities to volunteer and help improve the communities in which we work and live.

Farmers Insurance A.I CyberSecurity Scoring

Farmers Insurance

Company Details

Linkedin ID:

farmers-insurance

Employees number:

44,315

Number of followers:

226,382

NAICS:

524

Industry Type:

Insurance

Homepage:

http://www.farmers.com/careers/corporate

IP Addresses:

0

Company ID:

FAR_6813817

Scan Status:

In-progress

AI scoreFarmers Insurance Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/farmers-insurance.jpeg
Farmers Insurance Insurance
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreFarmers Insurance Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/farmers-insurance.jpeg
Farmers Insurance Insurance
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Farmers Insurance Company CyberSecurity News & History

Past Incidents
6
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Farmers InsuranceBreach6041/2021
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported that Farmers Insurance experienced a data breach between January 20, 2021, and February 12, 2021, potentially exposing personal information such as names, addresses, dates of birth, and driver's license numbers. The breach was reported on May 4, 2021.

Farmers InsuranceBreach8543/2019
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General disclosed a data breach affecting Farmers Insurance, which transpired on **March 31, 2019**, but was reported later on **December 3, 2019**. The incident involved unauthorized access to sensitive customer data, including **names, Social Security numbers, and medical history**. While the precise number of impacted individuals remains undisclosed, the exposure of such highly personal information poses severe risks, including identity theft, financial fraud, and privacy violations. The breach underscores vulnerabilities in Farmers Insurance’s data protection measures, potentially eroding customer trust and triggering regulatory scrutiny. Given the nature of the compromised data—particularly medical records and Social Security numbers—the long-term repercussions for affected individuals could be substantial, ranging from targeted phishing attacks to fraudulent credit applications. The delay in public disclosure further compounds concerns about transparency and incident response protocols within the organization.

Farmers Insurance ExchangeBreach8545/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Farmers Insurance Exchange (and its subsidiaries) experienced a data breach after a vendor detected suspicious activity on May 29, 2025. The incident, linked to a broader cybercrime campaign targeting Salesforce environments, resulted in unauthorized access to customer data, including **names, addresses, dates of birth, driver’s license numbers**, and in some cases, the **last four digits of Social Security numbers**. A known cybercrime group claimed responsibility. While the breach was contained with law enforcement and cybersecurity expert support, the exposure of personally identifiable information (PII) poses risks of identity theft, fraud, and reputational harm. The breach is part of a coordinated attack affecting multiple industries, amplifying concerns over third-party vendor vulnerabilities. Affected customers received notification letters, and legal investigations are underway to assess liability and potential compensation for impacted individuals.

Farmers InsuranceBreach8545/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A data breach at Farmers Insurance, discovered via a third-party vendor, exposed the personal information of over **1.07 million customers**. The incident occurred on **May 29–30, 2025**, when an unauthorized actor accessed a vendor’s database containing Farmers’ customer records. The compromised data included **names, addresses, dates of birth, driver’s license numbers, and the last four digits of Social Security numbers**. The breach was detected through monitoring tools, prompting containment measures, including blocking unauthorized access. Farmers launched an investigation, confirming on **July 24, 2025**, that customer data had been accessed and acquired. Affected individuals were notified starting **August 22, 2025**, with offers of **24 months of free credit monitoring and identity protection services**. While no evidence suggested further data exposure, the breach highlights vulnerabilities in third-party vendor security, raising concerns over potential identity theft or fraud for impacted policyholders. The incident aligns with a broader trend of cyber threats targeting U.S. insurers in 2025.

Farmers InsuranceBreach8549/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Farmers Insurance suffered a data breach linked to a third-party hack at Salesforce, compromising over **1 million customers’ sensitive information**, including names, addresses, birth dates, and driver’s licenses. Among the affected were **agricultural producers**, whose personal and operational data were exposed. The breach fueled follow-on phishing scams, exploiting the stolen data to trick victims into revealing further credentials or financial details. While the attack did not involve ransomware, the exposure of **personally identifiable information (PII)**—critical for farm operations, loan applications, and subsidy eligibility—posed severe risks of **identity theft, financial fraud, and reputational damage**. The incident underscored vulnerabilities in rural sectors, where reliance on third-party platforms (like Salesforce) and shared email systems heightens exposure. No evidence suggested the breach directly disrupted farm operations, but the **leak of customer data**—including ag producers—aligned with broader trends targeting the industry’s digital dependencies.

Farmers Insurance ExchangeBreach8546/2017
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The New York Department of Financial Services (DFS) fined **Farmers Insurance Exchange** **$2.8 million** for inadequate cybersecurity controls that exposed consumer data—including **driver’s license numbers and birth dates**—through vulnerable online quoting platforms. The breach stemmed from systemic failures in safeguarding sensitive personal information, compounded by the company’s **delay in reporting the incident**, which further undermined consumer protections. DFS mandated remedial measures, including a **comprehensive review of data storage and access protocols**, to prevent future exposures. The enforcement action highlights regulatory scrutiny under New York’s cybersecurity framework (enacted in 2017, updated in 2023), which serves as a benchmark for financial sector oversight. While Farmers Insurance acknowledged the penalties, the case remains part of an **ongoing DFS investigation** into broader industry vulnerabilities. The incident underscores the risks of **unsecured digital platforms** in handling high-value consumer data, particularly in sectors like auto insurance where personally identifiable information (PII) is routinely processed.

Farmers Insurance
Breach
Severity: 60
Impact: 4
Seen: 1/2021
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported that Farmers Insurance experienced a data breach between January 20, 2021, and February 12, 2021, potentially exposing personal information such as names, addresses, dates of birth, and driver's license numbers. The breach was reported on May 4, 2021.

Farmers Insurance
Breach
Severity: 85
Impact: 4
Seen: 3/2019
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General disclosed a data breach affecting Farmers Insurance, which transpired on **March 31, 2019**, but was reported later on **December 3, 2019**. The incident involved unauthorized access to sensitive customer data, including **names, Social Security numbers, and medical history**. While the precise number of impacted individuals remains undisclosed, the exposure of such highly personal information poses severe risks, including identity theft, financial fraud, and privacy violations. The breach underscores vulnerabilities in Farmers Insurance’s data protection measures, potentially eroding customer trust and triggering regulatory scrutiny. Given the nature of the compromised data—particularly medical records and Social Security numbers—the long-term repercussions for affected individuals could be substantial, ranging from targeted phishing attacks to fraudulent credit applications. The delay in public disclosure further compounds concerns about transparency and incident response protocols within the organization.

Farmers Insurance Exchange
Breach
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Farmers Insurance Exchange (and its subsidiaries) experienced a data breach after a vendor detected suspicious activity on May 29, 2025. The incident, linked to a broader cybercrime campaign targeting Salesforce environments, resulted in unauthorized access to customer data, including **names, addresses, dates of birth, driver’s license numbers**, and in some cases, the **last four digits of Social Security numbers**. A known cybercrime group claimed responsibility. While the breach was contained with law enforcement and cybersecurity expert support, the exposure of personally identifiable information (PII) poses risks of identity theft, fraud, and reputational harm. The breach is part of a coordinated attack affecting multiple industries, amplifying concerns over third-party vendor vulnerabilities. Affected customers received notification letters, and legal investigations are underway to assess liability and potential compensation for impacted individuals.

Farmers Insurance
Breach
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A data breach at Farmers Insurance, discovered via a third-party vendor, exposed the personal information of over **1.07 million customers**. The incident occurred on **May 29–30, 2025**, when an unauthorized actor accessed a vendor’s database containing Farmers’ customer records. The compromised data included **names, addresses, dates of birth, driver’s license numbers, and the last four digits of Social Security numbers**. The breach was detected through monitoring tools, prompting containment measures, including blocking unauthorized access. Farmers launched an investigation, confirming on **July 24, 2025**, that customer data had been accessed and acquired. Affected individuals were notified starting **August 22, 2025**, with offers of **24 months of free credit monitoring and identity protection services**. While no evidence suggested further data exposure, the breach highlights vulnerabilities in third-party vendor security, raising concerns over potential identity theft or fraud for impacted policyholders. The incident aligns with a broader trend of cyber threats targeting U.S. insurers in 2025.

Farmers Insurance
Breach
Severity: 85
Impact: 4
Seen: 9/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Farmers Insurance suffered a data breach linked to a third-party hack at Salesforce, compromising over **1 million customers’ sensitive information**, including names, addresses, birth dates, and driver’s licenses. Among the affected were **agricultural producers**, whose personal and operational data were exposed. The breach fueled follow-on phishing scams, exploiting the stolen data to trick victims into revealing further credentials or financial details. While the attack did not involve ransomware, the exposure of **personally identifiable information (PII)**—critical for farm operations, loan applications, and subsidy eligibility—posed severe risks of **identity theft, financial fraud, and reputational damage**. The incident underscored vulnerabilities in rural sectors, where reliance on third-party platforms (like Salesforce) and shared email systems heightens exposure. No evidence suggested the breach directly disrupted farm operations, but the **leak of customer data**—including ag producers—aligned with broader trends targeting the industry’s digital dependencies.

Farmers Insurance Exchange
Breach
Severity: 85
Impact: 4
Seen: 6/2017
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The New York Department of Financial Services (DFS) fined **Farmers Insurance Exchange** **$2.8 million** for inadequate cybersecurity controls that exposed consumer data—including **driver’s license numbers and birth dates**—through vulnerable online quoting platforms. The breach stemmed from systemic failures in safeguarding sensitive personal information, compounded by the company’s **delay in reporting the incident**, which further undermined consumer protections. DFS mandated remedial measures, including a **comprehensive review of data storage and access protocols**, to prevent future exposures. The enforcement action highlights regulatory scrutiny under New York’s cybersecurity framework (enacted in 2017, updated in 2023), which serves as a benchmark for financial sector oversight. While Farmers Insurance acknowledged the penalties, the case remains part of an **ongoing DFS investigation** into broader industry vulnerabilities. The incident underscores the risks of **unsecured digital platforms** in handling high-value consumer data, particularly in sectors like auto insurance where personally identifiable information (PII) is routinely processed.

Ailogo

Farmers Insurance Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Farmers Insurance

Incidents vs Insurance Industry Average (This Year)

Farmers Insurance has 347.76% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Farmers Insurance has 368.75% more incidents than the average of all companies with at least one recorded incident.

Incident Types Farmers Insurance vs Insurance Industry Avg (This Year)

Farmers Insurance reported 3 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 3 data breaches, compared to industry peers with at least 1 incident.

Incident History — Farmers Insurance (X = Date, Y = Severity)

Farmers Insurance cyber incidents detection timeline including parent company and subsidiaries

Farmers Insurance Company Subsidiaries

SubsidiaryImage

The companies comprising the Farmers Insurance Group of Companies® currently make up one of the country's largest insurers of vehicles, homes and small businesses, and provide a wide range of other specialty insurance and financial services products. In business since 1928, today at Farmers® we proudly serve more than 10 million households with more than 19 million individual insurance policies across all 50 states through the efforts of nearly 48,000 exclusive and independent agents and approximately 21,000 employees. Our experience provides a rich history and legacy of service and strong customer relationships, while our focus on smart innovation, technology and entrepreneurship helps us to stay creative, to continually improve our product offerings and to drive the evolution of the insurance industry. Farmers Insurance Exchange®, the largest of the three primary insurance insurers that make up Farmers Insurance, is recognized as one of the largest U.S. companies on the 2017 Fortune 500 list. At Farmers®, we understand that every encounter with customers is an opportunity to differentiate ourselves with our personalized service and have an overall positive impact on their lives. We pride ourselves on helping the individuals and businesses we serve become smarter and better prepared to protect the things that matter most to them. We are also deeply committed to giving back. The Farmers culture is built around opportunities to volunteer and help improve the communities in which we work and live.

Loading...
similarCompanies

Farmers Insurance Similar Companies

Blue Cross Blue Shield of Michigan

Blue Cross Blue Shield of Michigan is a nonprofit corporation and an independent licensee of the Blue Cross and Blue Shield Association. BCBSM's commitment to Michigan is what differentiates it from other health insurance companies doing business in the state. That mission has never changed. Nea

Rosgosstrakh

RGS operates nationwide with over 2,500 branches, agencies and over 400 claims-handling offices covering every one of Russia's 86 regions - from Kaliningrad on the Baltic Sea in the West to Kamchatka on the Pacific Ocean in the Far East, and from Murmansk on the Barents Sea to Sochi (2014 Winter Oly

中国人民保险 PICC

Founded in October 1949, The People’s Insurance Company (Group) of China is the first nation-wide insurance company in the People’s Republic of China and has developed into a leading large-scale integrated insurance financial group in the PRC, ranking 208th on the Global 500 (2014) published by the

GREAT EASTERN

Established in 1908, Great Eastern places customers at the heart of everything we do. Our legacy extends beyond our products and services to our culture, which is defined by our core values and how we work. As champions of Integrity, Initiative and Involvement, our core values act as a compass, guid

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Pr

Travelers

Travelers provides insurance coverage to protect the things that are important to you – your home, your car, your valuables and your business. We have been around for more than 170 years and have earned a reputation as one of the best property casualty insurers in the industry because we take care o

QBE Insurance

QBE is an international insurer and reinsurer listed on the Australian Securities Exchange and headquartered in Sydney. We employ over 13,000 people in 26 countries. Leveraging our deep expertise and insights, QBE offers commercial, personal and specialty products and risk management solutions to h

SBI Life Insurance Co. Ltd.

SBI Life Insurance (‘SBI Life’ / ‘The Company’), one of the most trusted life insurance companies in India, was incorporated in October 2000 and is registered with the Insurance Regulatory and Development Authority of India (IRDAI) in March 2001. Serving millions of families across India, SBI Li

MetLife

We live in a time of unprecedented change. A time when economies, regulations, and social safety nets are all in flux. Customers around the globe have told us they’re overwhelmed by the pace of change and are looking for a trusted partner to help them manage life’s twists and turns. MetLife is com

newsone

Farmers Insurance CyberSecurity News

November 25, 2025 11:24 AM
E&E News: Recovering insurance market gets boost in California

CLIMATEWIRE | California has become a national example of how climate change can disrupt property-insurance markets by intensifying...

October 22, 2025 07:00 AM
New York fines eight auto insurers $19 million over cybersecurity violations

New York State Department of Financial Services (DFS) Superintendent Adrienne A. Harris has collected more than $19 million in penalties for...

October 22, 2025 07:00 AM
USDA is reopening some 2,100 offices to help farmers access $3B in aid despite the ongoing shutdown

The re-opening offices help farmers apply for farm loans, crop insurance, disaster aid and other programs.

October 21, 2025 07:00 AM
New York fines 8 auto insurers $19 mn over cybersecurity violations, data breaches

New York DFS fined eight auto insurers and agencies $19 mn for weak cybersecurity controls that exposed personal data through online quoting...

October 21, 2025 07:00 AM
NY auto insurers on the hook for $19M for cybersecurity violations

Eight auto insurers failed to meet the requirements of New York's cybersecurity regulations during widespread online attacks in 2021 and...

October 16, 2025 07:00 AM
New York Fines Auto Insurers $19M Over Cyber Lapses

Security failures exposed consumers' personal data collected through insurers' online apps and agent portals used to deliver online auto...

October 16, 2025 07:00 AM
Over half a dozen insurers fined by New York over data breaches

American Family Mutual Insurance, State Auto Mutual Insurance, Metromile, Liberty Mutual, Hagerty Insurance Agency, Farmers Insurance,...

October 15, 2025 07:00 AM
New York secures $14 million in fines from 8 car insurance companies after data breaches

Car insurance price-quote tools that auto-populated with people's sensitive data allowed cybercriminals to commit fraud elsewhere,...

October 15, 2025 07:00 AM
8 Auto Insurance Providers to Pay New York $19M Over Data Breaches

New York State is securing more than $19 million in penalties from eight auto insurance providers for violations of the state's...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Farmers Insurance CyberSecurity History Information

Official Website of Farmers Insurance

The official website of Farmers Insurance is http://www.farmers.com/careers/corporate.

Farmers Insurance’s AI-Generated Cybersecurity Score

According to Rankiteo, Farmers Insurance’s AI-generated cybersecurity score is 510, reflecting their Critical security posture.

How many security badges does Farmers Insurance’ have ?

According to Rankiteo, Farmers Insurance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Farmers Insurance have SOC 2 Type 1 certification ?

According to Rankiteo, Farmers Insurance is not certified under SOC 2 Type 1.

Does Farmers Insurance have SOC 2 Type 2 certification ?

According to Rankiteo, Farmers Insurance does not hold a SOC 2 Type 2 certification.

Does Farmers Insurance comply with GDPR ?

According to Rankiteo, Farmers Insurance is not listed as GDPR compliant.

Does Farmers Insurance have PCI DSS certification ?

According to Rankiteo, Farmers Insurance does not currently maintain PCI DSS compliance.

Does Farmers Insurance comply with HIPAA ?

According to Rankiteo, Farmers Insurance is not compliant with HIPAA regulations.

Does Farmers Insurance have ISO 27001 certification ?

According to Rankiteo,Farmers Insurance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Farmers Insurance

Farmers Insurance operates primarily in the Insurance industry.

Number of Employees at Farmers Insurance

Farmers Insurance employs approximately 44,315 people worldwide.

Subsidiaries Owned by Farmers Insurance

Farmers Insurance presently has no subsidiaries across any sectors.

Farmers Insurance’s LinkedIn Followers

Farmers Insurance’s official LinkedIn profile has approximately 226,382 followers.

NAICS Classification of Farmers Insurance

Farmers Insurance is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.

Farmers Insurance’s Presence on Crunchbase

Yes, Farmers Insurance has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/farmers-insurance-6c6a.

Farmers Insurance’s Presence on LinkedIn

Yes, Farmers Insurance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/farmers-insurance.

Cybersecurity Incidents Involving Farmers Insurance

As of November 27, 2025, Rankiteo reports that Farmers Insurance has experienced 6 cybersecurity incidents.

Number of Peer and Competitor Companies

Farmers Insurance has an estimated 14,863 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Farmers Insurance ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

What was the total financial impact of these incidents on Farmers Insurance ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $19.30 million.

How does Farmers Insurance detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with yes (vendor containment measures), and law enforcement notified with yes, and containment measures with blocked unauthorized access to vendor database, and recovery measures with 24 months of free cyberscout credit monitoring for affected individuals, and communication strategy with written notices to affected individuals (sent ~2025-08-22), communication strategy with public disclosure via website and maine ag notification, communication strategy with dedicated helpline (1-833-426-6809), and incident response plan activated with yes, and third party assistance with cybersecurity experts, third party assistance with law enforcement, and law enforcement notified with yes, and containment measures with vendor’s monitoring tools contained the incident, and communication strategy with customer notification letters sent, and containment measures with review of consumer data storage and access, and remediation measures with full review of data handling practices, and communication strategy with public statements (e.g., liberty mutual’s acknowledgment), and incident response plan activated with yes (google issued warnings and forced password resets), and containment measures with password reset enforcement, containment measures with phishing scam alerts, and remediation measures with user education on mfa, remediation measures with encouragement to update security software, and communication strategy with public announcements by google, communication strategy with media coverage highlighting agricultural risks..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Farmers Insurance Data Breach

Description: The California Office of the Attorney General reported that Farmers Insurance experienced a data breach between January 20, 2021, and February 12, 2021, potentially exposing personal information such as names, addresses, dates of birth, and driver's license numbers. The breach was reported on May 4, 2021.

Date Publicly Disclosed: 2021-05-04

Type: Data Breach

Incident : Data Breach

Title: Farmers Insurance Data Breach (2019)

Description: The California Office of the Attorney General reported a data breach involving Farmers Insurance on December 3, 2019. The breach occurred on March 31, 2019, and involved unauthorized access to customer information, including names, Social Security numbers, and medical history. The exact number of individuals affected is unknown.

Date Publicly Disclosed: 2019-12-03

Type: Data Breach

Incident : Data Breach

Title: Farmers Insurance Data Breach Impacting Over One Million Customers

Description: A data breach at Farmers Insurance, detected via a third-party vendor, exposed personal information of over 1.07 million policyholders. The breach involved unauthorized access to a vendor’s database containing customer data, including names, addresses, dates of birth, driver’s license numbers, and the last four digits of Social Security numbers. Farmers launched an investigation, notified law enforcement, and offered 24 months of free credit monitoring to affected individuals.

Date Detected: 2025-05-30

Date Publicly Disclosed: 2025-08-22

Type: Data Breach

Attack Vector: Third-party vendor compromise (unauthorized database access)

Threat Actor: Unauthorized actor (unknown)

Incident : Data Breach

Title: Farmers Insurance Data Breach (May 2025)

Description: Bragar Eagel & Squire, P.C. is investigating potential claims against Farmers Insurance Exchange and its subsidiaries regarding a data breach. The breach, detected on May 30, 2025, involved unauthorized access to customer information, including names, addresses, dates of birth, driver’s license numbers, and in some cases, the last four digits of Social Security numbers. The incident is linked to a broader series of cyberattacks targeting Salesforce environments by a known cybercrime group.

Date Detected: 2025-05-30

Date Publicly Disclosed: 2025-09-18

Type: Data Breach

Attack Vector: Third-party vendor compromise (Salesforce environment)

Threat Actor: Known cybercrime group (unnamed)

Incident : Data Breach

Title: New York DFS Fines Eight Auto Insurers $19M for Inadequate Cybersecurity Controls Exposing Consumer Data

Description: The New York Department of Financial Services (DFS) fined eight auto insurers and agencies over $19 million for inadequate cybersecurity controls that exposed consumer data, including driver’s license numbers and birth dates, through online quoting platforms. Farmers Insurance Exchange and Infinity Insurance Co. were additionally penalized for failing to report incidents in a timely manner. The settlements mandate remedial measures, including a full review of consumer data storage and access protocols.

Type: Data Breach

Attack Vector: Insecure Online Quoting PlatformsPoor Access Controls

Vulnerability Exploited: Inadequate Data Protection MeasuresLack of Timely Incident Reporting

Incident : data breach

Title: Massive Data Breach in Gmail and Salesforce Affecting Agricultural Sector

Description: Google warned Gmail users of a massive data breach tied to a third-party hack at Salesforce, exposing sensitive data and sparking phishing scams. The breach affected 2.5 billion accounts, including those of farmers and ranchers using Gmail for business. The incident highlights growing cyber threats in the agriculture sector, where ransomware and phishing attacks have surged by 607% since 2020. Farmers Insurance also suffered a Salesforce-linked hack, compromising over 1 million customers' personal data, including agricultural producers. The breach underscores vulnerabilities in rural businesses, which often lack dedicated IT staff and rely on common email services like Gmail (76% U.S. market share).

Type: data breach

Attack Vector: phishing emailsexploited software vulnerabilities (Salesforce)credential harvesting

Vulnerability Exploited: third-party vendor (Salesforce) security flawweak password practiceslack of multi-factor authentication (MFA)

Motivation: financial gaindata theft for phishing/scamspotential espionage (agricultural data)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-party vendor database, Third-party vendor (Salesforce environment) and Salesforce third-party vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach FAR645072625

Data Compromised: Names, Addresses, Dates of birth, Driver's license numbers

Incident : Data Breach FAR154082025

Data Compromised: Names, Social security numbers, Medical history

Identity Theft Risk: High (PII exposed)

Incident : Data Breach FAR433082825

Data Compromised: Name, Address, Date of birth, Driver’s license number, Last four digits of social security number

Systems Affected: Third-party vendor database

Brand Reputation Impact: Potential reputational damage due to exposure of 1M+ customer records

Identity Theft Risk: High (PII exposed)

Incident : Data Breach FAR3503135091925

Data Compromised: Names, Addresses, Dates of birth, Driver’s license numbers, Last four digits of social security numbers (in certain cases)

Systems Affected: Salesforce environments

Brand Reputation Impact: Potential (litigation investigation underway)

Legal Liabilities: Potential (investigation by Bragar Eagel & Squire, P.C.)

Identity Theft Risk: High (PII exposed)

Incident : Data Breach FAR5903059102225

Financial Loss: $19,300,000 (Total Fines)

Data Compromised: Driver’s license numbers, Birth dates, Personal details

Systems Affected: Online Quoting Platforms

Operational Impact: Regulatory ScrutinyMandatory Remedial Measures

Brand Reputation Impact: Potential Trust Erosion Due to Data Exposure

Legal Liabilities: Regulatory FinesOngoing Investigations

Identity Theft Risk: ['High (Due to Exposure of PII)']

Incident : data breach FAR3190631110725

Data Compromised: Names, Addresses, Birth dates, Driver’s licenses, Business email data, Potential farm-specific data (crop records, gps mappings, precision ag info)

Systems Affected: Gmail accountsSalesforce platformslinked agricultural business systems

Operational Impact: increased phishing scams targeting farmersurgent password resets for 2.5 billion accountspotential disruption to farm operations if ransomware spreads

Customer Complaints: ['reports of spoofed emails', 'identity theft concerns']

Brand Reputation Impact: erosion of trust in Gmail/Salesforce securityheightened awareness of agricultural sector vulnerabilities

Identity Theft Risk: high (due to exposed PII like driver’s licenses and birth dates)

Payment Information Risk: potential (if linked financial data was accessed)

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $3.22 million.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Dates Of Birth, Driver'S License Numbers, , Personally Identifiable Information (Pii), Protected Health Information (Phi), , Personally Identifiable Information (Pii), Partial Social Security Numbers (Last 4 Digits), Driver’S License Numbers, , Personally Identifiable Information (Pii), Partial Social Security Numbers, , Personally Identifiable Information (Pii), , Personal Identifiable Information (Pii), Business Email Data, Potential Agricultural Operational Data and .

Which entities were affected by each incident ?

Incident : Data Breach FAR645072625

Entity Name: Farmers Insurance

Entity Type: Insurance Company

Industry: Insurance

Location: California

Incident : Data Breach FAR154082025

Entity Name: Farmers Insurance

Entity Type: Insurance Company

Industry: Insurance

Location: California, USA

Customers Affected: Unknown

Incident : Data Breach FAR433082825

Entity Name: Farmers Insurance Exchange

Entity Type: Insurance Provider

Industry: Insurance

Location: United States

Customers Affected: 1,071,172

Incident : Data Breach FAR433082825

Entity Name: Farmers Group Inc.

Entity Type: Insurance Holding Company

Industry: Insurance

Location: United States

Customers Affected: 1,071,172

Incident : Data Breach FAR433082825

Entity Name: Unnamed Third-Party Vendor

Entity Type: Service Provider

Incident : Data Breach FAR3503135091925

Entity Name: Farmers Insurance Exchange

Entity Type: Insurance Company

Industry: Insurance

Location: United States

Incident : Data Breach FAR5903059102225

Entity Name: Farmers Insurance Exchange

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Hagerty Insurance Agency LLC

Entity Type: Insurance Agency

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Hartford Fire Insurance Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Infinity Insurance Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Liberty Mutual Insurance Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Metromile Insurance Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Midvale Indemnity Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : Data Breach FAR5903059102225

Entity Name: Safe Automobile Mutual Insurance Co.

Entity Type: Insurance Company

Industry: Automotive Insurance

Location: USA (New York)

Incident : data breach FAR3190631110725

Entity Name: Google (Gmail)

Entity Type: technology company

Industry: cloud services/email

Location: global (U.S. market focus)

Size: 2.5 billion affected accounts

Customers Affected: 2.5 billion

Incident : data breach FAR3190631110725

Entity Name: Salesforce

Entity Type: CRM/enterprise software

Industry: technology

Location: global

Incident : data breach FAR3190631110725

Entity Name: Farmers Insurance

Entity Type: insurance provider

Industry: financial services

Location: U.S.

Customers Affected: 1 million+ (including agricultural producers)

Incident : data breach FAR3190631110725

Entity Name: U.S. Agricultural Sector (small family farms/ranches)

Entity Type: businesses

Industry: agriculture

Location: U.S. (focus on rural/High Plains regions)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach FAR433082825

Incident Response Plan Activated: Yes

Third Party Assistance: Yes (vendor containment measures)

Law Enforcement Notified: Yes

Containment Measures: Blocked unauthorized access to vendor database

Recovery Measures: 24 months of free Cyberscout credit monitoring for affected individuals

Communication Strategy: Written notices to affected individuals (sent ~2025-08-22)Public disclosure via website and Maine AG notificationDedicated helpline (1-833-426-6809)

Incident : Data Breach FAR3503135091925

Incident Response Plan Activated: Yes

Third Party Assistance: Cybersecurity Experts, Law Enforcement.

Law Enforcement Notified: Yes

Containment Measures: Vendor’s monitoring tools contained the incident

Communication Strategy: Customer notification letters sent

Incident : Data Breach FAR5903059102225

Containment Measures: Review of Consumer Data Storage and Access

Remediation Measures: Full Review of Data Handling Practices

Communication Strategy: Public Statements (e.g., Liberty Mutual’s Acknowledgment)

Incident : data breach FAR3190631110725

Incident Response Plan Activated: yes (Google issued warnings and forced password resets)

Containment Measures: password reset enforcementphishing scam alerts

Remediation Measures: user education on MFAencouragement to update security software

Communication Strategy: public announcements by Googlemedia coverage highlighting agricultural risks

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes, Yes, .

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Yes (vendor containment measures), Cybersecurity experts, Law enforcement, .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach FAR645072625

Type of Data Compromised: Names, Addresses, Dates of birth, Driver's license numbers

Incident : Data Breach FAR154082025

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)

Number of Records Exposed: Unknown

Sensitivity of Data: High

Personally Identifiable Information: namesSocial Security numbers

Incident : Data Breach FAR433082825

Type of Data Compromised: Personally identifiable information (pii), Partial social security numbers (last 4 digits), Driver’s license numbers

Number of Records Exposed: 1,071,172

Sensitivity of Data: High (PII with identity theft risk)

Data Exfiltration: Yes (unauthorized access and acquisition confirmed)

Personally Identifiable Information: Yes

Incident : Data Breach FAR3503135091925

Type of Data Compromised: Personally identifiable information (pii), Partial social security numbers

Sensitivity of Data: High

Data Exfiltration: Likely (data accessed by threat actor)

Personally Identifiable Information: Yes

Incident : Data Breach FAR5903059102225

Type of Data Compromised: Personally identifiable information (pii)

Sensitivity of Data: High (Driver’s License Numbers, Birth Dates)

Personally Identifiable Information: Driver’s License NumbersBirth Dates

Incident : data breach FAR3190631110725

Type of Data Compromised: Personal identifiable information (pii), Business email data, Potential agricultural operational data

Number of Records Exposed: 2.5 billion (Gmail) + 1 million (Farmers Insurance)

Sensitivity of Data: high (PII, financial, and farm-specific data)

Data Exfiltration: yes

Personally Identifiable Information: namesaddressesbirth datesdriver’s licenses

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Full Review of Data Handling Practices, , user education on MFA, encouragement to update security software, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by blocked unauthorized access to vendor database, , vendor’s monitoring tools contained the incident, review of consumer data storage and access, , password reset enforcement, phishing scam alerts and .

Ransomware Information

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through 24 months of free Cyberscout credit monitoring for affected individuals, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach FAR154082025

Regulations Violated: Potential HIPAA (PHI exposure), Potential state data breach laws (e.g., California Civil Code § 1798.82),

Regulatory Notifications: California Office of the Attorney General

Incident : Data Breach FAR433082825

Regulatory Notifications: Maine Attorney General

Incident : Data Breach FAR3503135091925

Legal Actions: Potential litigation (under investigation by Bragar Eagel & Squire, P.C.)

Incident : Data Breach FAR5903059102225

Regulations Violated: New York DFS Cybersecurity Regulation (2017, Updated 2023),

Fines Imposed: $19,300,000 (Total)

Legal Actions: Settlements with Mandatory Remedial Measures,

Regulatory Notifications: Delayed Reporting by Farmers Insurance Exchange and Infinity Insurance Co.

Incident : data breach FAR3190631110725

Regulatory Notifications: potential reporting under state data breach laws (e.g., California CCPA)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential litigation (under investigation by Bragar Eagel & Squire, P.C.), Settlements with Mandatory Remedial Measures, .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Breach FAR5903059102225

Lessons Learned: Timely incident reporting is critical to compliance and consumer protection., Robust access controls and data protection measures are essential for online platforms handling PII., Regulatory frameworks like NY DFS’s cybersecurity rules set enforceable standards for financial institutions.

Incident : data breach FAR3190631110725

Lessons Learned: Agricultural sector is increasingly targeted due to weak cybersecurity practices and high-value data (crop/GPS/financial records)., Third-party vulnerabilities (e.g., Salesforce) can cascade into sector-wide risks., Rural businesses lack awareness: 82% of farms believe they’ve never been attacked, despite evidence to the contrary., Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.

What recommendations were made to prevent future incidents ?

Incident : Data Breach FAR5903059102225

Recommendations: Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.

Incident : data breach FAR3190631110725

Recommendations: Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Timely incident reporting is critical to compliance and consumer protection.,Robust access controls and data protection measures are essential for online platforms handling PII.,Regulatory frameworks like NY DFS’s cybersecurity rules set enforceable standards for financial institutions.Agricultural sector is increasingly targeted due to weak cybersecurity practices and high-value data (crop/GPS/financial records).,Third-party vulnerabilities (e.g., Salesforce) can cascade into sector-wide risks.,Rural businesses lack awareness: 82% of farms believe they’ve never been attacked, despite evidence to the contrary.,Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.

References

Where can I find more information about each incident ?

Incident : Data Breach FAR645072625

Source: California Office of the Attorney General

Incident : Data Breach FAR154082025

Source: California Office of the Attorney General

Incident : Data Breach FAR433082825

Source: Farmers Insurance Breach Notice (Website)

Incident : Data Breach FAR433082825

Source: Maine Attorney General Notification

Incident : Data Breach FAR3503135091925

Source: GlobeNewswire (Bragar Eagel & Squire, P.C.)

Date Accessed: 2025-09-18

Incident : Data Breach FAR3503135091925

Source: Top Class Actions

Incident : Data Breach FAR5903059102225

Source: New York Department of Financial Services (DFS)

Incident : Data Breach FAR5903059102225

Source: Aon’s Global Cyber Risk Report

Incident : data breach FAR3190631110725

Source: Google Security Blog (hypothetical, based on described announcement)

Incident : data breach FAR3190631110725

Source: Farmers Insurance Data Breach Notification

Incident : data breach FAR3190631110725

Source: USDA Reports on Agricultural Cybersecurity (2025)

Incident : data breach FAR3190631110725

Source: Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA)

URL: https://www.cisa.gov

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Office of the Attorney General, and Source: Farmers Insurance Breach Notice (Website), and Source: Maine Attorney General Notification, and Source: GlobeNewswire (Bragar Eagel & Squire, P.C.)Date Accessed: 2025-09-18, and Source: Top Class Actions, and Source: New York Department of Financial Services (DFS), and Source: Aon’s Global Cyber Risk Report, and Source: Google Security Blog (hypothetical, based on described announcement), and Source: Farmers Insurance Data Breach Notification, and Source: USDA Reports on Agricultural Cybersecurity (2025), and Source: Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA)Url: https://www.cisa.gov.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach FAR433082825

Investigation Status: Completed (as of 2025-07-24)

Incident : Data Breach FAR3503135091925

Investigation Status: Ongoing (legal investigation by Bragar Eagel & Squire, P.C.)

Incident : Data Breach FAR5903059102225

Investigation Status: Ongoing (DFS investigation into related breaches continues)

Incident : data breach FAR3190631110725

Investigation Status: ongoing (no resolution details provided)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Written Notices To Affected Individuals (Sent ~2025-08-22), Public Disclosure Via Website And Maine Ag Notification, Dedicated Helpline (1-833-426-6809), Customer notification letters sent, Public Statements (E.G., Liberty Mutual’S Acknowledgment), Public Announcements By Google and Media Coverage Highlighting Agricultural Risks.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach FAR433082825

Customer Advisories: Written notices with credit monitoring offerHelpline for eligibility checks

Incident : Data Breach FAR3503135091925

Stakeholder Advisories: Customers notified via letters; legal firm encouraging affected individuals to contact them

Customer Advisories: Notification letters sent to affected customers

Incident : data breach FAR3190631110725

Stakeholder Advisories: Google Urged Users To Reset Passwords And Enable Mfa., Agricultural Organizations (E.G., Farm Bureaus) Advised Members To Audit Cybersecurity Practices., Usda Promoted Resources For Rural Cybersecurity Awareness..

Customer Advisories: Gmail users received breach notifications with phishing warnings.Farmers Insurance customers were notified of PII exposure and offered credit monitoring.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Written Notices With Credit Monitoring Offer, Helpline For Eligibility Checks, , Customers notified via letters; legal firm encouraging affected individuals to contact them, Notification letters sent to affected customers, Google Urged Users To Reset Passwords And Enable Mfa., Agricultural Organizations (E.G., Farm Bureaus) Advised Members To Audit Cybersecurity Practices., Usda Promoted Resources For Rural Cybersecurity Awareness., Gmail Users Received Breach Notifications With Phishing Warnings., Farmers Insurance Customers Were Notified Of Pii Exposure And Offered Credit Monitoring. and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach FAR433082825

Entry Point: Third-party vendor database

High Value Targets: Customer Pii,

Data Sold on Dark Web: Customer Pii,

Incident : Data Breach FAR3503135091925

Entry Point: Third-party vendor (Salesforce environment)

Incident : data breach FAR3190631110725

Entry Point: Salesforce third-party vulnerability

High Value Targets: Agricultural Producers' Pii, Farm Operational Data,

Data Sold on Dark Web: Agricultural Producers' Pii, Farm Operational Data,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach FAR433082825

Root Causes: Third-Party Vendor Security Vulnerability,

Incident : Data Breach FAR5903059102225

Root Causes: Inadequate Cybersecurity Controls On Online Quoting Platforms., Failure To Report Incidents Promptly (Farmers Insurance Exchange, Infinity Insurance Co.)., Lack Of Basic Preparedness (E.G., Response Plans, Vulnerability Scans).,

Corrective Actions: Mandatory Review Of Consumer Data Storage And Access Protocols., Enhanced Compliance With Ny Dfs Cybersecurity Regulations., Investment In Cybersecurity Programs (E.G., Liberty Mutual’S Ongoing Efforts).,

Incident : data breach FAR3190631110725

Root Causes: Third-Party Vendor (Salesforce) Security Failure., Overreliance On Consumer-Grade Email (Gmail) For Business Operations In Agriculture., Lack Of Mfa And Weak Password Practices In Rural Sectors., Low Cybersecurity Awareness Among Farmers (82% Believed They Were Never Attacked)., Outdated Software And Unpatched Systems In Agricultural Businesses.,

Corrective Actions: Google Enforced Password Resets And Phishing Alerts., Agricultural Sector Urged To Adopt Mfa, Antivirus, And Employee Training., Legislative Push For Farm And Food Cybersecurity Act (2025) To Fund Rural Cyber Defenses., Cisa And Usda Expanded Free Cybersecurity Resources For Farmers.,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Experts, Law Enforcement, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory Review Of Consumer Data Storage And Access Protocols., Enhanced Compliance With Ny Dfs Cybersecurity Regulations., Investment In Cybersecurity Programs (E.G., Liberty Mutual’S Ongoing Efforts)., , Google Enforced Password Resets And Phishing Alerts., Agricultural Sector Urged To Adopt Mfa, Antivirus, And Employee Training., Legislative Push For Farm And Food Cybersecurity Act (2025) To Fund Rural Cyber Defenses., Cisa And Usda Expanded Free Cybersecurity Resources For Farmers., .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Unauthorized actor (unknown) and Known cybercrime group (unnamed).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-05-30.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-18.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was $19,300,000 (Total Fines).

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, dates of birth, driver's license numbers, , names, Social Security numbers, medical history, , Name, Address, Date of birth, Driver’s license number, Last four digits of Social Security number, , Names, Addresses, Dates of birth, Driver’s license numbers, Last four digits of Social Security numbers (in certain cases), , Driver’s License Numbers, Birth Dates, Personal Details, , names, addresses, birth dates, driver’s licenses, business email data, potential farm-specific data (crop records, GPS mappings, precision ag info) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Third-party vendor database and Salesforce environments and Online Quoting Platforms and Gmail accountsSalesforce platformslinked agricultural business systems.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity experts, law enforcement, .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Blocked unauthorized access to vendor database, Vendor’s monitoring tools contained the incident, Review of Consumer Data Storage and Access and password reset enforcementphishing scam alerts.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Date of birth, driver's license numbers, Address, Driver’s License Numbers, Social Security numbers, addresses, Driver’s license number, Last four digits of Social Security number, Birth Dates, Name, dates of birth, medical history, business email data, driver’s licenses, Dates of birth, potential farm-specific data (crop records, GPS mappings, precision ag info), Personal Details, Last four digits of Social Security numbers (in certain cases), Driver’s license numbers, Names, Addresses, birth dates and names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.5B.

Regulatory Compliance

What was the highest fine imposed for a regulatory violation ?

Highest Fine Imposed: The highest fine imposed for a regulatory violation was $19,300,000 (Total).

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential litigation (under investigation by Bragar Eagel & Squire, P.C.), Settlements with Mandatory Remedial Measures, .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Avoid public Wi-Fi for sensitive transactions., Implement comprehensive vulnerability scanning and access reviews for online platforms., Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Support legislative efforts like the Farm and Food Cybersecurity Act (2025)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Consider encrypted email services for farm-specific data., Back up data to external drives/clouds to mitigate ransomware risks., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities. and Ensure timely incident reporting to regulators to avoid compounded penalties..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Farmers Insurance Breach Notice (Website), Top Class Actions, Google Security Blog (hypothetical, based on described announcement), GlobeNewswire (Bragar Eagel & Squire, P.C.), California Office of the Attorney General, Farmers Insurance Data Breach Notification, New York Department of Financial Services (DFS), USDA Reports on Agricultural Cybersecurity (2025), Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA), Aon’s Global Cyber Risk Report and Maine Attorney General Notification.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.cisa.gov .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (as of 2025-07-24).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers notified via letters; legal firm encouraging affected individuals to contact them, Google urged users to reset passwords and enable MFA., Agricultural organizations (e.g., Farm Bureaus) advised members to audit cybersecurity practices., USDA promoted resources for rural cybersecurity awareness., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Written notices with credit monitoring offerHelpline for eligibility checks, Notification letters sent to affected customers and Gmail users received breach notifications with phishing warnings.Farmers Insurance customers were notified of PII exposure and offered credit monitoring.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Third-party vendor database, Third-party vendor (Salesforce environment) and Salesforce third-party vulnerability.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Third-party vendor security vulnerability, Inadequate cybersecurity controls on online quoting platforms.Failure to report incidents promptly (Farmers Insurance Exchange, Infinity Insurance Co.).Lack of basic preparedness (e.g., response plans, vulnerability scans)., Third-party vendor (Salesforce) security failure.Overreliance on consumer-grade email (Gmail) for business operations in agriculture.Lack of MFA and weak password practices in rural sectors.Low cybersecurity awareness among farmers (82% believed they were never attacked).Outdated software and unpatched systems in agricultural businesses..

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Mandatory review of consumer data storage and access protocols.Enhanced compliance with NY DFS cybersecurity regulations.Investment in cybersecurity programs (e.g., Liberty Mutual’s ongoing efforts)., Google enforced password resets and phishing alerts.Agricultural sector urged to adopt MFA, antivirus, and employee training.Legislative push for Farm and Food Cybersecurity Act (2025) to fund rural cyber defenses.CISA and USDA expanded free cybersecurity resources for farmers..

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=farmers-insurance' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge