Company Details
fasana-gmbh
81
581
None
fasana.com
0
FAS_1225486
In-progress


FASANA Company CyberSecurity Posture
fasana.comSeit über 100 Jahren produzieren wir an unserem Standort in Stotzheim Tissue Produkte für den schön gedeckten Tisch. Wir bieten „alles unter einem Dach“ von der Tissue Herstellung auf unserer eigenen Papiermaschine bis hin zum fertig konfektionierten Produkt für den Consumer und Großverbraucher. For more than 100 years we have been producing tissue products for beautiful table settings at our location in Stotzheim. We offer ‘everything under one umbrella’ – from tissue production on our own paper machine to the finished product for the consumer and bulk consumer.
Company Details
fasana-gmbh
81
581
None
fasana.com
0
FAS_1225486
In-progress
Between 700 and 749

FASANA Global Score (TPRM)XXXX

Description: Cyberattack Forces German Paper Napkin Manufacturer Fasana into Insolvency A ransomware attack has pushed Germany-based paper napkin manufacturer Fasana into insolvency, jeopardizing the jobs of its 240 employees. The incident, first detected on May 19 or 21 (sources vary), crippled the company’s IT infrastructure, leaving printers displaying extortion notes and paralyzing all systems, including PCs and laptops. The attack inflicted immediate financial damage, with orders worth over €250,000 unfulfilled on the first day alone. For two weeks, Fasana generated no significant revenue, relying only on limited data stored in isolated machines. Recovery efforts were slow nearly 190 devices required manual examination and reconfiguration, and some applications remained nonfunctional three weeks later. Fasana, acquired by Powerparc AG in March, had been struggling financially prior to the attack. The cyber incident appears to have been the final blow, accelerating its insolvency filing. The threat actors behind the attack remain unidentified. The company is now reportedly seeking a new buyer.


No incidents recorded for FASANA in 2026.
No incidents recorded for FASANA in 2026.
No incidents recorded for FASANA in 2026.
FASANA cyber incidents detection timeline including parent company and subsidiaries

Seit über 100 Jahren produzieren wir an unserem Standort in Stotzheim Tissue Produkte für den schön gedeckten Tisch. Wir bieten „alles unter einem Dach“ von der Tissue Herstellung auf unserer eigenen Papiermaschine bis hin zum fertig konfektionierten Produkt für den Consumer und Großverbraucher. For more than 100 years we have been producing tissue products for beautiful table settings at our location in Stotzheim. We offer ‘everything under one umbrella’ – from tissue production on our own paper machine to the finished product for the consumer and bulk consumer.

SG - SG - SG - SG - TestSG - SG - SG - SG - Test SG - SG - SG - SG - TestSG - SG - SG - SG - Test SG - SG - SG - SG - TestSG - SG - SG - SG - Test
.png)
German paper napkin manufacturer Fasana, established in 1919, has filed for insolvency following a major cyberattack.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of FASANA is http://www.fasana.com.
According to Rankiteo, FASANA’s AI-generated cybersecurity score is 732, reflecting their Moderate security posture.
According to Rankiteo, FASANA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, FASANA has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, FASANA is not certified under SOC 2 Type 1.
According to Rankiteo, FASANA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, FASANA is not listed as GDPR compliant.
According to Rankiteo, FASANA does not currently maintain PCI DSS compliance.
According to Rankiteo, FASANA is not compliant with HIPAA regulations.
According to Rankiteo,FASANA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
FASANA operates primarily in the Paper & Forest Products industry.
FASANA employs approximately 81 people worldwide.
FASANA presently has no subsidiaries across any sectors.
FASANA’s official LinkedIn profile has approximately 581 followers.
FASANA is classified under the NAICS code None, which corresponds to Others.
No, FASANA does not have a profile on Crunchbase.
Yes, FASANA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fasana-gmbh.
As of January 24, 2026, Rankiteo reports that FASANA has experienced 1 cybersecurity incidents.
FASANA has an estimated 193 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $250 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with collected, examined, and reconfigured 190 pcs and laptops..
Title: Ransomware Attack on Fasana Leading to Insolvency
Description: A ransomware attack on Fasana, a paper napkin manufacturer based in Euskirchen, caused significant damage leading to the company filing for insolvency. The attack paralyzed all IT systems, including PCs and laptops, and resulted in substantial financial losses due to unprocessed orders and operational downtime.
Date Detected: 2024-05-21
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Financial Loss: Orders worth more than €250,000 could not be executed on the day following the attack; no significant revenue generated in the following two weeks
Systems Affected: All IT systems, including PCs and laptops
Downtime: Two weeks with no significant revenue; some applications still not functional three weeks after the incident
Operational Impact: Company could only process orders stored in machines; 190 PCs and laptops had to be collected, examined, and reconfigured
Revenue Loss: No significant revenue generated for two weeks
Average Financial Loss: The average financial loss per incident is $250.00 million.

Entity Name: Fasana
Entity Type: Company
Industry: Manufacturing (Paper Napkins)
Location: Euskirchen, Germany

Remediation Measures: Collected, examined, and reconfigured 190 PCs and laptops

Data Encryption: Yes (ransomware attack)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Collected, examined, and reconfigured 190 PCs and laptops.

Data Encryption: Yes

Source: WDR

Source: Kölner Stadtanzeiger (via Golem)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: WDR, and Source: Kölner Stadtanzeiger (via Golem).
Most Recent Incident Detected: The most recent incident detected was on 2024-05-21.
Highest Financial Loss: The highest financial loss from an incident was Orders worth more than €250,000 could not be executed on the day following the attack; no significant revenue generated in the following two weeks.
Most Recent Source: The most recent source of information about an incident are WDR and Kölner Stadtanzeiger (via Golem).
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.