Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Seit über 100 Jahren produzieren wir an unserem Standort in Stotzheim Tissue Produkte für den schön gedeckten Tisch. Wir bieten „alles unter einem Dach“ von der Tissue Herstellung auf unserer eigenen Papiermaschine bis hin zum fertig konfektionierten Produkt für den Consumer und Großverbraucher. For more than 100 years we have been producing tissue products for beautiful table settings at our location in Stotzheim. We offer ‘everything under one umbrella’ – from tissue production on our own paper machine to the finished product for the consumer and bulk consumer.

FASANA A.I CyberSecurity Scoring

FASANA

Company Details

Linkedin ID:

fasana-gmbh

Employees number:

81

Number of followers:

581

NAICS:

None

Industry Type:

Paper & Forest Products

Homepage:

fasana.com

IP Addresses:

0

Company ID:

FAS_1225486

Scan Status:

In-progress

AI scoreFASANA Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/fasana-gmbh.jpeg
FASANA Paper & Forest Products
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreFASANA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/fasana-gmbh.jpeg
FASANA Paper & Forest Products
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

FASANA Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
FASANACyber Attack10056/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Cyberattack Forces German Paper Napkin Manufacturer Fasana into Insolvency A ransomware attack has pushed Germany-based paper napkin manufacturer Fasana into insolvency, jeopardizing the jobs of its 240 employees. The incident, first detected on May 19 or 21 (sources vary), crippled the company’s IT infrastructure, leaving printers displaying extortion notes and paralyzing all systems, including PCs and laptops. The attack inflicted immediate financial damage, with orders worth over €250,000 unfulfilled on the first day alone. For two weeks, Fasana generated no significant revenue, relying only on limited data stored in isolated machines. Recovery efforts were slow nearly 190 devices required manual examination and reconfiguration, and some applications remained nonfunctional three weeks later. Fasana, acquired by Powerparc AG in March, had been struggling financially prior to the attack. The cyber incident appears to have been the final blow, accelerating its insolvency filing. The threat actors behind the attack remain unidentified. The company is now reportedly seeking a new buyer.

Powerparc AG and Fasana: Cyberattack pushes German napkin company into insolvency – DataBreaches.Net
Cyber Attack
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Cyberattack Forces German Paper Napkin Manufacturer Fasana into Insolvency A ransomware attack has pushed Germany-based paper napkin manufacturer Fasana into insolvency, jeopardizing the jobs of its 240 employees. The incident, first detected on May 19 or 21 (sources vary), crippled the company’s IT infrastructure, leaving printers displaying extortion notes and paralyzing all systems, including PCs and laptops. The attack inflicted immediate financial damage, with orders worth over €250,000 unfulfilled on the first day alone. For two weeks, Fasana generated no significant revenue, relying only on limited data stored in isolated machines. Recovery efforts were slow nearly 190 devices required manual examination and reconfiguration, and some applications remained nonfunctional three weeks later. Fasana, acquired by Powerparc AG in March, had been struggling financially prior to the attack. The cyber incident appears to have been the final blow, accelerating its insolvency filing. The threat actors behind the attack remain unidentified. The company is now reportedly seeking a new buyer.

Ailogo

FASANA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for FASANA

Incidents vs Paper & Forest Products Industry Average (This Year)

No incidents recorded for FASANA in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for FASANA in 2026.

Incident Types FASANA vs Paper & Forest Products Industry Avg (This Year)

No incidents recorded for FASANA in 2026.

Incident History — FASANA (X = Date, Y = Severity)

FASANA cyber incidents detection timeline including parent company and subsidiaries

FASANA Company Subsidiaries

SubsidiaryImage

Seit über 100 Jahren produzieren wir an unserem Standort in Stotzheim Tissue Produkte für den schön gedeckten Tisch. Wir bieten „alles unter einem Dach“ von der Tissue Herstellung auf unserer eigenen Papiermaschine bis hin zum fertig konfektionierten Produkt für den Consumer und Großverbraucher. For more than 100 years we have been producing tissue products for beautiful table settings at our location in Stotzheim. We offer ‘everything under one umbrella’ – from tissue production on our own paper machine to the finished product for the consumer and bulk consumer.

Loading...
similarCompanies

FASANA Similar Companies

SG - SG - SG - SG - TestSG - SG - SG - SG - Test SG - SG - SG - SG - TestSG - SG - SG - SG - Test SG - SG - SG - SG - TestSG - SG - SG - SG - Test

newsone

FASANA CyberSecurity News

June 16, 2025 07:00 AM
After falling victim to ransomware, a 100-year-old German napkin factory files for insolvency

German paper napkin manufacturer Fasana, established in 1919, has filed for insolvency following a major cyberattack.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

FASANA CyberSecurity History Information

Official Website of FASANA

The official website of FASANA is http://www.fasana.com.

FASANA’s AI-Generated Cybersecurity Score

According to Rankiteo, FASANA’s AI-generated cybersecurity score is 732, reflecting their Moderate security posture.

How many security badges does FASANA’ have ?

According to Rankiteo, FASANA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has FASANA been affected by any supply chain cyber incidents ?

According to Rankiteo, FASANA has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does FASANA have SOC 2 Type 1 certification ?

According to Rankiteo, FASANA is not certified under SOC 2 Type 1.

Does FASANA have SOC 2 Type 2 certification ?

According to Rankiteo, FASANA does not hold a SOC 2 Type 2 certification.

Does FASANA comply with GDPR ?

According to Rankiteo, FASANA is not listed as GDPR compliant.

Does FASANA have PCI DSS certification ?

According to Rankiteo, FASANA does not currently maintain PCI DSS compliance.

Does FASANA comply with HIPAA ?

According to Rankiteo, FASANA is not compliant with HIPAA regulations.

Does FASANA have ISO 27001 certification ?

According to Rankiteo,FASANA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of FASANA

FASANA operates primarily in the Paper & Forest Products industry.

Number of Employees at FASANA

FASANA employs approximately 81 people worldwide.

Subsidiaries Owned by FASANA

FASANA presently has no subsidiaries across any sectors.

FASANA’s LinkedIn Followers

FASANA’s official LinkedIn profile has approximately 581 followers.

NAICS Classification of FASANA

FASANA is classified under the NAICS code None, which corresponds to Others.

FASANA’s Presence on Crunchbase

No, FASANA does not have a profile on Crunchbase.

FASANA’s Presence on LinkedIn

Yes, FASANA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fasana-gmbh.

Cybersecurity Incidents Involving FASANA

As of January 24, 2026, Rankiteo reports that FASANA has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

FASANA has an estimated 193 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at FASANA ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

What was the total financial impact of these incidents on FASANA ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $250 million.

How does FASANA detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with collected, examined, and reconfigured 190 pcs and laptops..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Ransomware Attack on Fasana Leading to Insolvency

Description: A ransomware attack on Fasana, a paper napkin manufacturer based in Euskirchen, caused significant damage leading to the company filing for insolvency. The attack paralyzed all IT systems, including PCs and laptops, and resulted in substantial financial losses due to unprocessed orders and operational downtime.

Date Detected: 2024-05-21

Type: Ransomware

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware FASFAS1767845622

Financial Loss: Orders worth more than €250,000 could not be executed on the day following the attack; no significant revenue generated in the following two weeks

Systems Affected: All IT systems, including PCs and laptops

Downtime: Two weeks with no significant revenue; some applications still not functional three weeks after the incident

Operational Impact: Company could only process orders stored in machines; 190 PCs and laptops had to be collected, examined, and reconfigured

Revenue Loss: No significant revenue generated for two weeks

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $250.00 million.

Which entities were affected by each incident ?

Incident : Ransomware FASFAS1767845622

Entity Name: Fasana

Entity Type: Company

Industry: Manufacturing (Paper Napkins)

Location: Euskirchen, Germany

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware FASFAS1767845622

Remediation Measures: Collected, examined, and reconfigured 190 PCs and laptops

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware FASFAS1767845622

Data Encryption: Yes (ransomware attack)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Collected, examined, and reconfigured 190 PCs and laptops.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware FASFAS1767845622

Data Encryption: Yes

References

Where can I find more information about each incident ?

Incident : Ransomware FASFAS1767845622

Source: WDR

Incident : Ransomware FASFAS1767845622

Source: Kölner Stadtanzeiger (via Golem)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: WDR, and Source: Kölner Stadtanzeiger (via Golem).

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-05-21.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was Orders worth more than €250,000 could not be executed on the day following the attack; no significant revenue generated in the following two weeks.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are WDR and Kölner Stadtanzeiger (via Golem).

cve

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=fasana-gmbh' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge