Company Details
federal-trade-commission
1,211
42,360
92
ftc.gov
0
FED_4741871
In-progress

Federal Trade Commission Company CyberSecurity Posture
ftc.govThis is the official LinkedIn account of the Federal Trade Commission (FTC). The FTC is a bipartisan federal agency with a unique dual mission to protect consumers and promote competition. For more than 100 years, our collegial and consensus-driven agency has championed the interests of American consumers. As we begin our second century, the FTC is dedicated to advancing consumer interests while encouraging innovation and competition in our dynamic economy. To connect with the Commission, see http://www.ftc.gov/stay-connected. PRIVACY NOTICE This is the Federal Trade Commission’s LinkedIn account. LinkedIn is controlled and operated by a third party; it is not a government website or application. The FTC’s privacy policy does not apply. Although the FTC does not routinely maintain, use, or share personally identifiable information from this site, LinkedIn and its partners may collect your information and use tracking technology. Please refer to LinkedIn’s Privacy Policy (https://www.linkedin.com/legal/privacy-policy) to learn more about how the company may use your personal information. Access the FTC’s official web site at www.ftc.gov and its privacy policy at www.ftc.gov/site-information/privacy-policy. Note: The FTC does not collect personal information through this LinkedIn page. COMMENT POLICY We welcome your comments and thoughts about the information on this page. If you do have something to say, please be courteous and respectful to others. We won’t review or edit any comments before they are posted, but we will delete any comments that: - contain spam or are off-topic - use vulgar language or offensive terms that target specific groups or contain personal attacks - are sales pitches, promotions or links to commercial sites - spread clearly misleading or false information - include personal information, like home addresses, social security numbers and emails, etc.
Company Details
federal-trade-commission
1,211
42,360
92
ftc.gov
0
FED_4741871
In-progress
Between 700 and 749

FTC Global Score (TPRM)XXXX

Description: **FTC Orders Nomad to Return Stolen Funds and Reform Security After $186M Crypto Hack** The Federal Trade Commission (FTC) has reached a settlement with **Illusory Systems (operating as Nomad)**, requiring the company to return recovered funds to victims and implement sweeping cybersecurity reforms. The order follows a **2022 breach** in which hackers exploited a vulnerability in Nomad’s **Token Bridge**—a smart contract solution designed to transfer cryptocurrency across blockchains—stealing **$186 million** from users. The FTC’s investigation found that Nomad **misrepresented its security practices**, advertising its platform as “high security” and “security first” while failing to implement basic safeguards. In **June 2022**, the company deployed **untested code** after a security audit, leaving a critical flaw unaddressed. By **July 2022**, attackers exploited the vulnerability, draining user funds. White hat hackers later secured **$37 million** of the stolen assets, which Nomad is now required to return. The FTC’s complaint highlighted **systemic security failures**, including: - **Inadequate testing**: Most pre-deployment checks focused on functionality, not security. - **Lack of safeguards**: No automated fraud monitoring, circuit breakers, or kill switches to halt suspicious transactions. - **Delayed response**: The breach was detected via **social media**, not internal systems, and engineers scrambled to respond—including relaying code fixes mid-flight. - **Ignored warnings**: Months before the hack, an engineer warned leadership about weak testing practices, citing a prior incident where untested code caused losses. Nomad also **overrode internal efforts to reimburse users** after a separate bug in its web interface led to losses, with executives reportedly stating the platform offered “no guarantees of safety.” Under the settlement, Nomad must **develop a comprehensive cybersecurity program**, address flaws identified by the FTC, and submit to **third-party assessments**. The case underscores the FTC’s stance that companies must **deliver on security promises**—or face enforcement action.


Federal Trade Commission has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.
Federal Trade Commission has 28.21% more incidents than the average of all companies with at least one recorded incident.
Federal Trade Commission reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
FTC cyber incidents detection timeline including parent company and subsidiaries

This is the official LinkedIn account of the Federal Trade Commission (FTC). The FTC is a bipartisan federal agency with a unique dual mission to protect consumers and promote competition. For more than 100 years, our collegial and consensus-driven agency has championed the interests of American consumers. As we begin our second century, the FTC is dedicated to advancing consumer interests while encouraging innovation and competition in our dynamic economy. To connect with the Commission, see http://www.ftc.gov/stay-connected. PRIVACY NOTICE This is the Federal Trade Commission’s LinkedIn account. LinkedIn is controlled and operated by a third party; it is not a government website or application. The FTC’s privacy policy does not apply. Although the FTC does not routinely maintain, use, or share personally identifiable information from this site, LinkedIn and its partners may collect your information and use tracking technology. Please refer to LinkedIn’s Privacy Policy (https://www.linkedin.com/legal/privacy-policy) to learn more about how the company may use your personal information. Access the FTC’s official web site at www.ftc.gov and its privacy policy at www.ftc.gov/site-information/privacy-policy. Note: The FTC does not collect personal information through this LinkedIn page. COMMENT POLICY We welcome your comments and thoughts about the information on this page. If you do have something to say, please be courteous and respectful to others. We won’t review or edit any comments before they are posted, but we will delete any comments that: - contain spam or are off-topic - use vulgar language or offensive terms that target specific groups or contain personal attacks - are sales pitches, promotions or links to commercial sites - spread clearly misleading or false information - include personal information, like home addresses, social security numbers and emails, etc.


De organisatie bestaat uit diverse onderdelen, waaronder de Belastingdienst, Douane, Toeslagen, FIOD en enkele facilitaire organisaties. Met ruim 30.000 medewerkers werken we in kantoren die verspreid zijn over het hele land. Gezamenlijk heffen, innen en controleren we belastingen. Daarnaast zorgen

Il Ministero dell'Agricoltura, della Sovranità alimentare e delle Foreste (Masaf) si occupa dell'elaborazione e del coordinamento delle linee politiche agricole, agroalimentari, forestali, della pesca e dell’ippica a livello nazionale e internazionale. Rappresenta l'Italia in sede europea nelle cont

The Transportation Security Administration (TSA) is a component agency of the U.S. Department of Homeland Security (DHS), committed to securing the nation’s transportation systems to ensure safe and efficient travel for all. Our mission is to protect the American people by preventing threats and dis

Le canton de Vaud, c’est plus de 800 000 personnes vivant dans plus de 300 communes ! Rejoindre l’Administration cantonale vaudoise, c’est s’engager aux côtés de près de 40’000 personnes unies dans un même but : servir la population. Pourquoi nous suivre ? Dédiez votre quart d’heure vaudois aux o

The Singapore Public Service works with the elected Government and Singaporeans to forge a common vision of Singapore’s future and bring it into reality. We take pride in living out our values of integrity, service and excellence. Follow us for stories on how our public officers are contributing

State government is the largest employer in Tennessee, with approximately 43,500 employees in the three branches of government. The State of Tennessee has approximately 1,300 different job classifications in areas such as administrative, health services, historic preservation, legal, agriculture, co

The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

The Brazilian Institute of Geography and Statistics or IBGE (Portuguese: Instituto Brasileiro de Geografia e Estatística), is the agency responsible for statistical, geographic, cartographic, geodetic and environmental information in Brazil. The IBGE performs a national census every ten years, and t

As the United States Postal Service continues its evolution as a forward-thinking, fast-acting company capable of providing quality products and services for its customers, it continues to remember and celebrate its roots as the first national network of communications that literally bound a nation
.png)
The company was charged with materially misrepresenting the cybersecurity of its Token Bridge software as executives failed to implement...
Illuminate Education is facing millions in fines and other sanctions, but parents and students whose data was exposed had their court case...
Zuckerman, who used to run the stalkerware apps SpyFone and SpyTrac, claimed the ban is hurting his unrelated business.
The FTC alleged the ed tech company knew of multiple security vulnerabilities a year before a breach exposed 10 million students' personal...
The Federal Trade Commission is requiring the edtech firm Illuminate Education to more carefully secure its data after a 2021 incident that...
Education technology provider Illuminate Education Inc. will implement a data security program to settle Federal Trade Commission...
U.S. Senator Ron Wyden and Representative Raja Krishnamoorthi are urging the Federal Trade Commission (FTC) to investigate Flock Safety,...
Flock, which manages one of the nation's largest license plate reader system networks in the U.S., already had certain police logins stolen and...
They warn that if hackers or foreign spies obtain a law-enforcement user's password, they could gain access to areas of the Flock platform...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Federal Trade Commission is http://www.ftc.gov/.
According to Rankiteo, Federal Trade Commission’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, Federal Trade Commission currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Federal Trade Commission is not certified under SOC 2 Type 1.
According to Rankiteo, Federal Trade Commission does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Federal Trade Commission is not listed as GDPR compliant.
According to Rankiteo, Federal Trade Commission does not currently maintain PCI DSS compliance.
According to Rankiteo, Federal Trade Commission is not compliant with HIPAA regulations.
According to Rankiteo,Federal Trade Commission is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Federal Trade Commission operates primarily in the Government Administration industry.
Federal Trade Commission employs approximately 1,211 people worldwide.
Federal Trade Commission presently has no subsidiaries across any sectors.
Federal Trade Commission’s official LinkedIn profile has approximately 42,360 followers.
Federal Trade Commission is classified under the NAICS code 92, which corresponds to Public Administration.
No, Federal Trade Commission does not have a profile on Crunchbase.
Yes, Federal Trade Commission maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/federal-trade-commission.
As of December 17, 2025, Rankiteo reports that Federal Trade Commission has experienced 1 cybersecurity incidents.
Federal Trade Commission has an estimated 11,722 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Total Financial Loss: The total financial loss from these incidents is estimated to be $186 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, but delayed and chaotic, and containment measures with shut down the bridge after assets were drained, and remediation measures with implementation of a comprehensive cybersecurity plan as part of ftc settlement, and recovery measures with return of $37 million safeguarded by white hat hackers to users, and enhanced monitoring with required as part of ftc settlement..
Title: Nomad Token Bridge Hack
Description: Hackers exploited a vulnerability in Illusory Systems' (Nomad) Token Bridge cryptocurrency smart contract solution, leading to the theft of $186 million in cryptocurrency funds from users. The FTC settlement requires the company to return recovered funds to victims and implement security reforms.
Date Detected: July 2022
Date Publicly Disclosed: July 2022
Type: Data Breach, Cryptocurrency Theft
Attack Vector: Exploitation of a software vulnerability in smart contracts
Vulnerability Exploited: Inadequately tested code in Token Bridge smart contracts
Threat Actor: Malicious hackers
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Financial Loss: $186 million
Data Compromised: Cryptocurrency funds
Systems Affected: Token Bridge smart contracts, cryptocurrency wallets
Operational Impact: Token Bridge was emptied of assets; delayed response due to lack of automated monitoring
Brand Reputation Impact: Significant damage due to misrepresentation of security capabilities
Legal Liabilities: FTC settlement, potential fines, and regulatory actions
Payment Information Risk: Cryptocurrency funds at risk
Average Financial Loss: The average financial loss per incident is $186.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Cryptocurrency funds.

Entity Name: Illusory Systems (Nomad)
Entity Type: Cryptocurrency company
Industry: Blockchain, FinTech
Customers Affected: Users of Token Bridge smart contracts

Incident Response Plan Activated: Yes, but delayed and chaotic
Containment Measures: Shut down the bridge after assets were drained
Remediation Measures: Implementation of a comprehensive cybersecurity plan as part of FTC settlement
Recovery Measures: Return of $37 million safeguarded by white hat hackers to users
Enhanced Monitoring: Required as part of FTC settlement
Incident Response Plan: The company's incident response plan is described as Yes, but delayed and chaotic.

Type of Data Compromised: Cryptocurrency funds
Sensitivity of Data: High (financial assets)
Data Exfiltration: Yes, $186 million stolen
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implementation of a comprehensive cybersecurity plan as part of FTC settlement.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by shut down the bridge after assets were drained.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Return of $37 million safeguarded by white hat hackers to users.

Regulations Violated: FTC Act (unfair or deceptive practices)
Legal Actions: FTC settlement requiring security reforms and fund return
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through FTC settlement requiring security reforms and fund return.

Lessons Learned: Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.

Recommendations: Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff, and avoid misrepresenting security capabilities.
Key Lessons Learned: The key lessons learned from past incidents are Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff and and avoid misrepresenting security capabilities..

Source: Federal Trade Commission
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Federal Trade Commission.

Investigation Status: Completed (FTC settlement reached)

Root Causes: Inadequate code testing, lack of secure coding practices, absence of automated fraud monitoring, insufficient security staff, and misrepresentation of security capabilities.
Corrective Actions: Implementation of a comprehensive cybersecurity plan, third-party assessments, and return of recovered funds to victims.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Required as part of FTC settlement.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implementation of a comprehensive cybersecurity plan, third-party assessments, and return of recovered funds to victims..
Last Attacking Group: The attacking group in the last incident was an Malicious hackers.
Most Recent Incident Detected: The most recent incident detected was on July 2022.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on July 2022.
Highest Financial Loss: The highest financial loss from an incident was $186 million.
Most Significant Data Compromised: The most significant data compromised in an incident was Cryptocurrency funds.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Shut down the bridge after assets were drained.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Cryptocurrency funds.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was FTC settlement requiring security reforms and fund return.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Failure to implement secure coding practices, lack of automated fraud monitoring, inadequate security staffing, and misrepresentation of security capabilities led to catastrophic financial loss.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement secure coding practices, conduct thorough security testing, establish automated fraud monitoring, hire adequate security staff and and avoid misrepresenting security capabilities..
Most Recent Source: The most recent source of information about an incident is Federal Trade Commission.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (FTC settlement reached).
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.