Company Details
fincen
600
48,519
92
fincen.gov
0
FIN_1892900
In-progress

Financial Crimes Enforcement Network, US Treasury Company CyberSecurity Posture
fincen.govOfficial LinkedIn account of the Financial Crimes Enforcement Network, a U.S. Treasury bureau. Learn more at www.fincen.gov
Company Details
fincen
600
48,519
92
fincen.gov
0
FIN_1892900
In-progress
Between 700 and 749

FCENUT Global Score (TPRM)XXXX

Description: The Treasury was targeted in a sophisticated cyber-attack conducted by a group linked to Chinese nationals. This attack, part of a campaign that affected over 100 US organizations, compromised IT systems including management software. The severity of the intrusion led to significant damage, with the Treasury experiencing a breach of sensitive data critical to national security and economic stability. The scope and sophistication of the attack indicate a threat to both internal operations and potentially, broader national interests.


Financial Crimes Enforcement Network, US Treasury has 53.85% more incidents than the average of same-industry companies with at least one recorded incident.
Financial Crimes Enforcement Network, US Treasury has 56.25% more incidents than the average of all companies with at least one recorded incident.
Financial Crimes Enforcement Network, US Treasury reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
FCENUT cyber incidents detection timeline including parent company and subsidiaries

Official LinkedIn account of the Financial Crimes Enforcement Network, a U.S. Treasury bureau. Learn more at www.fincen.gov


Social Security provides financial protection for our nation’s people, supporting more than 64 million individuals and families. With retirement, disability, and survivors benefits, Social Security is one of the most successful anti-poverty programs in our nation's history. We are there throughout

Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

General Services Administration (GSA) is an independent agency of the United States government established in 1949 to help manage and support the basic functioning of federal agencies. Our organization includes the Public Buildings Service (PBS), Federal Acquisition Service (FAS), and a variety of S

Every day the contributions and achievements of State of Michigan employees have a direct impact on over 10 million Michiganders across the state. If you're looking for a fulfilling career in state government that can make a real difference in the lives of others, you can find your place working wit

Empresa Brasileira de Correios e Telégrafos foi criada como empresa em 1969 por decreto lei. Hoje conta com mais de 100.000 empregados, tem presença em todos os municípios do Brasil. NEGÓCIO: Soluções que aproximam. MISSÃO: Fornecer soluções acessíveis e confiáveis para conectar pessoas, institu

Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above
Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate mu

The Food and Drug Administration is an agency within the Department of Health and Human Services. The FDA is responsible for protecting the public health by ensuring the safety, efficacy, and security of human and veterinary drugs, biological products, and medical devices; and by ensuring the safet

Work with the Alberta government to build a stronger province for current and future generations. We offer diverse and rewarding employment opportunities in an environment that encourages continuous learning and career growth. We are one of the largest employers in Alberta with over 27,000 empl
.png)
Cybersecurity risks are evolving, in part because bad actors – including scammers and fraudsters – are leveraging widely available...
2026 is pivotal for US banks as they navigate macro headwinds, stablecoin disruption, scaling AI, fragmented data, and financial crime.
Andrea Higgens, Inspector, Elder Protection Unit, San Mateo County District Attorney's Office. Andrea Higgens is a criminal elder and...
Sen. Ruben Gallego, D-Ariz., wants the Financial Crimes Enforcement Network and other financial regulators to assess the effectiveness of AI...
Regulatory relief from anti-money laundering rules is in the cards for casinos, insurance companies and other non-bank financial...
The Department of the Treasury's Office of Foreign Assets Control (OFAC) has implemented sanctions against large network of scam centers...
The order barring three Mexican financial institutions from doing business with U.S. financial institutions has been delayed until October.
NCUA resources that can be referenced when evaluating or performing due diligence on third-party vendors that provide artificial...
The Trump administration's Working Group on Digital Asset Markets has released a comprehensive report outlining some 100 policy and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Financial Crimes Enforcement Network, US Treasury is https://www.fincen.gov.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury is not certified under SOC 2 Type 1.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury is not listed as GDPR compliant.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury does not currently maintain PCI DSS compliance.
According to Rankiteo, Financial Crimes Enforcement Network, US Treasury is not compliant with HIPAA regulations.
According to Rankiteo,Financial Crimes Enforcement Network, US Treasury is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Financial Crimes Enforcement Network, US Treasury operates primarily in the Government Administration industry.
Financial Crimes Enforcement Network, US Treasury employs approximately 600 people worldwide.
Financial Crimes Enforcement Network, US Treasury presently has no subsidiaries across any sectors.
Financial Crimes Enforcement Network, US Treasury’s official LinkedIn profile has approximately 48,519 followers.
Financial Crimes Enforcement Network, US Treasury is classified under the NAICS code 92, which corresponds to Public Administration.
No, Financial Crimes Enforcement Network, US Treasury does not have a profile on Crunchbase.
Yes, Financial Crimes Enforcement Network, US Treasury maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fincen.
As of December 03, 2025, Rankiteo reports that Financial Crimes Enforcement Network, US Treasury has experienced 1 cybersecurity incidents.
Financial Crimes Enforcement Network, US Treasury has an estimated 11,264 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Sophisticated Cyber-Attack on the Treasury
Description: The Treasury was targeted in a sophisticated cyber-attack conducted by a group linked to Chinese nationals. This attack, part of a campaign that affected over 100 US organizations, compromised IT systems including management software. The severity of the intrusion led to significant damage, with the Treasury experiencing a breach of sensitive data critical to national security and economic stability. The scope and sophistication of the attack indicate a threat to both internal operations and potentially, broader national interests.
Type: Cyber-Attack
Threat Actor: Group linked to Chinese nationals
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Sensitive data critical to national security and economic stability
Systems Affected: IT systemsManagement software
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive data critical to national security and economic stability.

Entity Name: The Treasury
Entity Type: Government
Industry: Public Sector
Location: United States

Type of Data Compromised: Sensitive data critical to national security and economic stability
Sensitivity of Data: High
Last Attacking Group: The attacking group in the last incident was an Group linked to Chinese nationals.
Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive data critical to national security and economic stability and .
Most Significant System Affected: The most significant system affected in an incident was IT systemsManagement software.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive data critical to national security and economic stability.
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.