Company Details
hicleo
259
21,946
71394
hicleo.com
0
CLE_2783978
In-progress

Cleo Company CyberSecurity Posture
hicleo.comCleo is the only global, end-to-end, comprehensive family care platform supporting individuals throughout every life stage. Whether individuals are growing their family; raising babies, children, or teenagers; caring for an adult loved one; or taking care of their own health, Cleo provides virtual coaching, concierge support and navigation to resources and benefits so that they can be happier and healthier both at home and at work. Cleo's expert global Guide network combined with advanced analytics and a personalized digital platform supports members in more than 70 countries around the world through 17+ languages spoken by our Cleo Guides with an additional 250+ live translated languages. Cleo delivers evidence-based interventions to improve the health & wellbeing of the family unit, decrease caregiver burnout, increase productivity, and reduce healthcare spend. Cleo is trusted by more than 200 employers and health plans. For more information, visit www.hicleo.com.
Company Details
hicleo
259
21,946
71394
hicleo.com
0
CLE_2783978
In-progress
Between 650 and 699

Cleo Global Score (TPRM)XXXX

Description: The Clop ransomware group has claimed to successfully exploit a vulnerability in Cleo's file transfer products, affecting the Harmony, VLTrader, and LexiCom software versions prior to 5.8.0.21. Despite the release of a patch, the flaw remained exploitable, leading to the unauthorized access to data of 59 companies. While multiple companies disputed the breach, the significance of the exploited vulnerability is substantial, as it allowed remote code execution. The incident caught widespread attention as Clop threatened to release stolen data publicly, indicating a severe impact on the affected companies' confidentiality and potential operational capabilities.


Cleo has 44.93% more incidents than the average of same-industry companies with at least one recorded incident.
Cleo has 56.25% more incidents than the average of all companies with at least one recorded incident.
Cleo reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Cleo cyber incidents detection timeline including parent company and subsidiaries

Cleo is the only global, end-to-end, comprehensive family care platform supporting individuals throughout every life stage. Whether individuals are growing their family; raising babies, children, or teenagers; caring for an adult loved one; or taking care of their own health, Cleo provides virtual coaching, concierge support and navigation to resources and benefits so that they can be happier and healthier both at home and at work. Cleo's expert global Guide network combined with advanced analytics and a personalized digital platform supports members in more than 70 countries around the world through 17+ languages spoken by our Cleo Guides with an additional 250+ live translated languages. Cleo delivers evidence-based interventions to improve the health & wellbeing of the family unit, decrease caregiver burnout, increase productivity, and reduce healthcare spend. Cleo is trusted by more than 200 employers and health plans. For more information, visit www.hicleo.com.


Through the painstaking steps of our proprietary Seed to Seal® production process, we produce the best, most authentic essential oils in the world. We are committed to providing pure, powerful products for every family and lifestyle, all infused with the life-changing benefits of our essential oils.
LA Fitness is a privately owned fitness club chain. LA Fitness has hundreds of health clubs gyms and millions of members across US and Canada. In an industry often equated with fad and fashion, LA Fitness has steadily increased its presence by focusing on the one lifelong benefit valued by everyone:

O Grupo Fleury é reconhecido como uma referência de qualidade em medicina diagnóstica no país, com soluções completas, coordenação de cuidado centrada no indivíduo, capacidade de inovação e tecnologia. Temos um portfólio de saúde integrado, preventivo e híbrido, nascemos como um laboratório e evolu

Herbalife is a global health and wellness community born to support you in living your best life. For over 40 years and in more than 90 countries, we’ve empowered millions of people to make real changes to their lives with our science-backed products, the support of a coach – what we call an Herbali

Here at Aetna, a CVS Health® company, we’re building a healthier world by making health care easy, affordable and all about you. Because Healthier Happens Together™! Follow our page for company news, industry commentary, jobs and more. Founded in 1853 in Hartford, CT, Aetna® is one of the nation's l

Massage Envy is the nation’s #1 provider of massage collectively across its franchise network and a national leader in skin care. All Massage Envy locations are independently owned and operated franchises, where the franchisee is the sole employer of all positions. Massage Envy combines big-brand r
Planet Fitness is taking the fitness industry by storm! Enhancing people’s lives with an affordable, high-quality fitness experience requires a team of inspiring, motivated and fun-loving go-getters. As one of the largest and fastest-growing franchisors and operators of fitness centers in the Unit
Somos a maior rede de academias da América Latina, com o propósito de democratizar o fitness de alto padrão. Estamos presentes em 15 países, contando com mais de 1500 academias. Atendemos mais de 4 milhões de alunos e contamos com nossa gente de mais de 7 mil colaboradores dedicados, empenhados em o
Life Time provides an entertaining, educational, friendly and inviting, functional and innovative experience of uncompromising quality that meets the health and fitness needs of the entire family. Life Time is a wellness pioneer reshaping the way consumers approach their health by integrating where
.png)
ADB Sectors Department 2 Director General Cleo Kawawaki calls cybersecurity a “whole-of-society” responsibility; Warns that cyber risks can...
The email-based campaign purports to have sensitive data from breached Oracle E-Business Suite applications.
Corsica Technologies and Cleo Join Forces to Bring Ecosystem Integration to Supply Chain-Driven Organizations in Logistics, Manufacturing,...
Cleo and Corsica Technologies announce a strategic partnership for customers in logistics, manufacturing, and other supply chain-dependent...
A consumer dropped her lawsuit against Sam's Club and software provider Cleo Communications US LLC over a data breach linked to a vulnerability in Cleo's file-...
The retailer previously said it was investigating a potential cyber attack related to a vulnerability in a vendor's file transfer software.
Car rental giant Hertz Corporation has confirmed a data breach stemming from the Cleo managed file sharing platform's zero-day...
Threat actors keep looking for those holes and vulnerabilities,” SOCRadar CISO tells IT Brew.
Sam's Club is the latest in a growing list of Cleo clients to face litigation over the breaches of the Cleo file-transfer system.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cleo is http://www.hicleo.com.
According to Rankiteo, Cleo’s AI-generated cybersecurity score is 672, reflecting their Weak security posture.
According to Rankiteo, Cleo currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cleo is not certified under SOC 2 Type 1.
According to Rankiteo, Cleo does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cleo is not listed as GDPR compliant.
According to Rankiteo, Cleo does not currently maintain PCI DSS compliance.
According to Rankiteo, Cleo is not compliant with HIPAA regulations.
According to Rankiteo,Cleo is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cleo operates primarily in the Wellness and Fitness Services industry.
Cleo employs approximately 259 people worldwide.
Cleo presently has no subsidiaries across any sectors.
Cleo’s official LinkedIn profile has approximately 21,946 followers.
Cleo is classified under the NAICS code 71394, which corresponds to Fitness and Recreational Sports Centers.
Yes, Cleo has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/cleolabs.
Yes, Cleo maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hicleo.
As of November 30, 2025, Rankiteo reports that Cleo has experienced 1 cybersecurity incidents.
Cleo has an estimated 11,976 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Clop Ransomware Exploits Vulnerability in Cleo's File Transfer Products
Description: The Clop ransomware group has claimed to successfully exploit a vulnerability in Cleo's file transfer products, affecting the Harmony, VLTrader, and LexiCom software versions prior to 5.8.0.21. Despite the release of a patch, the flaw remained exploitable, leading to the unauthorized access to data of 59 companies. While multiple companies disputed the breach, the significance of the exploited vulnerability is substantial, as it allowed remote code execution. The incident caught widespread attention as Clop threatened to release stolen data publicly, indicating a severe impact on the affected companies' confidentiality and potential operational capabilities.
Type: Ransomware
Attack Vector: Remote Code Execution
Vulnerability Exploited: Vulnerability in Cleo's file transfer products
Threat Actor: Clop Ransomware Group
Motivation: Data Theft, Public Data Release
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Vulnerability in Cleo's file transfer products.

Data Compromised: Unauthorized access to data of 59 companies
Systems Affected: HarmonyVLTraderLexiCom
Operational Impact: Potential operational capabilities impact
Brand Reputation Impact: Severe impact on confidentiality

Entity Name: Cleo
Entity Type: Company
Industry: Software
Customers Affected: 59 companies

Data Exfiltration: Data exfiltration threatened

Ransomware Strain: Clop Ransomware
Data Exfiltration: Data exfiltration threatened

Entry Point: Vulnerability in Cleo's file transfer products

Root Causes: Vulnerability in Cleo's file transfer products
Last Attacking Group: The attacking group in the last incident was an Clop Ransomware Group.
Most Significant Data Compromised: The most significant data compromised in an incident was Unauthorized access to data of 59 companies.
Most Significant System Affected: The most significant system affected in an incident was HarmonyVLTraderLexiCom.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Unauthorized access to data of 59 companies.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Vulnerability in Cleo's file transfer products.
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.