ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Headhunting top Retail and Hostpitality professionals. Hunters International is a talent resourcing company for large Retail and Hospitality Groups. Drawing on extensive experience of the executive team, Hunters International collaborates with large companies as a strategic partner, who will not compromise on finding only the best. We invest time, energy, money and resources in order to understand core business, values, and corporate culture. This allows us to headhunt the best possible and most well-matched talent to meet most specific job descriptions.

Hunters International A.I CyberSecurity Scoring

Hunters International

Company Details

Linkedin ID:

hunters-international

Employees number:

5

Number of followers:

685

NAICS:

541612

Industry Type:

Human Resources Services

Homepage:

http://www.hunters1.com

IP Addresses:

0

Company ID:

HUN_3108196

Scan Status:

In-progress

AI scoreHunters International Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/hunters-international.jpeg
Hunters International Human Resources Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHunters International Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/hunters-international.jpeg
Hunters International Human Resources Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Hunters International Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Hunters InternationalRansomware10044/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Hunters International, transformed into World Leaks, continues operations post-renaming, victimizing entities such as Tata Technologies and ICBC's London HQ. Despite law enforcement's increasing pressure on ransomware activities, the group's pivot to a data theft-focused model using a software-as-a-service platform indicates adaptability. The service offers user-friendly and clandestine methods of data exfiltration. This shift aligns with a broader trend where ransomware groups adopt data extortion strategies, emphasizing the persistence and evolution of cyber threats.

Hunters International
Ransomware
Severity: 100
Impact: 4
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Hunters International, transformed into World Leaks, continues operations post-renaming, victimizing entities such as Tata Technologies and ICBC's London HQ. Despite law enforcement's increasing pressure on ransomware activities, the group's pivot to a data theft-focused model using a software-as-a-service platform indicates adaptability. The service offers user-friendly and clandestine methods of data exfiltration. This shift aligns with a broader trend where ransomware groups adopt data extortion strategies, emphasizing the persistence and evolution of cyber threats.

Ailogo

Hunters International Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Hunters International

Incidents vs Human Resources Services Industry Average (This Year)

Hunters International has 40.85% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Hunters International has 26.58% more incidents than the average of all companies with at least one recorded incident.

Incident Types Hunters International vs Human Resources Services Industry Avg (This Year)

Hunters International reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Hunters International (X = Date, Y = Severity)

Hunters International cyber incidents detection timeline including parent company and subsidiaries

Hunters International Company Subsidiaries

SubsidiaryImage

Headhunting top Retail and Hostpitality professionals. Hunters International is a talent resourcing company for large Retail and Hospitality Groups. Drawing on extensive experience of the executive team, Hunters International collaborates with large companies as a strategic partner, who will not compromise on finding only the best. We invest time, energy, money and resources in order to understand core business, values, and corporate culture. This allows us to headhunt the best possible and most well-matched talent to meet most specific job descriptions.

Loading...
similarCompanies

Hunters International Similar Companies

Randstad

Randstad is the world’s largest talent company and a partner of choice to clients. We are committed to providing equitable opportunities to people from all backgrounds and help them remain relevant in the rapidly changing world of work. We have a deep understanding of the labor market and help our c

Paychex

As the future of work continues to evolve, Paychex leads the way by making complex HR, payroll, and benefits brilliantly simple. Our unique combination of digital HR technology and advisory solutions meets the changing needs of employers and their employees. You can see the results in our growth as

Alight Solutions

Alight is a leading cloud-based human capital technology and services provider for many of the world’s largest organizations. Through the administration of employee benefits, Alight powers confident health, wealth, leaves and wellbeing decisions for 35 million people and dependents. Our Alight Workl

Remote

Talent is everywhere. Opportunity is not. Remote's mission is to create opportunity everywhere, empowering employers to find and hire the best talent, and enabling individuals to build financial and personal freedom. Remote is the all-in-one HR and payroll platform to find, hire, manage, and pay y

Randstad Portugal

A Randstad é a empresa número 1 no sector de Recursos Humanos a nível mundial e líder em Portugal onde: - conta com 450 colaboradores internos; - coloca cerca de 30 mil pessoas a trabalhar diariamente; - presença nacional através de delegações, contact centres e localizações Inhouse.

The Adecco Group

We believe in people and their place in the world of work. Everything we do as a company reflects our desire to continually evolve the concept of work for today and tomorrow. We pride ourselves on our ability to deliver a wide range of multi-disciplinary solutions across all sectors and areas of emp

HR Rail

HR Rail recrute et engage pour Infrabel et la SNCB. Deux sociétés avec des missions différentes mais un objectif commun : assurer le transport ferroviaire de manière optimale. Dans ce contexte nous sommes continuellement à la recherche de nouveaux talents prêts à relever des défis dans le domaine de

Maharah Human Resources

We were established in 2013 with a determination to provide a high level of quality and excellence to elevate the human resources sector, and supply the labor market with national and foreign cadres in various professions. We believe that the key to the growth and prosperity of the business world li

JOB PLACEMENT HELPLINE

Hi, Everyone, JOB PLACEMENT HELPLINE is the fastest growing HR Consulting & Manpower Outsourcing organization, providing a wide range of staffing solutions to its clients. JOB PLACEMENT HELPLINE bring in the right combination of expertise facilitating organizations to acquire temporary and perma

newsone

Hunters International CyberSecurity News

December 03, 2025 07:39 PM
Major Cyber Attacks in Review: March 2025

March 2025 was marked by a wave of significant cyber incidents affecting cloud platforms, developer ecosystems, blockchain networks, and telecom providers.

October 28, 2025 07:00 AM
Good News in Cybersecurity: Big Wins in 2025

Cybersecurity victories in 2025 include global takedowns, arrests, and new defenses that strengthen digital resilience.

September 25, 2025 07:00 AM
Trinity of Chaos: The LAPSUS$, ShinyHunters, and Scattered Spider Alliance Embarks on Global Cybercrime Spree

LAPSUS$, Scattered Spider, and ShinyHunters are three of the most notorious English-speaking cybercrime groups operating today.

August 28, 2025 07:00 AM
CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI, and a broad coalition of international partners,...

August 02, 2025 08:26 AM
Hunters International abandons ransomware and focuses on data theft

On July 3, 2025, the ransomware gang Hunters International announced on the dark web that it would abandon ransomware activities and focus instead on data...

July 28, 2025 07:00 AM
Dell Confirms Security Breach After World Leaks Gang Releases 1.3 TB of Data, Company Disputes Claims

Dell has confirmed a security breach after the World Leaks ransomware cyber gang leaked 1.3 terabytes of data allegedly stolen from the...

July 23, 2025 07:00 AM
New cybersecurity measures unveiled

Minister of information and communication technology Emma Theofelus has announced new national efforts to address rising cybersecurity threats.

July 21, 2025 07:00 AM
Hackers hit Dell product demo platform, but impact is limited

Tech manufacturer Dell said a hacker breached a product demonstration platform in a recent incident, but told Recorded Future News that no...

July 21, 2025 07:00 AM
World Leaks Claims Dell Data Breach, Leaks 1.3 TB of Files

Former Hunters International ransomware gang, now World Leaks, claims 1.3 TB Dell data breach, leaking over 400K files with internal tools and user data.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Hunters International CyberSecurity History Information

Official Website of Hunters International

The official website of Hunters International is http://www.hunters1.com.

Hunters International’s AI-Generated Cybersecurity Score

According to Rankiteo, Hunters International’s AI-generated cybersecurity score is 653, reflecting their Weak security posture.

How many security badges does Hunters International’ have ?

According to Rankiteo, Hunters International currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Hunters International have SOC 2 Type 1 certification ?

According to Rankiteo, Hunters International is not certified under SOC 2 Type 1.

Does Hunters International have SOC 2 Type 2 certification ?

According to Rankiteo, Hunters International does not hold a SOC 2 Type 2 certification.

Does Hunters International comply with GDPR ?

According to Rankiteo, Hunters International is not listed as GDPR compliant.

Does Hunters International have PCI DSS certification ?

According to Rankiteo, Hunters International does not currently maintain PCI DSS compliance.

Does Hunters International comply with HIPAA ?

According to Rankiteo, Hunters International is not compliant with HIPAA regulations.

Does Hunters International have ISO 27001 certification ?

According to Rankiteo,Hunters International is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Hunters International

Hunters International operates primarily in the Human Resources Services industry.

Number of Employees at Hunters International

Hunters International employs approximately 5 people worldwide.

Subsidiaries Owned by Hunters International

Hunters International presently has no subsidiaries across any sectors.

Hunters International’s LinkedIn Followers

Hunters International’s official LinkedIn profile has approximately 685 followers.

NAICS Classification of Hunters International

Hunters International is classified under the NAICS code 541612, which corresponds to Human Resources Consulting Services.

Hunters International’s Presence on Crunchbase

No, Hunters International does not have a profile on Crunchbase.

Hunters International’s Presence on LinkedIn

Yes, Hunters International maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hunters-international.

Cybersecurity Incidents Involving Hunters International

As of December 26, 2025, Rankiteo reports that Hunters International has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Hunters International has an estimated 4,328 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Hunters International ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Data Theft

Title: Hunters International (World Leaks) Data Theft Incident

Description: Hunters International, now known as World Leaks, continues operations post-renaming, victimizing entities such as Tata Technologies and ICBC's London HQ. Despite law enforcement's increasing pressure on ransomware activities, the group's pivot to a data theft-focused model using a software-as-a-service platform indicates adaptability. The service offers user-friendly and clandestine methods of data exfiltration. This shift aligns with a broader trend where ransomware groups adopt data extortion strategies, emphasizing the persistence and evolution of cyber threats.

Type: Data Theft

Attack Vector: Software-as-a-Service Platform

Threat Actor: World Leaks (formerly Hunters International)

Motivation: Data Extortion

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

Which entities were affected by each incident ?

Incident : Data Theft HUN539040325

Entity Name: Tata Technologies

Entity Type: Corporation

Industry: Technology

Incident : Data Theft HUN539040325

Entity Name: ICBC's London HQ

Entity Type: Corporation

Industry: Finance

Location: London

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Theft HUN539040325

Data Exfiltration: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Theft HUN539040325

Data Exfiltration: Yes

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an World Leaks (formerly Hunters International).

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in itsourcecode Online Frozen Foods Ordering System 1.0. This affects an unknown part of the file /contact_us.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

C-Kermit (aka ckermit) through 10.0 Beta.12 (aka 416-beta12) before 244644d allows a remote Kermit system to overwrite files on the local system, or retrieve arbitrary files from the local system.

Risk Information
cvss3
Base: 8.9
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L
Description

Telenium Online Web Application is vulnerable due to a Perl script that is called to load the login page. Due to improper input validation, an attacker can inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the server.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fujitsu / Fsas Technologies ETERNUS SF ACM/SC/Express (DX / AF Management Software) before 16.8-16.9.1 PA 2025-12, when collected maintenance data is accessible by a principal/authority other than ETERNUS SF Admin, allows an attacker to potentially affect system confidentiality, integrity, and availability.

Risk Information
cvss3
Base: 5.6
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Description

ONLYOFFICE Docs before 9.2.1 allows XSS in the textarea of the comment editing form. This is related to DocumentServer.

Risk Information
cvss3
Base: 6.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hunters-international' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge