Company Details
icrc
12,925
1,401,491
8135
icrc.org
0
INT_1824950
In-progress

International Committee of the Red Cross - ICRC Company CyberSecurity Posture
icrc.orgEstablished in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from the Geneva Conventions of 1949. It takes action in response to emergencies and promotes respect for international humanitarian law and its implementation in national law. We work closely with National Red Cross and Red Crescent Societies and with their International Federation to ensure a concerted, rational and rapid humanitarian response to the needs of the victims of armed conflict or any other situation of internal violence. Find out more about the ICRC by visiting the following links: Where we work http://www.icrc.org/en/where-we-work Working for the ICRC https://careers.icrc.org/ https://www.icrc.org/en/join-icrc-and-help-protect-lives-and-dignity Current Opportunities https://bit.ly/2GuHdZR
Company Details
icrc
12,925
1,401,491
8135
icrc.org
0
INT_1824950
In-progress
Between 750 and 799

ICRCI Global Score (TPRM)XXXX

Description: The computer servers of the International Committee of the Red Cross were targeted by a cyber attack. The personal data and confidential information of more than 515,000 people were compromised in the attack.
Description: The computer servers of the International Committee of the Red Cross were targeted by a cyber attack. The attack compromised personal data and confidential information on more than 515,000 highly vulnerable people. The perpetrator of this cyberattack is yet unknown to the ICRC. There are currently no signs that the hacked data has been shared publicly or leaked. The organisation declared that they are collaborating closely with their partners in aid work across the globe to comprehend the scale of the attack and implement the necessary safeguards for our data going forward.


No incidents recorded for International Committee of the Red Cross - ICRC in 2025.
No incidents recorded for International Committee of the Red Cross - ICRC in 2025.
No incidents recorded for International Committee of the Red Cross - ICRC in 2025.
ICRCI cyber incidents detection timeline including parent company and subsidiaries

Established in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from the Geneva Conventions of 1949. It takes action in response to emergencies and promotes respect for international humanitarian law and its implementation in national law. We work closely with National Red Cross and Red Crescent Societies and with their International Federation to ensure a concerted, rational and rapid humanitarian response to the needs of the victims of armed conflict or any other situation of internal violence. Find out more about the ICRC by visiting the following links: Where we work http://www.icrc.org/en/where-we-work Working for the ICRC https://careers.icrc.org/ https://www.icrc.org/en/join-icrc-and-help-protect-lives-and-dignity Current Opportunities https://bit.ly/2GuHdZR


Every day, we help millions of people to make journeys across London: By Tube, bus, tram, car, bike – and more. People don’t associate us with journeys by river, on foot or via the air, but we help with that, too. Getting people to where they need to go has been our business for over 100 years, and
The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, voluntee
The Salvation Army is the nation's largest direct provider of social services. Annually, we help millions overcome poverty, addiction, and spiritual and economic hardships by preaching the gospel of Jesus Christ and meeting human needs in His name without discrimination in nearly every zip code.

Médecins Sans Frontières (MSF) is an international, independent, medical humanitarian organisation working to provide medical assistance to people affected by conflict, epidemics, disasters, or exclusion from healthcare. Since our founding in 1971, we’ve grown to a global movement delivering human

IEEE is the world’s largest technical professional organization and is a public charity dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards

Casa de la Familia (CDLF) is a 501(c)(3) non-profit organization founded in 1996 by Clinical Psychologist Dr. Ana Nogales whose vision was to create an organization dedicated to ensuring long-lasting mental health success of children, youth, and families in response to psychological trauma. We prov
Goodwill Industries is all about people working. We are North America’s leading nonprofit provider of education, training, and career services for people with disadvantages, such as welfare dependency, homelessness, and lack of education or work experience, as well as those with physical, mental an

World Vision is the largest child-focused private charity in the world. Our 33,000+ staff members working in nearly 100 countries have united with our incredible supporters to impact the lives of over 200 million vulnerable children by tackling the root causes of poverty. Through World Vision every

AIESEC develops leadership among youth aged 18 to 30 and contributes to strengthening the global employability market by providing an end-to-end international talent recruitment solution for Enterprises, NGOs, and Start-ups. AIESEC is the world's largest youth-run organization developing the leader
.png)
Riyadh, Saudi Arabia — As cyber threats increasingly endanger civilian lives, the International Committee of the Red Cross (ICRC) joined...
At the occasion of the Cybersecurity Month and the Autumn Edition of the Cybersecurity Week Luxembourg Campaign, the International Committee...
On 23 September 2025, on the margins of the United Nations General Assembly, the Grand Duchy of Luxembourg and the International Committee...
The UN Working Group on Cyber Security (OEWG) has agreed to set up a permanent format at the UN on cyber security. However, the working group's successes have...
The ICRC highlighted the humanitarian application of digital technologies, emphasizing responsible innovation and risk management in conflict-affected areas.
As cyber threats continue to evolve, nonprofits must prioritize cybersecurity to protect their missions and the communities they serve.
by Samuel White | Feb 25, 2025. Hackers. In October 2023, the International Committee of the Red Cross (ICRC) laid down a stark warning: cyber warfare must...
Cybersecurity and data protection in humanitarian action can't be accomplished by the humanitarian sector alone – it requires cross-sectoral and...
Misinformation, « fake news », and cybersecurity issues constitute severe threats to organizations like the International Committee of the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International Committee of the Red Cross - ICRC is https://careers.icrc.org/.
According to Rankiteo, International Committee of the Red Cross - ICRC’s AI-generated cybersecurity score is 772, reflecting their Fair security posture.
According to Rankiteo, International Committee of the Red Cross - ICRC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International Committee of the Red Cross - ICRC is not certified under SOC 2 Type 1.
According to Rankiteo, International Committee of the Red Cross - ICRC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International Committee of the Red Cross - ICRC is not listed as GDPR compliant.
According to Rankiteo, International Committee of the Red Cross - ICRC does not currently maintain PCI DSS compliance.
According to Rankiteo, International Committee of the Red Cross - ICRC is not compliant with HIPAA regulations.
According to Rankiteo,International Committee of the Red Cross - ICRC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International Committee of the Red Cross - ICRC operates primarily in the Non-profit Organizations industry.
International Committee of the Red Cross - ICRC employs approximately 12,925 people worldwide.
International Committee of the Red Cross - ICRC presently has no subsidiaries across any sectors.
International Committee of the Red Cross - ICRC’s official LinkedIn profile has approximately 1,401,491 followers.
International Committee of the Red Cross - ICRC is classified under the NAICS code 8135, which corresponds to Others.
No, International Committee of the Red Cross - ICRC does not have a profile on Crunchbase.
Yes, International Committee of the Red Cross - ICRC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icrc.
As of November 27, 2025, Rankiteo reports that International Committee of the Red Cross - ICRC has experienced 2 cybersecurity incidents.
International Committee of the Red Cross - ICRC has an estimated 20,200 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Cyber Attack.
Title: Cyber Attack on International Committee of the Red Cross
Description: The computer servers of the International Committee of the Red Cross were targeted by a cyber attack. The personal data and confidential information of more than 515,000 people were compromised in the attack.
Type: Data Breach
Title: ICRC Cyber Attack
Description: The computer servers of the International Committee of the Red Cross (ICRC) were targeted by a cyber attack, compromising personal data and confidential information on more than 515,000 highly vulnerable people. The perpetrator of this attack is unknown. There are no signs that the hacked data has been shared publicly or leaked. The ICRC is working with partners to understand the scale of the attack and implement necessary safeguards.
Type: Data Breach
Threat Actor: Unknown
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Personal data, Confidential information
Systems Affected: Computer servers

Data Compromised: Personal data, Confidential information
Systems Affected: Computer servers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data, Confidential Information, , Personal Data, Confidential Information and .

Entity Name: International Committee of the Red Cross
Entity Type: Non-profit Organization
Industry: Humanitarian
Customers Affected: 515000

Entity Name: International Committee of the Red Cross
Entity Type: Non-profit Organization
Industry: Humanitarian Aid
Customers Affected: 515000

Type of Data Compromised: Personal data, Confidential information
Number of Records Exposed: 515000

Type of Data Compromised: Personal data, Confidential information
Number of Records Exposed: 515000
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal data, Confidential information, , Personal data, Confidential information and .
Most Significant System Affected: The most significant system affected in an incident was Computer servers and Computer servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Confidential information and Personal data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.0K.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.