Company Details
joinblock
13,182
165,867
52
block.xyz
0
BLO_3745819
In-progress


Block Company CyberSecurity Posture
block.xyzBlock is one company built from many blocks, all united by the same purpose of economic empowerment. The blocks that form our foundational teams — People, Finance, Counsel, Hardware, Information Security, Platform Infrastructure Engineering, and more — provide support and guidance at the corporate level. They work across business groups and around the globe, spanning time zones and disciplines to develop inclusive People policies, forecast finances, give legal counsel, safeguard systems, nurture new initiatives, and more. Every challenge creates possibilities, and we need different perspectives to see them all. Bring yours to Block.
Company Details
joinblock
13,182
165,867
52
block.xyz
0
BLO_3745819
In-progress
Between 700 and 749

Block Global Score (TPRM)XXXX

Description: Block, the parent company of Cash App, faced a significant data breach in December 2021 when a former employee unlawfully downloaded personal information of approximately 8.2 million Cash App users. The breach was not disclosed until April 4, 2022, nearly four months later, raising concerns about transparency and data security practices. Shareholders filed a class-action lawsuit, alleging Block misled investors by failing to disclose inadequate security measures before the breach and during its $29 billion acquisition of Afterpay. While the lawsuit was dismissed due to lack of evidence of fraudulent intent, the incident exposed vulnerabilities in Block’s data protection framework. Additionally, Block settled separate regulatory cases in 2024, paying $80 million to 48 states and $40 million to New York for anti-money laundering deficiencies in Cash App. The breach involved customer data leakage, though no ransomware was reported. Cash App, with 57 million monthly users and $283 billion in inflows (2024), faced reputational and financial risks, though the direct operational impact appeared contained to data exposure and legal repercussions.


No incidents recorded for Block in 2026.
No incidents recorded for Block in 2026.
No incidents recorded for Block in 2026.
Block cyber incidents detection timeline including parent company and subsidiaries

Block is one company built from many blocks, all united by the same purpose of economic empowerment. The blocks that form our foundational teams — People, Finance, Counsel, Hardware, Information Security, Platform Infrastructure Engineering, and more — provide support and guidance at the corporate level. They work across business groups and around the globe, spanning time zones and disciplines to develop inclusive People policies, forecast finances, give legal counsel, safeguard systems, nurture new initiatives, and more. Every challenge creates possibilities, and we need different perspectives to see them all. Bring yours to Block.

First American Financial Corporation is a premier provider of title, settlement and risk solutions for real estate transactions. With its combination of financial strength and stability built over more than 130 years, innovative proprietary technologies, and unmatched data assets, the company is lea
BDO is a full-service universal bank in the Philippines. It provides a complete array of industry-leading products and services including Lending (corporate and consumer), Deposit-taking, Foreign Exchange, Brokering, Trust and Investments, Credit Cards, Corporate Cash Management, and Remittances in
Tata Capital Limited is a subsidiary of Tata Sons Limited. The Company is registered with the Reserve Bank of India as a Core Investment Company and offers through itself and its subsidiaries fund and fee-based financial services to its customers, under the Tata Capital brand. As a trusted and custo

From the largest cities to the smallest villages, India is filled with ambition and enterprise. As Indians from all walks of life set out to write their growth story, our timely and affordable credit empowers them to bring their dreams alive. As part of the TVS Group, we empower Indians from vario

Motilal Oswal Financial Services Ltd. (MOFSL) was founded in 1987 as a small sub-broking unit, with just 2 people running the show. Focus on a customer-first attitude, ethical and transparent business practices, respect for professionalism, research-based value investing, and implementation of cutti

Since 1820, Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future, and we aim to help people, businesses and society to grow by promoting a healthy a

J.P. Morgan is a leader in financial services, offering solutions to clients in more than 100 countries with one of the most comprehensive global product platforms available. We have been helping our clients to do business and manage their wealth for more than 200 years. Our business has been built
People are living longer, and we are excited about the possibilities this brings. We see longevity, aging, and changing life patterns as an opportunity for our customers, our employees, and society as a whole. And we want to support everyone in building the financial means to explore the possibiliti

We are Prudential. For Every Life, For Every Future. Prudential provides life and health insurance and asset management in Greater China, ASEAN, India and Africa. Prudential’s mission is to be the most trusted partner and protector for this generation and generations to come, by providing simple a
.png)
The European Commission has proposed new cybersecurity legislation mandating the removal of high-risk suppliers to secure telecommunications...
New EU cyber bill looks to root out risky Chinese technology vendors from tech supply chains across Europe.
Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions that masquerade as human resources (HR)...
Chrome adds new layered defenses to block prompt injections, restrict origin access, and prevent unsafe AI actions.
Agentic browsers are too risky for most organizations to use, according to analyst firm Gartner. The firm offered that advice last week in a...
Microsoft is improving Entra ID security by updating its Content Security Policy to stop external scripts from running during sign-ins.
The UK government has announced a significant £21 million investment to accelerate the development of CHERI, a new cyber-secure hardware capable...
Most cybersecurity strategies focus on firewalls, encryption and patch management. Yet one of the most damaging vulnerabilities often sits...
Edward H. Block is a senior counsel in Akin's cybersecurity, privacy and data protection practice in the Dallas office. He advises a broad range of companies on...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Block is https://block.xyz/.
According to Rankiteo, Block’s AI-generated cybersecurity score is 744, reflecting their Moderate security posture.
According to Rankiteo, Block currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Block has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Block is not certified under SOC 2 Type 1.
According to Rankiteo, Block does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Block is not listed as GDPR compliant.
According to Rankiteo, Block does not currently maintain PCI DSS compliance.
According to Rankiteo, Block is not compliant with HIPAA regulations.
According to Rankiteo,Block is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Block operates primarily in the Financial Services industry.
Block employs approximately 13,182 people worldwide.
Block presently has no subsidiaries across any sectors.
Block’s official LinkedIn profile has approximately 165,867 followers.
Block is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Block does not have a profile on Crunchbase.
Yes, Block maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/joinblock.
As of January 21, 2026, Rankiteo reports that Block has experienced 1 cybersecurity incidents.
Block has an estimated 30,814 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with delayed disclosure (4 months), communication strategy with regulatory filings, communication strategy with public statements via court proceedings..
Title: Block (Cash App) Data Breach and Shareholder Litigation Dismissal
Description: Block, led by Jack Dorsey, won the dismissal of litigation claiming it misled shareholders regarding a December 2021 data breach at its Cash App service. A former employee downloaded personal information of ~8.2 million users. Shareholders alleged Block failed to disclose inadequate data security and delayed breach notification by nearly four months. The company also faced accusations of misleading Afterpay shareholders during its $29B acquisition. Block previously settled AML-related charges for $80M (48 states) and $40M (New York).
Date Detected: 2021-12-10
Date Publicly Disclosed: 2022-04-04
Type: Data Breach
Attack Vector: Insider Threat (former employee)
Vulnerability Exploited: Inadequate data security controls / unauthorized access by insider
Threat Actor: Former employee
Motivation: Financial Gain (alleged by shareholders)Unauthorized Data Access
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Internal (former employee with authorized access).

Data Compromised: Personal information of ~8.2 million Cash App users
Brand Reputation Impact: LitigationRegulatory Settlements ($120M total)
Legal Liabilities: Shareholder litigation (dismissed)AML settlements ($80M + $40M)
Identity Theft Risk: High (personal information exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal information.

Entity Name: Block, Inc. (Cash App)
Entity Type: Public Company
Industry: Financial Services, Technology, Mobile Payments
Location: Oakland, California, USA
Size: Large (57M monthly users as of 2024)
Customers Affected: 8.2 million

Entity Name: Afterpay (acquired by Block)
Entity Type: Subsidiary
Industry: Financial Services (Buy Now, Pay Later)
Location: Australia

Communication Strategy: Delayed disclosure (4 months)Regulatory filingsPublic statements via court proceedings

Type of Data Compromised: Personal information
Number of Records Exposed: 8.2 million
Sensitivity of Data: High
Data Exfiltration: Yes (downloaded by former employee)
Personally Identifiable Information: Yes

Regulations Violated: Anti-Money Laundering (AML) policies, Potential securities disclosure violations (alleged),
Fines Imposed: ['$80 million (48 states)', '$40 million (New York)']
Legal Actions: Shareholder class-action litigation (dismissed), State regulatory settlements,
Regulatory Notifications: Delayed (disclosed 4 months post-breach)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Shareholder class-action litigation (dismissed), State regulatory settlements, .

Source: Reuters

Source: U.S. District Court, Southern District of New York (Case No. 22-08636)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Reuters, and Source: U.S. District Court, Southern District of New York (Case No. 22-08636).

Investigation Status: Closed (litigation dismissed; regulatory settlements reached)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Delayed Disclosure (4 Months), Regulatory Filings and Public Statements Via Court Proceedings.

Stakeholder Advisories: Court Filings, Regulatory Disclosures.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Court Filings and Regulatory Disclosures.

Entry Point: Internal (former employee with authorized access)
High Value Targets: Cash App user database
Data Sold on Dark Web: Cash App user database

Root Causes: Inadequate Data Security Controls, Insider Threat Risk Management Failure, Delayed Breach Disclosure,
Corrective Actions: Regulatory Settlements ($120M), Potential Internal Policy Reforms (Unspecified),
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Regulatory Settlements ($120M), Potential Internal Policy Reforms (Unspecified), .
Last Attacking Group: The attacking group in the last incident was an Former employee.
Most Recent Incident Detected: The most recent incident detected was on 2021-12-10.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-04-04.
Most Significant Data Compromised: The most significant data compromised in an incident was Personal information of ~8.2 million Cash App users.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal information of ~8.2 million Cash App users.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 8.2M.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $80 million (48 states), $40 million (New York), .
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Shareholder class-action litigation (dismissed), State regulatory settlements, .
Most Recent Source: The most recent source of information about an incident are U.S. District Court, Southern District of New York (Case No. 22-08636) and Reuters.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Closed (litigation dismissed; regulatory settlements reached).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Court filings, Regulatory disclosures, .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Internal (former employee with authorized access).
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.