KOMSCO (한국조폐공사) Company Cyber Security Posture

komsco.com

Since 1951, Korea Minting, Security Printing & ID Card Operating Corporation (KOMSCO) has been at the forefront of safeguarding the future. As South Korea's leading state-owned enterprise, we craft high-value products, including currency, ID cards, and security documents, that are essential to the nation’s economy and infrastructure. Our commitment to cutting-edge technology and unwavering quality has made us a trusted partner, both at home and abroad. But we’re not just about tradition—we’re about transformation. KOMSCO is pioneering the future with digital currency, blockchain technology, and sustainable production practices that redefine global standards. Our dedication to innovation and social responsibility ensures that we’re not only protecting what matters today but also building a safer, more secure tomorrow. Follow us to stay updated on how we’re driving the future of security and innovation. Discover opportunities, insights, and the latest developments that set KOMSCO apart in the global marketplace. Together, we can create a world where safety and trust are never compromised. Ready to explore the future with us? Follow KOMSCO now and be part of our journey.

KOMSCO (한국조폐공사) Company Details

Linkedin ID:

komsco

Employees number:

21 employees

Number of followers:

864.0

NAICS:

339

Industry Type:

Manufacturing

Homepage:

komsco.com

IP Addresses:

Scan still pending

Company ID:

KOM_1184491

Scan Status:

In-progress

AI scoreKOMSCO (한국조폐공사) Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreKOMSCO (한국조폐공사) Global Score
blurone
Ailogo

KOMSCO (한국조폐공사) Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

KOMSCO (한국조폐공사) Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
South Korean Postal ServiceRansomware10058/2025KOM917080725Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The North Korean state-sponsored APT group ScarCruft launched a sophisticated malware campaign targeting South Korean users through a deceptive postal-code update notice. The attack involved a multi-stage infection process, including the deployment of ransomware (VCD Ransomware) alongside traditional espionage tools. The campaign utilized advanced techniques such as Rust-based backdoors and legitimate real-time messaging services for command-and-control, marking a significant evolution in ScarCruft's operational capabilities. The attack compromised user data and introduced ransomware, posing a severe threat to both financial and operational security.

KOMSCO (한국조폐공사) Company Subsidiaries

SubsidiaryImage

Since 1951, Korea Minting, Security Printing & ID Card Operating Corporation (KOMSCO) has been at the forefront of safeguarding the future. As South Korea's leading state-owned enterprise, we craft high-value products, including currency, ID cards, and security documents, that are essential to the nation’s economy and infrastructure. Our commitment to cutting-edge technology and unwavering quality has made us a trusted partner, both at home and abroad. But we’re not just about tradition—we’re about transformation. KOMSCO is pioneering the future with digital currency, blockchain technology, and sustainable production practices that redefine global standards. Our dedication to innovation and social responsibility ensures that we’re not only protecting what matters today but also building a safer, more secure tomorrow. Follow us to stay updated on how we’re driving the future of security and innovation. Discover opportunities, insights, and the latest developments that set KOMSCO apart in the global marketplace. Together, we can create a world where safety and trust are never compromised. Ready to explore the future with us? Follow KOMSCO now and be part of our journey.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=komsco' -H 'apikey: YOUR_API_KEY_HERE'
newsone

KOMSCO (한국조폐공사) Cyber Security News

2025-08-10T13:00:01.000Z
AI agents are being drafted into the cyber defense forces of corporations

Cybersecurity AI agents are on the rise as hacker use of artificial intelligence becomes more sophisticated. AI-generated video and voice ...

2025-08-11T05:54:00.000Z
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day vulnerability.

2025-08-10T07:35:00.000Z
After $400M exit, Medigate’s founders launch new cybersecurity startup

The stealth venture, currently named ACT, has raised $20 million in Seed funding from Team8 and Bessemer to tackle cloud risks.

2025-08-09T12:00:34.000Z
How Chicago Sky aim to ‘take the power back’ against online abuse and harassment with new cybersecurity measures

WNBA players face a heightened vulnerability to online abuse and other harassment. The Chicago Sky are seeking to insulate their players ...

2025-08-08T17:24:13.000Z
HPE Unveils Powerful AI Cybersecurity Tools After Juniper Deal

Hewlett-Packard Enterprise Company (NYSE:HPE) is one of the Top AI Stocks Taking Wall Street by Storm. On August 5, the company announced ...

2025-08-09T10:45:00.000Z
#DEFCON: AI Cyber Challenge Winners Revealed in DARPA’s $4M Cybersecurity Showdown

Team Atlanta was revealed as the winning team. The group is a powerhouse collaboration of experts from the Georgia Institute of Technology ( ...

2025-08-11T01:54:41.000Z
University of Western Australia suffers major data breach, staff and students locked out

The University of Western Australia is investigating a cyber attack that exposed thousands of staff and student passwords.

2025-08-11T09:13:34.000Z
Why effective exposure management is key to cybersecurity [Q&A]

MR: Traditional vulnerability management focuses on fixing issues based on technical severity scores, primarily targeting software and hardware.

2025-08-10T11:59:00.000Z
DEF CON hackers plug security holes in US water systems amid tsunami of threats

The volunteers were deployed across five water systems in four states — Indiana, Oregon, Utah, and Vermont — and provided no-cost assistance ...

similarCompanies

KOMSCO (한국조폐공사) Similar Companies

AB InBev

As a company, we dream big to create a future with more cheers. We are always looking to serve up new ways to meet life’s moments, move our industry forward and make a meaningful impact in the world. We are committed to building great brands that stand the test of time and to brewing the best beers

Vorwerk Group

For more than 140 years, Vorwerk has been an internationally active family-owned company focused on improving life everywhere we call home. Our superior products and services come with a human touch, from the way we develop and sell them, to the way they are used. Today, more than 100.000 people i

Schaeffler

The Schaeffler Group has been driving forward groundbreaking inventions and developments in the field of motion technology for over 75 years. With innovative technologies, products, and services for electric mobility, CO₂-efficient drives, chassis solutions and renewable energies, the company is a r

Newell Brands

Newell Brands (NASDAQ: NWL) is a leading global consumer goods company with a strong portfolio of well-known brands, including Rubbermaid, Sharpie, Graco, Coleman, Rubbermaid Commercial Products, Yankee Candle, Paper Mate, FoodSaver, Dymo, EXPO, Elmer’s, Oster, NUK, Spontex and Campingaz. We are f

Henkel

Henkel operates worldwide with leading innovations, brands and technologies in two business areas: Adhesive Technologies and Consumer Brands. Founded in 1876, Henkel looks back on more than 145 years of success. The company holds leading positions with its two business units in both industrial and

Prysmian

Prysmian is a global cabling solutions provider leading the energy transition and digital transformation. By leveraging its wide geographical footprint and extensive product range, its track record of technological leadership and innovation, and a strong customer base, the company is well-placed to

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

KOMSCO (한국조폐공사) CyberSecurity History Information

How many cyber incidents has KOMSCO (한국조폐공사) faced?

Total Incidents: According to Rankiteo, KOMSCO (한국조폐공사) has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at KOMSCO (한국조폐공사)?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Malware Campaign, Ransomware, Espionage

Title: ScarCruft Malware Campaign Targeting South Korean Users

Description: The North Korean state-sponsored Advanced Persistent Threat (APT) group ScarCruft has launched a sophisticated new malware campaign targeting South Korean users through a deceptive postal-code update notice. This campaign includes ransomware and advanced espionage tools, showcasing significant evolution in the group's operational capabilities.

Type: Malware Campaign, Ransomware, Espionage

Attack Vector: Malicious LNK file embedded in a RAR archive, disguised as a postal service notification

Threat Actor: ScarCruft (APT group), ChinopuNK (subgroup)

Motivation: Espionage, Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Malicious LNK file in a RAR archive.

Impact of the Incidents

Which entities were affected by each incident?

Incident : Malware Campaign, Ransomware, Espionage KOM917080725

Entity Type: Individuals, Organizations

Location: South Korea

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Malware Campaign, Ransomware, Espionage KOM917080725

Ransomware Strain: VCD Ransomware

Data Encryption: Files encrypted with .VCD extension

References

Where can I find more information about each incident?

Incident : Malware Campaign, Ransomware, Espionage KOM917080725

Source: Medium

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Medium.

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Malware Campaign, Ransomware, Espionage KOM917080725

Entry Point: Malicious LNK file in a RAR archive

Backdoors Established: NubSpy, CHILLYCHINO

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an ScarCruft (APT group) and ChinopuNK (subgroup).

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is Medium.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Malicious LNK file in a RAR archive.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge