Company Details
lgenergysolution
6,550
76,986
325
lgensol.com
0
LG _2166372
In-progress

LG Energy Solution Company CyberSecurity Posture
lgensol.comLG Energy Solutions leads the future eco-friendly energy industry by developing distinguished materials and next-generation batteries. As the only chemical-based battery company in the world, we are leading the global lithium-ion battery market based on distinguished materials technology. We have become a global powerhouse in the EV and energy storage system (ESS) battery sector. And based on our unparalleled technologies, we are actively developing new products and procuring global battery production capacities to enhance our dominance in the next-generation energy market.
Company Details
lgenergysolution
6,550
76,986
325
lgensol.com
0
LG _2166372
In-progress
Between 650 and 699

LES Global Score (TPRM)XXXX

Description: LG Energy Solution, a South Korean battery manufacturer specializing in lithium-ion batteries for electric vehicles (EVs) and energy storage systems, suffered a ransomware attack at one of its overseas facilities. The Akira ransomware group claimed responsibility, alleging the theft of **1.7TB of data**, including **employee records** (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails) and **corporate documents** (confidential projects, NDAs, financials, client/partner information, contracts). The impacted facility was restored to normal operations, but the stolen data—if verified—poses risks of **phishing attacks**, **black-market sales**, or **further exploitation**. The headquarters and other facilities remained unaffected, though investigations are ongoing. The breach’s scale and the sensitivity of the leaked employee and corporate data heighten concerns over financial fraud, reputational damage, and operational disruptions.
Description: LG Energy Solution, a South Korea-based subsidiary of LG and one of the world’s largest battery manufacturers (earning $17.5 billion in 2024), confirmed a ransomware attack targeting a specific overseas facility. The Akira ransomware gang claimed responsibility, asserting they stole **1.7 terabytes of data**, including **corporate documents and employee databases**. While the headquarters and other facilities remained unaffected, the incident disrupted operations at the targeted site, requiring recovery measures before normal functionality resumed. The FBI had previously flagged Akira for its aggressive tactics, noting over **$244 million in ransom proceeds** and disruptions across critical sectors like manufacturing, hospitals, and schools. The attack underscores the growing threat to battery suppliers, following similar incidents like Varta AG’s weeks-long outage in 2023 and a $60 million theft from another key material supplier in 2024. LG is conducting investigations but has not disclosed further details about the breach’s scope or potential ransom demands.


LG Energy Solution has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.
LG Energy Solution has 56.25% more incidents than the average of all companies with at least one recorded incident.
LG Energy Solution reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
LES cyber incidents detection timeline including parent company and subsidiaries

LG Energy Solutions leads the future eco-friendly energy industry by developing distinguished materials and next-generation batteries. As the only chemical-based battery company in the world, we are leading the global lithium-ion battery market based on distinguished materials technology. We have become a global powerhouse in the EV and energy storage system (ESS) battery sector. And based on our unparalleled technologies, we are actively developing new products and procuring global battery production capacities to enhance our dominance in the next-generation energy market.


Airgas, an Air Liquide company, is a leading U.S. supplier of industrial, medical and specialty gases, as well as hardgoods and related products; one of the largest U.S. suppliers of safety products; and a leading U.S. supplier of ammonia products and process chemicals. Dedicated to improving the

The Asahi Kasei Group contributes to life and living for people around the world. Since its foundation in 1922 with ammonia and cellulose fiber business, Asahi Kasei has consistently grown through the proactive transformation of its business portfolio to meet the evolving needs of every age. With mo

Givaudan is a global leader in Fragrance & Beauty and Taste & Wellbeing. We celebrate the beauty of human experience by creating for happier, healthier lives with love for nature. Together with our customers we deliver food experiences, craft inspired fragrances, and develop beauty and wellbeing sol
At BASF, we create chemistry for a sustainable future. Our ambition: We want to be the preferred chemical company to enable our customers’ green transformation. We combine economic success with environmental protection and social responsibility. Around 112,000 employees in the BASF Group contribute

UralChem is a leading producer of nitrogen and phosphate fertilizers in Russia/CIS with production capacities of over 2.7 million tonnes of ammonium nitrate, 2.2 million tonnes of ammonia, 0.8 million tonnes of MAP and DAP, 0.8 million tonnes of complex fertilizers and 0.5 million tonnes of urea. Ur

Founded in 1920, Eastman is a global specialty materials company that produces a broad range of products found in items people use every day. With the purpose of enhancing the quality of life in a material way, Eastman works with customers to deliver innovative products and solutions while maintaini
We are a global manufacturer of raw materials and a producer of energy used in everyday life. From medicines to mobile phones, agriculture to automotive, our products enhance standards of living for everyone around the world. We understand the challenge the world is facing, and we are working hard
Evonik is one of the world’s leading specialty chemicals companies. While we don’t produce electric cars, aircraft, medications or 3D printers, Evonik is part and parcel of these and many other end products. That’s because we contribute the small things that make a big difference. We make electric c
Linde is a leading global industrial gases and engineering company with 2023 sales of $33 billion. We live our mission of making our world more productive every day by providing high-quality solutions, technologies and services which are making our customers more successful and helping to sustain, d
.png)
LG Energy Solution, a leading South Korean battery manufacturer with global operations, confirmed a significant ransomware incident...
LG Energy Solution, one of the world's largest battery manufacturers, confirmed it had been hit by a ransomware attack after a cybercriminal...
UK intelligence agency MI5 has issued a warning about Chinese spies using fake headhunter profiles to recruit individuals with government...
A "specific overseas facility" fell prey to a ransomware attack but is now operating normally, according to LG Energy Solution — the South...
The Akira hacking group claims to have breached LG Energy Solution, alleging the theft of 1.7 TB of sensitive data, including employee and...
In the rapidly evolving landscape of technology, 2025 is poised to be a pivotal year where artificial intelligence, quantum computing,...
LG Energy Solution today announced a strategic partnership with South 8 Technologies to jointly develop space-rated lithium-ion batteries...
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
LG Uplus, one of South Korea's largest telecoms, reported a suspected data breach to the country's cybersecurity agency KISA,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of LG Energy Solution is https://www.lgensol.com/en/index.
According to Rankiteo, LG Energy Solution’s AI-generated cybersecurity score is 690, reflecting their Weak security posture.
According to Rankiteo, LG Energy Solution currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, LG Energy Solution is not certified under SOC 2 Type 1.
According to Rankiteo, LG Energy Solution does not hold a SOC 2 Type 2 certification.
According to Rankiteo, LG Energy Solution is not listed as GDPR compliant.
According to Rankiteo, LG Energy Solution does not currently maintain PCI DSS compliance.
According to Rankiteo, LG Energy Solution is not compliant with HIPAA regulations.
According to Rankiteo,LG Energy Solution is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
LG Energy Solution operates primarily in the Chemical Manufacturing industry.
LG Energy Solution employs approximately 6,550 people worldwide.
LG Energy Solution presently has no subsidiaries across any sectors.
LG Energy Solution’s official LinkedIn profile has approximately 76,986 followers.
LG Energy Solution is classified under the NAICS code 325, which corresponds to Chemical Manufacturing.
Yes, LG Energy Solution has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/lg-energy-solution.
Yes, LG Energy Solution maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lgenergysolution.
As of November 27, 2025, Rankiteo reports that LG Energy Solution has experienced 2 cybersecurity incidents.
LG Energy Solution has an estimated 4,119 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with isolation of affected facility, and remediation measures with security measures implemented, remediation measures with investigation conducted, and recovery measures with facility restored to normal operations, and communication strategy with public statement confirming attack, communication strategy with limited details shared, and and containment measures with isolation of affected facility, containment measures with mitigation of attack spread, and remediation measures with recovery of impacted systems, remediation measures with security operations enhancement, and recovery measures with restoration of facility operations to normal, and communication strategy with public statement confirming attack and mitigation, communication strategy with no further details disclosed during investigation, and enhanced monitoring with precautionary security operations ongoing..
Title: LG Energy Solution Ransomware Attack by Akira Gang
Description: LG Energy Solution, one of the world’s largest battery makers, confirmed a ransomware attack by the Akira gang, which claimed to have stolen 1.7 TB of data, including corporate documents and employee databases. The attack targeted a specific overseas facility, which has since been recovered and is operating normally. The company is conducting security investigations as a precautionary measure.
Type: ransomware
Threat Actor: Akira ransomware gang
Motivation: financial gaindata theft
Title: Ransomware Attack on LG Energy Solution Overseas Facility
Description: LG Energy Solution, a South Korean battery manufacturer and subsidiary of LG, confirmed a ransomware attack targeting one of its overseas facilities. The attack was mitigated, and the facility is now operational. The Akira ransomware group claimed responsibility, alleging the theft of ~1.7TB of data, including employee records, corporate documents, and SQL databases. The stolen data could be used for phishing or sold on the dark web for significant profit. LG is investigating the incident but has not confirmed the extent of the breach.
Type: ransomware
Threat Actor: Akira
Motivation: financial gaindata theft
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Corporate documents, Employee information databases
Systems Affected: specific overseas facility
Operational Impact: temporary disruption (facility recovered and operating normally)
Brand Reputation Impact: potential reputational damage due to data breach and ransomware association
Identity Theft Risk: high (employee information compromised)

Data Compromised: Employee personal information (visas, us/korean passports, medical documents, korean id cards, addresses, phones, emails), Confidential projects, Ndas, Confidentiality agreements, Detailed financials, Client/partner information, Contracts, Sql databases
Systems Affected: one specific overseas facility
Operational Impact: Facility temporarily disrupted; now restored to normal operations
Brand Reputation Impact: Potential reputational damage due to data exposure and ransomware association
Identity Theft Risk: High (due to exposure of PII like passports, ID cards, medical records)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Corporate Documents, Employee Information, , Employee Pii, Corporate Documents, Financial Records, Contracts, Ndas, Sql Databases and .

Entity Name: LG Energy Solution
Entity Type: subsidiary (of LG Corp)
Industry: battery manufacturing
Location: South Korea (HQ)overseas facility (unspecified)facilities in North America (8) and other continents
Size: large (global, $17.5B revenue in 2024)

Entity Name: LG Energy Solution
Entity Type: Subsidiary (of LG Corporation)
Industry: automotive (EV batteries), energy storage systems, consumer electronics
Location: South Korea
Size: Large (global operations, $17B+ revenue in 2024)

Incident Response Plan Activated: True
Containment Measures: isolation of affected facility
Remediation Measures: security measures implementedinvestigation conducted
Recovery Measures: facility restored to normal operations
Communication Strategy: public statement confirming attacklimited details shared

Incident Response Plan Activated: True
Containment Measures: Isolation of affected facilityMitigation of attack spread
Remediation Measures: Recovery of impacted systemsSecurity operations enhancement
Recovery Measures: Restoration of facility operations to normal
Communication Strategy: Public statement confirming attack and mitigationNo further details disclosed during investigation
Enhanced Monitoring: Precautionary security operations ongoing

Type of Data Compromised: Corporate documents, Employee information
Sensitivity of Data: high (employee PII and corporate data)

Type of Data Compromised: Employee pii, Corporate documents, Financial records, Contracts, Ndas, Sql databases
Sensitivity of Data: High (includes passports, medical records, financials, confidential agreements)
Data Exfiltration: Claimed: ~1.7TB (1.67TB corporate documents + 46GB SQL databases)
File Types Exposed: documentsdatabases (SQL)PDFs (likely for contracts/NDAs)image files (scans of passports/ID cards)
Personally Identifiable Information: full namespassport numbersKorean ID numbersaddressesphone numbersemail addressesmedical documentsvisa information
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: security measures implemented, investigation conducted, , Recovery of impacted systems, Security operations enhancement, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of affected facility, , isolation of affected facility, mitigation of attack spread and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through facility restored to normal operations, , Restoration of facility operations to normal, .

Source: FBI Advisory on Akira Ransomware
Date Accessed: 2023-11-13

Source: LG Energy Solution Spokesperson Statement

Source: Akira Ransomware Leak Site

Source: The Record

Source: TechRadar
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: FBI Advisory on Akira RansomwareDate Accessed: 2023-11-13, and Source: LG Energy Solution Spokesperson Statement, and Source: Akira Ransomware Leak Site, and Source: The Record, and Source: TechRadar.

Investigation Status: ongoing (precautionary security operations and investigations)

Investigation Status: Ongoing (LG Energy Solution conducting security operations and investigations)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statement Confirming Attack, Limited Details Shared, Public Statement Confirming Attack And Mitigation and No Further Details Disclosed During Investigation.

High Value Targets: Employee Databases, Corporate Documents,
Data Sold on Dark Web: Employee Databases, Corporate Documents,

High Value Targets: Employee Databases, Financial Records, Confidential Agreements,
Data Sold on Dark Web: Employee Databases, Financial Records, Confidential Agreements,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Precautionary security operations ongoing.
Last Attacking Group: The attacking group in the last incident were an Akira ransomware gang and Akira.
Most Significant Data Compromised: The most significant data compromised in an incident were corporate documents, employee information databases, , employee personal information (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails), confidential projects, NDAs, confidentiality agreements, detailed financials, client/partner information, contracts, SQL databases and .
Most Significant System Affected: The most significant system affected in an incident was specific overseas facility and one specific overseas facility.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were isolation of affected facility and Isolation of affected facilityMitigation of attack spread.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were client/partner information, employee personal information (visas, US/Korean passports, medical documents, Korean ID cards, addresses, phones, emails), NDAs, detailed financials, contracts, SQL databases, corporate documents, confidentiality agreements, confidential projects and employee information databases.
Most Recent Source: The most recent source of information about an incident are The Record, Akira Ransomware Leak Site, FBI Advisory on Akira Ransomware, LG Energy Solution Spokesperson Statement and TechRadar.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (precautionary security operations and investigations).
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.