Company Details
merck
42,297
2,549,401
3254
merck.com
0
MER_3024671
In-progress

Merck Company CyberSecurity Posture
merck.comAt Merck, known as MSD outside of the United States and Canada, we are unified around our purpose: We use the power of leading-edge science to save and improve lives around the world. For more than 130 years, we have brought hope to humanity through the development of important medicines and vaccines. We aspire to be the premier research-intensive biopharmaceutical company in the world – and today, we are at the forefront of research to deliver innovative health solutions that advance the prevention and treatment of diseases in people and animals. We foster a diverse and inclusive global workforce and operate responsibly every day to enable a safe, sustainable and healthy future for all people and communities. For more information, visit www.merck.com. This site is intended for residents of the United States and Canada and their territories only. FLS: http://merck.us/3TKXNuZ
Company Details
merck
42,297
2,549,401
3254
merck.com
0
MER_3024671
In-progress
Between 800 and 849

Merck Global Score (TPRM)XXXX

Description: On September 22, 2025, Merck, a New Jersey-based pharmaceutical company, was alerted that its third-party service provider, Graebel Companies, suffered a **data breach** exposing sensitive personal and financial information of current and former employees. The compromised data includes **names, dates of birth, addresses, phone numbers, Social Security numbers, and financial account details**, heightening risks of identity theft and fraud.The breach was formally disclosed to the Massachusetts Attorney General’s office on November 17, 2025, though the exact number of affected individuals remains undetermined. Merck collaborated with Graebel to contain the incident, strengthen security measures, and notify impacted employees. As a remedial step, Merck is providing **24 months of complimentary credit monitoring and identity theft protection** via TransUnion.The exposure of **personally identifiable information (PII) and financial records**—particularly through a third-party vendor—underscores vulnerabilities in supply chain cybersecurity and the potential for long-term reputational and financial harm to both employees and the company.
Description: The computer systems of Science and Technology company Merck were targeted in a sophisticated cyber-attack. The company immediately took preventive steps to contain the attack and informed its employees to disconnect mobile phones from the network.


Merck has 25.0% more incidents than the average of same-industry companies with at least one recorded incident.
Merck has 29.87% more incidents than the average of all companies with at least one recorded incident.
Merck reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Merck cyber incidents detection timeline including parent company and subsidiaries

At Merck, known as MSD outside of the United States and Canada, we are unified around our purpose: We use the power of leading-edge science to save and improve lives around the world. For more than 130 years, we have brought hope to humanity through the development of important medicines and vaccines. We aspire to be the premier research-intensive biopharmaceutical company in the world – and today, we are at the forefront of research to deliver innovative health solutions that advance the prevention and treatment of diseases in people and animals. We foster a diverse and inclusive global workforce and operate responsibly every day to enable a safe, sustainable and healthy future for all people and communities. For more information, visit www.merck.com. This site is intended for residents of the United States and Canada and their territories only. FLS: http://merck.us/3TKXNuZ


Mankind Pharma, one of the top 5 leading pharmaceutical companies in India, started its journey in 1995. Today, we have an employee base of over 20,000 and are racing towards $1 Billion. At Mankind, we aspire to aid the community in leading a healthy life by formulating, developing, commercializing,

Intas is one of the leading multinational pharmaceutical formulation development, manufacturing, and marketing organization in the world. It has been growing at 19% CAGR and crossed the $2.5 billion mark in the past financial year. The company has set up a network of subsidiaries, under the name Acc

Astellas is a global life sciences company committed to turning innovative science into VALUE for patients. We provide transformative therapies in disease areas that include oncology, ophthalmology, urology, immunology and women's health. Through our research and development programs, we are pioneer

As a global healthcare company, Fresenius Kabi is Committed to Life. The company’s products, technologies, and services are used for the therapy and care of critically and chronically ill patients. With over 41,000 employees and present in over 100 countries, Fresenius Kabi’s expansive product portf
The world’s leading animal health company. Zoetis is driven by a singular purpose: to nurture our world and humankind by advancing care for animals. We’ve been innovating ways to predict, prevent, detect, and treat animal illness for over 70 years, and we continue to stand by those raising and cari

At UCB, we believe everyone deserves to live the best life they can - as free as possible from the challenges and uncertainty of disease. Our purpose is to support people living with severe central nervous system and immunological conditions by delivering meaningful solutions that go beyond medicine

We strive to transform lives. While the science we advance is constantly evolving, our core purpose is enduring. For more than two centuries, our values have guided us to do what’s right for patients and for society. We know that changing lives requires us to do things differently. We start by list

Grifols is a global healthcare company founded in Barcelona in 1909 committed to improving the health and well-being of people all over the world. A leader in essential plasma-derived medicines and transfusion medicine, we develop, produce and provide innovative healthcare services and solutions i

At Janssen, we never stop working toward a future where disease is a thing of the past. We’re the Pharmaceutical Companies of Johnson & Johnson, and you can count on us to keep working tirelessly to make that future a reality for patients everywhere, by fighting sickness with science, improving ac
.png)
If you were affected by the Merck data breach, you may be entitled to compensation.
Merck seen nearing acquisition of Cidara Therapeutics in deal potentially above $3.3 billion. U.S., Argentina to open markets to key...
Boards seeking consistent returns and strategic innovation might not need to look outside the organization for their next growth driver.
DEEP and Merck launch strategic partnership to strengthen Europe's cybersecurity. Martha Ihlbrock Corporate Communications
Michelle Xia gained experience at U.S. pharmaceutical firms before launching her own biotech company back home in China.
Merck's recent acquisition announcement sends a strong signal regarding its urgency to tackle the impending Keytruda patent cliff.
Lee cómo FTI Consulting proporcionó apoyo estratégico y legal en un proyecto Pro Bono para establecer un tribunal internacional especial para Ucrania.
Merck's upside potential depends on its capability to execute across several vital areas: successfully moving its pipeline forward, expanding into new regions,...
Merck's (NYSE:MRK) top-selling drug – Keytruda's – impressive recent growth tells a compelling story, but it's one with a predictable ending...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Merck is http://merck.us/2J2xAUh.
According to Rankiteo, Merck’s AI-generated cybersecurity score is 801, reflecting their Good security posture.
According to Rankiteo, Merck currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Merck is not certified under SOC 2 Type 1.
According to Rankiteo, Merck does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Merck is not listed as GDPR compliant.
According to Rankiteo, Merck does not currently maintain PCI DSS compliance.
According to Rankiteo, Merck is not compliant with HIPAA regulations.
According to Rankiteo,Merck is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Merck operates primarily in the Pharmaceutical Manufacturing industry.
Merck employs approximately 42,297 people worldwide.
Merck presently has no subsidiaries across any sectors.
Merck’s official LinkedIn profile has approximately 2,549,401 followers.
Merck is classified under the NAICS code 3254, which corresponds to Pharmaceutical and Medicine Manufacturing.
No, Merck does not have a profile on Crunchbase.
Yes, Merck maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/merck.
As of December 13, 2025, Rankiteo reports that Merck has experienced 2 cybersecurity incidents.
Merck has an estimated 5,425 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with disconnect mobile phones from the network, and and third party assistance with collaboration with graebel companies, and containment measures with implemented by graebel companies, and remediation measures with enhanced security protocols by graebel, and communication strategy with direct communication with affected individuals..
Title: Cyber-Attack on Merck
Description: The computer systems of Science and Technology company Merck were targeted in a sophisticated cyber-attack.
Type: Cyber-Attack
Title: Data Breach at Merck via Third-Party Service Provider Graebel Companies
Description: On Sept. 22, 2025, Merck Sharp & Dohme LLC (Merck) was notified that its U.S.-based service provider, Graebel Companies, experienced a data breach exposing sensitive personal information of current and former Merck employees. The breach was disclosed to the Massachusetts Attorney General’s office on Nov. 17, 2025. Compromised data may include names, dates of birth, addresses, phone numbers, Social Security numbers, and financial account information, putting individuals at risk for identity theft and fraud.
Date Detected: 2025-09-22
Date Publicly Disclosed: 2025-11-17
Type: Data Breach (Third-Party)
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Dates of birth, Addresses, Phone numbers, Social security numbers, Financial account information
Brand Reputation Impact: Potential reputational harm due to exposure of sensitive employee data
Identity Theft Risk: High (due to exposure of PII and financial information)
Payment Information Risk: High (financial account information exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Financial Information and .

Entity Name: Merck
Entity Type: Company
Industry: Science and Technology

Entity Name: Merck Sharp & Dohme LLC
Entity Type: Pharmaceutical Company
Industry: Healthcare/Pharmaceutical
Location: New Jersey, USA

Entity Name: Graebel Companies
Entity Type: Service Provider
Industry: Relocation/Logistics
Location: USA
Customers Affected: Current and former Merck employees (number unknown, potentially significant)

Containment Measures: Disconnect mobile phones from the network

Incident Response Plan Activated: True
Third Party Assistance: Collaboration with Graebel Companies
Containment Measures: Implemented by Graebel Companies
Remediation Measures: Enhanced security protocols by Graebel
Communication Strategy: Direct communication with affected individuals
Third-Party Assistance: The company involves third-party assistance in incident response through Collaboration with Graebel Companies.

Type of Data Compromised: Personally identifiable information (pii), Financial information
Number of Records Exposed: Unknown (potentially significant)
Sensitivity of Data: High (includes SSNs and financial account information)
Personally Identifiable Information: NamesDates of birthAddressesPhone numbersSocial Security numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced security protocols by Graebel.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnect mobile phones from the network, and implemented by graebel companies.

Regulatory Notifications: Disclosed to Massachusetts Attorney General’s office

Recommendations: Monitor credit and financial accounts for suspicious activity, Enroll in complimentary credit monitoring and identity theft protection services (provided by TransUnion for 24 months)Monitor credit and financial accounts for suspicious activity, Enroll in complimentary credit monitoring and identity theft protection services (provided by TransUnion for 24 months)

Source: Massachusetts Attorney General’s Office Disclosure
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Massachusetts Attorney General’s Office Disclosure.

Investigation Status: Ongoing (scope and full impact not yet determined)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Direct communication with affected individuals.

Stakeholder Advisories: Direct notifications sent to affected individuals
Customer Advisories: Public disclosure via regulatory notification; individual notifications sent to affected employees
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Direct notifications sent to affected individuals and Public disclosure via regulatory notification; individual notifications sent to affected employees.

Corrective Actions: Enhanced Security Protocols By Graebel Companies, Credit Monitoring And Identity Theft Protection Services For Affected Individuals,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Collaboration with Graebel Companies.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Security Protocols By Graebel Companies, Credit Monitoring And Identity Theft Protection Services For Affected Individuals, .
Most Recent Incident Detected: The most recent incident detected was on 2025-09-22.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-17.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of birth, Addresses, Phone numbers, Social Security numbers, Financial account information and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Collaboration with Graebel Companies.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Disconnect mobile phones from the network and Implemented by Graebel Companies.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Phone numbers, Dates of birth, Financial account information, Addresses and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enroll in complimentary credit monitoring and identity theft protection services (provided by TransUnion for 24 months) and Monitor credit and financial accounts for suspicious activity.
Most Recent Source: The most recent source of information about an incident is Massachusetts Attorney General’s Office Disclosure.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (scope and full impact not yet determined).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Direct notifications sent to affected individuals, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Public disclosure via regulatory notification; individual notifications sent to affected employees.
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.