ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Merkle, a dentsu company, powers the experience economy. For more than 35 years, the company has put people at the heart of its approach to digital business transformation. As the only integrated experience consultancy in the world with a heritage in data science and business performance, Merkle delivers holistic, end-to-end experiences that drive growth, engagement, and loyalty. Merkle’s expertise has earned recognition as a “Leader” by top industry analyst firms, in categories such as digital transformation and commerce, experience design, engineering and technology integration, digital marketing, data science, CRM and loyalty, and customer data management. With more than 16,000 employees, Merkle operates in 30+ countries throughout the Americas, EMEA, and APAC.

Merkle A.I CyberSecurity Scoring

Merkle

Company Details

Linkedin ID:

merkle

Employees number:

5,889

Number of followers:

215,902

NAICS:

5416

Industry Type:

Business Consulting and Services

Homepage:

merkle.com

IP Addresses:

0

Company ID:

MER_2982662

Scan Status:

In-progress

AI scoreMerkle Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/merkle.jpeg
Merkle Business Consulting and Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMerkle Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/merkle.jpeg
Merkle Business Consulting and Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Merkle Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Dentsu (Merkle)Cyber Attack85311/2025
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Dentsu’s customer experience unit, **Merkle**, suffered a **cyberattack** resulting in the theft of **sensitive employee data**, including bank/payroll details, salaries, National Insurance numbers, and contact information for **current and former employees** (some dating back over a decade). The breach triggered legal action, with over **150 ex-employees** organizing via WhatsApp to pursue group litigation, alleging Dentsu’s failure to implement adequate security or comply with data retention policies. The UK’s **Information Commissioner’s Office (ICO)** is investigating, with potential fines up to **2% of global turnover** or multi-million-dollar penalties. While Dentsu engaged cybersecurity firms and offered credit/dark-web monitoring, affected individuals report **unclear communication** about exposed data, heightening fraud risks. The incident compounds Dentsu’s reputational and financial strain, coinciding with an unrelated **money-laundering probe** in India linked to a third-party acquisition (InDeed), though no direct connection to the Merkle breach was established.

Merkle (Dentsu’s US subsidiary)Cyber Attack85410/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Merkle, a US-based subsidiary of the Japanese multinational advertising giant Dentsu, suffered a cyberattack resulting in the exposure of sensitive data. The breach compromised files containing personal, payroll, and National Insurance details of current and former employees, as well as supplier and client data. The company took immediate action by shutting down certain systems to contain the attack and initiated an investigation with external cybersecurity experts. While the financial impact remains unclear, affected individuals are being notified and offered free dark web monitoring. The attack did not affect Dentsu’s systems in Japan, but the scale of the breach raises concerns given Merkle’s global workforce of over 16,000 employees and annual revenue of approximately $1.5 billion. No ransomware group has claimed responsibility, leaving the attack method unspecified beyond confirmation of data exfiltration.

Dentsu (Merkle)
Cyber Attack
Severity: 85
Impact: 3
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Dentsu’s customer experience unit, **Merkle**, suffered a **cyberattack** resulting in the theft of **sensitive employee data**, including bank/payroll details, salaries, National Insurance numbers, and contact information for **current and former employees** (some dating back over a decade). The breach triggered legal action, with over **150 ex-employees** organizing via WhatsApp to pursue group litigation, alleging Dentsu’s failure to implement adequate security or comply with data retention policies. The UK’s **Information Commissioner’s Office (ICO)** is investigating, with potential fines up to **2% of global turnover** or multi-million-dollar penalties. While Dentsu engaged cybersecurity firms and offered credit/dark-web monitoring, affected individuals report **unclear communication** about exposed data, heightening fraud risks. The incident compounds Dentsu’s reputational and financial strain, coinciding with an unrelated **money-laundering probe** in India linked to a third-party acquisition (InDeed), though no direct connection to the Merkle breach was established.

Merkle (Dentsu’s US subsidiary)
Cyber Attack
Severity: 85
Impact: 4
Seen: 10/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Merkle, a US-based subsidiary of the Japanese multinational advertising giant Dentsu, suffered a cyberattack resulting in the exposure of sensitive data. The breach compromised files containing personal, payroll, and National Insurance details of current and former employees, as well as supplier and client data. The company took immediate action by shutting down certain systems to contain the attack and initiated an investigation with external cybersecurity experts. While the financial impact remains unclear, affected individuals are being notified and offered free dark web monitoring. The attack did not affect Dentsu’s systems in Japan, but the scale of the breach raises concerns given Merkle’s global workforce of over 16,000 employees and annual revenue of approximately $1.5 billion. No ransomware group has claimed responsibility, leaving the attack method unspecified beyond confirmation of data exfiltration.

Ailogo

Merkle Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Merkle

Incidents vs Business Consulting and Services Industry Average (This Year)

Merkle has 143.9% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Merkle has 212.5% more incidents than the average of all companies with at least one recorded incident.

Incident Types Merkle vs Business Consulting and Services Industry Avg (This Year)

Merkle reported 2 incidents this year: 2 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Merkle (X = Date, Y = Severity)

Merkle cyber incidents detection timeline including parent company and subsidiaries

Merkle Company Subsidiaries

SubsidiaryImage

Merkle, a dentsu company, powers the experience economy. For more than 35 years, the company has put people at the heart of its approach to digital business transformation. As the only integrated experience consultancy in the world with a heritage in data science and business performance, Merkle delivers holistic, end-to-end experiences that drive growth, engagement, and loyalty. Merkle’s expertise has earned recognition as a “Leader” by top industry analyst firms, in categories such as digital transformation and commerce, experience design, engineering and technology integration, digital marketing, data science, CRM and loyalty, and customer data management. With more than 16,000 employees, Merkle operates in 30+ countries throughout the Americas, EMEA, and APAC.

Loading...
similarCompanies

Merkle Similar Companies

Publicis Sapient

Publicis Sapient is a digital business transformation company. We partner with global organizations to help them create and sustain competitive advantage in a world that is increasingly digital. We operate through our expert SPEED capabilities: Strategy and Consulting, Product, Experience, Engineeri

Alvarez & Marsal

Alvarez & Marsal is a leading global professional services firm dedicated to helping organizations tackle their most complex business issues, maximize stakeholder value, and deliver sustainable change. Privately held since its founding in 1983, clients select us for our deep expertise and proven a

Korn Ferry

Korn Ferry is a global consulting firm that powers performance. We unlock the potential in your people and unleash transformation across your business—synchronizing strategy, operations, and talent to accelerate performance, fuel growth, and inspire a legacy of change. That’s why the world’s most fo

KPMG UK

Make growth happen. Make it trusted. Make bold moves. Make the future. KPMG makes the difference for our clients, people and communities. Make growth happen. Make it trusted. Make bold moves. Make the future. At KPMG, we’ve been making the difference for our clients, people and communities for over

Stefanini Group

Global Tech Consulting Company All in One. Stefanini is a Brazilian multinational company with 37 years of experience and presence in 41 countries. With more than 35,000 employees, we co-create solutions for a better future, driving digital transformation with a focus on real results. We oper

Bain & Company

Bain & Company is a global consultancy that helps the world’s most ambitious change makers define the future. Across 65 cities in 40 countries, we work alongside our clients as one team with a shared ambition to achieve extraordinary results, outperform the competition, and redefine industries. We

Jacobs

At Jacobs, we're challenging today to reinvent tomorrow – delivering outcomes and solutions for the world's most complex challenges. With a team of approximately 45,000, we provide end-to-end services in advanced manufacturing, cities & places, energy, environmental, life sciences, transportation an

Guidehouse

Guidehouse is a global consultancy providing advisory, technology, and managed services to the commercial and public sectors. Guidehouse is purpose-built to serve the national security, financial services, healthcare, energy, and infrastructure industries. Disrupting legacy consulting delivery model

Elior Group

Elior Group, one of the world's leading operators in contract catering and support services, has become a benchmark player in the business & industry, education and healthcare. Operating in 5 countries, Elior Group is a leader in its main markets, in Europe and North America. Our missions are to ea

newsone

Merkle CyberSecurity News

November 11, 2025 08:00 AM
Dentsu leak compromised LNER customer data

Dentsu's data breach has compromised LNER'S customer data. Campaign reported in late October that former, current and “some clients” at...

November 07, 2025 10:29 AM
Bank, payroll and National Insurance details stolen in Dentsu security incident

Dentsu says personal information from current and former employees has been taken during a cyber incident at its Merkle division.

November 03, 2025 08:00 AM
MSP cybersecurity news digest, November 3, 2025

Qilin ransomware abuses Windows Subsystem for Linux to deploy Linux encryptors on Windows, Atroposia malware includes built-in vulnerability...

October 30, 2025 07:00 AM
Dentsu has Disclosed that its U.S.-based Subsidiary Merkle Suffers Cyberattack

Dentsu confirmed Merkle experienced a cyberattack, prompting immediate incident response measures and system shutdowns to contain the...

October 30, 2025 07:00 AM
Dentsu’s US subsidiary Merkle hit by cyberattack, staff and client data exposed

Dentsu said its U.S. unit Merkle was hit by a cyberattack exposing staff and client data, forcing some systems offline.

October 30, 2025 07:00 AM
News - Dentsu confirms cyberattack on U.S. subsidiary Merkle exposed employee and client data

Japanese advertising and public relations giant Dentsu Group has confirmed that its U.S.-based subsidiary Merkle suffered a cybersecurity...

October 30, 2025 07:00 AM
Massive Cybersecurity Storm: Ransomware Rampages, Mega-Breach Scare & Global Outages

Global tech outage: A DNS issue at Microsoft disrupted Azure cloud and Microsoft 365 logins worldwide, underscoring the fragility of...

October 29, 2025 07:00 AM
Dentsu's Merkle Hit By 'Cyber Incident,' Investigation Continues 10/29/2025

Dentsu reported early Tuesday a cyber security incident affecting part of data unit Merkle's network that effected some client, supplier and...

October 29, 2025 07:00 AM
Marketing giant Dentsu warns staff after Merkle data raid

Global marketing giant Dentsu is writing to current and former staff after a cyberattack on a subsidiary led to bank, payroll,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Merkle CyberSecurity History Information

Official Website of Merkle

The official website of Merkle is https://www.merkle.com.

Merkle’s AI-Generated Cybersecurity Score

According to Rankiteo, Merkle’s AI-generated cybersecurity score is 738, reflecting their Moderate security posture.

How many security badges does Merkle’ have ?

According to Rankiteo, Merkle currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Merkle have SOC 2 Type 1 certification ?

According to Rankiteo, Merkle is not certified under SOC 2 Type 1.

Does Merkle have SOC 2 Type 2 certification ?

According to Rankiteo, Merkle does not hold a SOC 2 Type 2 certification.

Does Merkle comply with GDPR ?

According to Rankiteo, Merkle is not listed as GDPR compliant.

Does Merkle have PCI DSS certification ?

According to Rankiteo, Merkle does not currently maintain PCI DSS compliance.

Does Merkle comply with HIPAA ?

According to Rankiteo, Merkle is not compliant with HIPAA regulations.

Does Merkle have ISO 27001 certification ?

According to Rankiteo,Merkle is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Merkle

Merkle operates primarily in the Business Consulting and Services industry.

Number of Employees at Merkle

Merkle employs approximately 5,889 people worldwide.

Subsidiaries Owned by Merkle

Merkle presently has no subsidiaries across any sectors.

Merkle’s LinkedIn Followers

Merkle’s official LinkedIn profile has approximately 215,902 followers.

NAICS Classification of Merkle

Merkle is classified under the NAICS code 5416, which corresponds to Management, Scientific, and Technical Consulting Services.

Merkle’s Presence on Crunchbase

No, Merkle does not have a profile on Crunchbase.

Merkle’s Presence on LinkedIn

Yes, Merkle maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/merkle.

Cybersecurity Incidents Involving Merkle

As of November 27, 2025, Rankiteo reports that Merkle has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Merkle has an estimated 17,802 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Merkle ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does Merkle detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (systems shut down, measures taken to minimize impact), and third party assistance with yes (external cybersecurity firm involved), and law enforcement notified with yes (relevant authorities in impacted countries notified), and containment measures with systems taken offline to mitigate attack, and recovery measures with systems restored after mitigation, and communication strategy with public disclosure, notification to affected individuals, offer of free dark web monitoring, and incident response plan activated with yes (cybersecurity firm engaged), and third party assistance with yes (external cybersecurity firm), and law enforcement notified with yes (uk and india), and remediation measures with credit monitoring, remediation measures with dark web monitoring for affected individuals, and communication strategy with initial notification to staff (oct 2025), communication strategy with limited follow-up per employee reports..

Incident Details

Can you provide details on each incident ?

Incident : Cyberattack (Data Breach)

Title: Dentsu’s US subsidiary Merkle hit by cyberattack, staff and client data exposed

Description: Japanese multinational advertising and public relations company Dentsu announced that its U.S.-based subsidiary Merkle suffered a cyberattack exposing staff and client data. The company took certain systems offline to mitigate the attack and is investigating with external cybersecurity support. Hackers stole files containing supplier, client, and employee data, including personal, payroll, and National Insurance details. Affected individuals are being notified and offered free dark web monitoring. The financial impact is currently unknown.

Date Detected: 2025-10-30

Date Publicly Disclosed: 2025-10-30

Type: Cyberattack (Data Breach)

Incident : Data Breach

Title: Dentsu's Merkle Data Breach and Suumaya Money Laundering Investigation

Description: A cyberattack on Dentsu's Merkle unit led to the theft of sensitive employee and client information, sparking legal action and regulatory scrutiny. Concurrently, Dentsu's Indian business is entangled in a ₹137 crore money-laundering probe linked to the Suumaya Group, involving fake contracts and shell companies. The UK ICO is reviewing the data breach, while India's Enforcement Directorate investigates financial fraud.

Date Publicly Disclosed: 2025-10-01

Type: Data Breach

Motivation: Financial GainData Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Data Compromised: Supplier data, Client data, Employee data (personal details, payroll, national insurance numbers, bank details, salary, contact details)

Systems Affected: Certain network systems (taken offline during mitigation)

Downtime: Partial (some systems shut down and later restored)

Operational Impact: Systems taken offline to mitigate breach; investigation ongoing

Brand Reputation Impact: Potential reputational damage due to exposure of sensitive data

Identity Theft Risk: High (personal and financial data exposed)

Payment Information Risk: High (bank and payroll details compromised)

Incident : Data Breach MER4741147112625

Data Compromised: Bank details, Payroll details, Salaries, National insurance numbers, Contact information

Systems Affected: Merkle’s network

Customer Complaints: High (150+ ex-employees in WhatsApp group pursuing legal action)

Brand Reputation Impact: Significant (employee frustration, legal threats, regulatory scrutiny)

Legal Liabilities: Potential ICO fines (up to 2% of global turnover)Employee compensation claimsMoney laundering investigation

Identity Theft Risk: High (exfiltrated PII, dark web exposure risk)

Payment Information Risk: High (bank and payroll details compromised)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Details, Payroll Data, National Insurance Numbers, Bank Details, Salary Information, Contact Details, Supplier Data, Client Data, , Personally Identifiable Information (Pii), Financial Data and .

Which entities were affected by each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Entity Name: Merkle, Inc.

Entity Type: Subsidiary

Industry: Marketing and Customer Experience Management (CXM)

Location: United States

Size: 16,000+ employees globally

Incident : Cyberattack (Data Breach) MER3332133103025

Entity Name: Dentsu Group

Entity Type: Parent Company

Industry: Advertising and Public Relations

Location: Japan (global operations)

Size: 67,667 employees (as of December 31, 2024)

Incident : Data Breach MER4741147112625

Entity Name: Dentsu Group (Merkle unit)

Entity Type: Advertising and Marketing Agency

Industry: Media & Communications

Location: UK (global operations)

Customers Affected: Current and former employees (some left >10 years ago)

Incident : Data Breach MER4741147112625

Entity Name: Dentsu India

Entity Type: Subsidiary

Industry: Media & Communications

Location: India

Incident : Data Breach MER4741147112625

Entity Name: Suumaya Group

Entity Type: Agro-trading and Welfare Programme Contractor

Industry: Agriculture/Government Contracts

Location: India (Haryana, Delhi)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Incident Response Plan Activated: Yes (systems shut down, measures taken to minimize impact)

Third Party Assistance: Yes (external cybersecurity firm involved)

Law Enforcement Notified: Yes (relevant authorities in impacted countries notified)

Containment Measures: Systems taken offline to mitigate attack

Recovery Measures: Systems restored after mitigation

Communication Strategy: Public disclosure, notification to affected individuals, offer of free dark web monitoring

Incident : Data Breach MER4741147112625

Incident Response Plan Activated: Yes (cybersecurity firm engaged)

Third Party Assistance: Yes (external cybersecurity firm)

Law Enforcement Notified: Yes (UK and India)

Remediation Measures: Credit monitoringDark web monitoring for affected individuals

Communication Strategy: Initial notification to staff (Oct 2025)Limited follow-up per employee reports

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (systems shut down, measures taken to minimize impact), Yes (cybersecurity firm engaged).

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Yes (external cybersecurity firm involved), Yes (external cybersecurity firm).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Cyberattack (Data Breach) MER3332133103025

Type of Data Compromised: Personal details, Payroll data, National insurance numbers, Bank details, Salary information, Contact details, Supplier data, Client data

Sensitivity of Data: High (includes financial and personally identifiable information)

Data Exfiltration: Yes (files taken from Merkle’s network)

Personally Identifiable Information: Yes (names, contact details, National Insurance numbers, bank/payroll details)

Incident : Data Breach MER4741147112625

Type of Data Compromised: Personally identifiable information (pii), Financial data

Sensitivity of Data: High (bank details, National Insurance numbers)

Data Exfiltration: Confirmed ('certain files' stolen)

Personally Identifiable Information: NamesContact detailsNational Insurance numbersSalariesBank detailsPayroll details

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Credit monitoring, Dark web monitoring for affected individuals, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by systems taken offline to mitigate attack.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Cyberattack (Data Breach) MER3332133103025

Data Exfiltration: Yes (files stolen, but no ransomware claim reported)

Incident : Data Breach MER4741147112625

Data Exfiltration: Yes

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Systems restored after mitigation.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Regulatory Notifications: Relevant authorities in impacted countries notified

Incident : Data Breach MER4741147112625

Regulations Violated: UK GDPR (potential), India’s Prevention of Money Laundering Act (PMLA),

Legal Actions: UK ICO review (ongoing), ED investigation (ongoing), Employee group litigation (potential),

Regulatory Notifications: UK ICO complaint filedED searches conducted (Dentsu India offices)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through UK ICO review (ongoing), ED investigation (ongoing), Employee group litigation (potential), .

References

Where can I find more information about each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Source: SecurityAffairs

URL: https://securityaffairs.com

Date Accessed: 2025-10-30

Incident : Data Breach MER4741147112625

Source: Financial Times / Media Report

Date Accessed: 2025-11-26

Incident : Data Breach MER4741147112625

Source: Enforcement Directorate (ED) Press Release

Date Accessed: 2025-11-26

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: SecurityAffairsUrl: https://securityaffairs.comDate Accessed: 2025-10-30, and Source: Financial Times / Media ReportDate Accessed: 2025-11-26, and Source: Enforcement Directorate (ED) Press ReleaseDate Accessed: 2025-11-26.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Investigation Status: Ongoing (external cybersecurity firm involved)

Incident : Data Breach MER4741147112625

Investigation Status: ['Ongoing (UK ICO)', 'Ongoing (ED India)', 'Employee-led legal preparations']

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure, notification to affected individuals, offer of free dark web monitoring, Initial Notification To Staff (Oct 2025) and Limited Follow-Up Per Employee Reports.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Cyberattack (Data Breach) MER3332133103025

Stakeholder Advisories: Affected individuals notified; free dark web monitoring offered

Incident : Data Breach MER4741147112625

Customer Advisories: Credit monitoring offered to affected employees

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Affected individuals notified; free dark web monitoring offered, Credit Monitoring Offered To Affected Employees and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach MER4741147112625

High Value Targets: Employee Pii, Client Data,

Data Sold on Dark Web: Employee Pii, Client Data,

Post-Incident Analysis

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-10-30.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Supplier data, Client data, Employee data (personal details, payroll, National Insurance numbers, bank details, salary, contact details), , Bank details, Payroll details, Salaries, National Insurance numbers, Contact information and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Merkle’s network.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Systems taken offline to mitigate attack.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Payroll details, Bank details, Client data, Supplier data, Contact information, Salaries, Employee data (personal details, payroll, National Insurance numbers, bank details, salary, contact details) and National Insurance numbers.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was UK ICO review (ongoing), ED investigation (ongoing), Employee group litigation (potential), .

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Financial Times / Media Report, SecurityAffairs and Enforcement Directorate (ED) Press Release.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://securityaffairs.com .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (external cybersecurity firm involved).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Affected individuals notified; free dark web monitoring offered, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Credit monitoring offered to affected employees.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=merkle' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge