Company Details
ministeriodasaude
17,641
516,322
62
www.gov.br
0
MIN_3914305
In-progress


Ministério da Saúde Company CyberSecurity Posture
www.gov.brO Ministério da Saúde é o órgão do Poder Executivo Federal responsável pela organização e elaboração de planos e políticas públicas voltados para a promoção, a prevenção e a assistência à saúde dos brasileiros. É função do Ministério dispor de condições para a proteção e recuperação da saúde da população, reduzindo as enfermidades, controlando as doenças endêmicas e parasitárias e melhorando a vigilância à saúde, dando, assim, mais qualidade de vida ao brasileiro. Missão “Promover a saúde da população mediante a integração e a construção de parcerias com os órgãos federais, as unidades da Federação, os municípios, a iniciativa privada e a sociedade, contribuindo para a melhoria da qualidade de vida e para o exercício da cidadania" Participação de Internautas: conheça as regras para mantermos boas discussões e debates por aqui: http://goo.gl/2fOH4H
Company Details
ministeriodasaude
17,641
516,322
62
www.gov.br
0
MIN_3914305
In-progress
Between 750 and 799

MDS Global Score (TPRM)XXXX

Description: Brazil's Ministry of Health (MoH) suffered a major ransomware attack by the Lapsus$ Group,that resulted in the unavailability of the COVID-19 vaccination data of millions of citizens. The attack took off MoH's websites, including ConecteSUS, which tracks the trajectory of citizens in the public healthcare system. The Group claimed that they took some 50TB worth of data has been extracted from the MoH's systems. However, the Brazilian health minister said the department holds a backup of the data allegedly copied and erased from the national health service's databases.


No incidents recorded for Ministério da Saúde in 2026.
No incidents recorded for Ministério da Saúde in 2026.
No incidents recorded for Ministério da Saúde in 2026.
MDS cyber incidents detection timeline including parent company and subsidiaries

O Ministério da Saúde é o órgão do Poder Executivo Federal responsável pela organização e elaboração de planos e políticas públicas voltados para a promoção, a prevenção e a assistência à saúde dos brasileiros. É função do Ministério dispor de condições para a proteção e recuperação da saúde da população, reduzindo as enfermidades, controlando as doenças endêmicas e parasitárias e melhorando a vigilância à saúde, dando, assim, mais qualidade de vida ao brasileiro. Missão “Promover a saúde da população mediante a integração e a construção de parcerias com os órgãos federais, as unidades da Federação, os municípios, a iniciativa privada e a sociedade, contribuindo para a melhoria da qualidade de vida e para o exercício da cidadania" Participação de Internautas: conheça as regras para mantermos boas discussões e debates por aqui: http://goo.gl/2fOH4H

Prisma Health is the largest not-for-profit health organization in South Carolina, serving more than 1.2 million patients annually. Our facilities in the Greenville and Columbia surrounding markets are dedicated to improving the health of all South Carolinians through improved clinical quality, acce

The NHS was launched in 1948. It was born out of a long-held ideal that good healthcare should be available to all, regardless of wealth – one of the NHS's core principles. With the exception of some charges, such as prescriptions, optical services and dental services, the NHS in England remains

R1 is the leader in healthcare revenue management, helping providers achieve new levels of performance through smart orchestration. A pioneer in the industry, R1 created the first Healthcare Revenue Operating System: a modular, intelligent platform that integrates automation, AI, and human expertise

Addus HomeCare is one of the nation's largest and fastest growing providers of personal home care and support services. Since 1979, Addus has built an exceptional home care company through a commitment to improving the health and wellness of our clients and providing high-quality, cost-effective car

Northwell Health is New York State’s largest health care provider and private employer, with 28 hospitals, about 1,000+ outpatient facilities and more than 16,000 affiliated physicians. At Northwell, we focus on cultivating an environment that inspires growth, empowers leadership, and encourages br
SSM Health is a Catholic, not-for-profit, fully integrated health system dedicated to advancing innovative, sustainable, and compassionate care for patients and communities throughout the Midwest and beyond. The organization’s 40,000 team members and 13,900 providers are committed to fulfilling SSM

El Seguro Social de Salud, EsSalud, es un organismo público descentralizado, con personería jurídica de derecho público interno, adscrito al Sector Trabajo y Promoción Social. Tiene por finalidad dar cobertura a los asegurados y sus derechohabientes, a través del otorgamiento de prestaciones de pre
Mercy, one of the 15 largest U.S. health systems and named the top large system in the U.S. for excellent patient experience by NRC Health, serves millions annually with nationally recognized care and one of the nation’s largest and highest performing Accountable Care Organizations in quality and co

At Providence, our strength begins with understanding. We take time to see, hear and value everyone who walks through our doors—patient or caregiver, family support person or volunteer. Working with us means that regardless of your role, we’ll walk alongside you in your career, supporting you so you
.png)
Bangladesh's government took down the website that leaked citizens' personal information after TechCrunch reported the leak.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ministério da Saúde is http://www.gov.br/saude.
According to Rankiteo, Ministério da Saúde’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, Ministério da Saúde currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ministério da Saúde has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Ministério da Saúde is not certified under SOC 2 Type 1.
According to Rankiteo, Ministério da Saúde does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ministério da Saúde is not listed as GDPR compliant.
According to Rankiteo, Ministério da Saúde does not currently maintain PCI DSS compliance.
According to Rankiteo, Ministério da Saúde is not compliant with HIPAA regulations.
According to Rankiteo,Ministério da Saúde is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ministério da Saúde operates primarily in the Hospitals and Health Care industry.
Ministério da Saúde employs approximately 17,641 people worldwide.
Ministério da Saúde presently has no subsidiaries across any sectors.
Ministério da Saúde’s official LinkedIn profile has approximately 516,322 followers.
Ministério da Saúde is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Ministério da Saúde does not have a profile on Crunchbase.
Yes, Ministério da Saúde maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ministeriodasaude.
As of January 21, 2026, Rankiteo reports that Ministério da Saúde has experienced 1 cybersecurity incidents.
Ministério da Saúde has an estimated 31,578 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with data backup..
Title: Ransomware Attack on Brazil's Ministry of Health
Description: Brazil's Ministry of Health (MoH) suffered a major ransomware attack by the Lapsus$ Group, resulting in the unavailability of the COVID-19 vaccination data of millions of citizens.
Type: Ransomware Attack
Threat Actor: Lapsus$ Group
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Covid-19 vaccination data
Systems Affected: MoH's websitesConecteSUS
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Health Data and .

Entity Name: Ministry of Health, Brazil
Entity Type: Government
Industry: Healthcare
Location: Brazil

Remediation Measures: Data backup

Type of Data Compromised: Health data
Data Exfiltration: 50TB worth of data
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Data backup, .

Data Exfiltration: ['50TB worth of data']
Last Attacking Group: The attacking group in the last incident was an Lapsus$ Group.
Most Significant Data Compromised: The most significant data compromised in an incident were COVID-19 vaccination data and .
Most Significant System Affected: The most significant system affected in an incident was MoH's websitesConecteSUS.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was COVID-19 vaccination data.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.