Company Details
morgan-stanley-wealth-management
384
261,803
52
morganstanley.com
0
MOR_1955047
In-progress


Morgan Stanley Wealth Management Company CyberSecurity Posture
morganstanley.comAt Morgan Stanley, we put clients first, focusing on their success and remaining committed to helping them reach their financial goals. Morgan Stanley Wealth Management harnesses the Firm’s resources and unique capabilities to help clients build, preserve and manage their wealth at any stage of life. To learn more about what we offer, visit morganstanley.com/wealth. To explore career opportunities, visit morganstanley.com/people. To learn more about our awards & recognition, visit mgstn.ly/38aItSH. Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet). This material may provide the addresses of, or contain hyperlinks to, websites. Except to the extent to which the material refers to website material of Morgan Stanley Wealth Management, the firm has not reviewed the linked site. Equally, except to the extent to which the material refers to website material of Morgan Stanley Wealth Management, the firm takes no responsibility for, and makes no representations or warranties whatsoever as to, the data and information contained therein. Such address or hyperlink (including addresses or hyperlinks to website material of Morgan Stanley Wealth Management) is provided solely for your convenience and information and the content of the linked site does not in any way form part of this document. Accessing such website or following such link through the material or the website of the firm shall be at your own risk and we shall have no liability arising out of, or in connection with, any such referenced website. Morgan Stanley Wealth Management is a business of Morgan Stanley Smith Barney LLC. © 2022 Morgan Stanley Smith Barney LLC. Member SIPC. CRC 4644538 4/2022.
Company Details
morgan-stanley-wealth-management
384
261,803
52
morganstanley.com
0
MOR_1955047
In-progress
Between 750 and 799

MSWM Global Score (TPRM)XXXX

Description: The wealth and asset management division of Morgan Stanley, Morgan Stanley Wealth Management suffered a social engineering attack. The customers were targeted as a result of vishing (aka voice phishing), a social engineering attack where scammers impersonate a trusted entity during a voice call to convince their targets into revealing sensitive information. The hackers also electronically transferred money to their own bank account by initiating payments using the Zelle payment service. Morgan Stanley immediately disabled the accounts of all customers affected by these attacks and secured its systems.
Description: Investment banking firm Morgan Stanley experienced a data breach incident after its third-party vendor Accellion FTA server was targeted in a ransomware attack. The breach compromised the personal data including names, addresses, Social security numbers, and other information of its customers and clients. Morgan Stanley along with Guidehouse investigated the incident and took further preventive steps.
Description: The Maine Office of the Attorney General reported that a vendor of Morgan Stanley, Guidehouse, experienced a data breach on January 20, 2021, involving unauthorized access to personal information for approximately 116 Maine residents. The breach was discovered on May 20, 2021, and compromised information included names, addresses, dates of birth, and Social Security numbers. Affected residents are being offered 24 months of Experian IdentityWorks credit monitoring services at no charge.
Description: The California Office of the Attorney General reported a data breach involving Morgan Stanley on July 10, 2020. The breach history indicated potential exposure of personal information related to customer accounts due to mishandling of decommissioned equipment that may have contained unencrypted data; however, the exact breach date is not available.


No incidents recorded for Morgan Stanley Wealth Management in 2026.
No incidents recorded for Morgan Stanley Wealth Management in 2026.
No incidents recorded for Morgan Stanley Wealth Management in 2026.
MSWM cyber incidents detection timeline including parent company and subsidiaries

At Morgan Stanley, we put clients first, focusing on their success and remaining committed to helping them reach their financial goals. Morgan Stanley Wealth Management harnesses the Firm’s resources and unique capabilities to help clients build, preserve and manage their wealth at any stage of life. To learn more about what we offer, visit morganstanley.com/wealth. To explore career opportunities, visit morganstanley.com/people. To learn more about our awards & recognition, visit mgstn.ly/38aItSH. Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet). This material may provide the addresses of, or contain hyperlinks to, websites. Except to the extent to which the material refers to website material of Morgan Stanley Wealth Management, the firm has not reviewed the linked site. Equally, except to the extent to which the material refers to website material of Morgan Stanley Wealth Management, the firm takes no responsibility for, and makes no representations or warranties whatsoever as to, the data and information contained therein. Such address or hyperlink (including addresses or hyperlinks to website material of Morgan Stanley Wealth Management) is provided solely for your convenience and information and the content of the linked site does not in any way form part of this document. Accessing such website or following such link through the material or the website of the firm shall be at your own risk and we shall have no liability arising out of, or in connection with, any such referenced website. Morgan Stanley Wealth Management is a business of Morgan Stanley Smith Barney LLC. © 2022 Morgan Stanley Smith Barney LLC. Member SIPC. CRC 4644538 4/2022.

Manappuram Finance Ltd. is one of India’s largest and most trusted gold loan companies, with 4,199 branches across the length and breadth of the country. It currently has nearly Rs. 157.65 billion worth assets under management (AUM), and 20,185 employees. Promoted by Shri. V.P. Nandakumar, the curr

L&T Finance is one of the leading NBFCs offering a range of loans across Rural | Housing | Two-Wheeler | Personal & Business (SME) The company is promoted by Larsen and Toubro Ltd. (L&T), one of the largest conglomerates in India. LTF is publicly listed on both the exchanges of India - BSE & NSE an

At Ameriprise Financial, we have been helping people feel more confident about their financial future for 130 years. With extensive investment advice, asset management and insurance capabilities and a nationwide network of approximately 10,000 financial advisors*, we have the strength and expertise

We are here. So you can stay ahead. For nearly two hundred years we have acquired and shared knowledge, developed global networks and adapted to modern everyday life. To us, it is important to combine profitability with responsibility. DNB is Norway's largest financial services group and one of t
En Davivienda creemos en un mundo financiero sin barreras que facilite la vida a las personas, las empresas, las ciudades y municipios. Por esta razón hoy somos más de 19.000 personas innovando y creando cada día soluciones y ofertas exclusivas para 10 millones de clientes que permitan una mayor inc

We support you over time, during expansion phases and their more challenging periods alike. By providing a full range of solutions suited to your needs, we play a facilitating role to help you realise your ambitions and leverage your potential. This is why we intend to develop an authentic advisory

PT Pegadaian didirikan di kota Sukabumi, Jawa Barat pada 1 April 1901. Tak hanya bergerak di Industri Gadai, Pegadaian juga memiliki ragam produk dan layanan seperti investasi berbasis emas yang dapat dimiliki oleh masyarakat dengan cara yang mudah, diantaranya Tabungan Emas, Cicil Emas dan Arisan
Old Mutual Limited is a listed company on the Johannesburg Stock Exchange and has secondary listings on the London, Malawi, Namibia and Zimbabwe stock exchanges. As a Pan-African financial services company, we are focused on Africa, her needs and her people. Together with you, we have educated our
Natixis Corporate & Investment Banking is a leading global financial institution that provides advisory, investment banking, financing, corporate banking and capital markets services to corporations, financial institutions, financial sponsors and sovereign and supranational organizations worldwide.
.png)
Morgan Stanley wealth unit beats expectations with 13% revenue jump to $8.4B as client assets hit $9.3T in strong Q4 showing.
The Amendments, which took effect on January 1, 2026, will impact network operators and CIIOs within China and overseas.
In this week's tech roundup, Snowflake wins a Morgan Stanley accolade, Snappy Kraken launches an AUM dashboard, Bill Altman joins World...
Online crime is accelerating, making cybersecurity a fast-growing and resilient investment opportunity. Our Cybersecurity and Network and...
Morgan Stanley is embracing AI within its 'key driver' wealth management business by making tech-powered tools available to more of its...
Read the announcement and explore the results of the Morgan Stanley Wealth Management 3Q 2025 quarterly retail investor pulse survey.
Explore insights from Morgan Stanley Wealth Management on what 'The One, Big, Beautiful Bill Act' could mean for your tax situation and...
Morgan Stanley introduces a new designation for advisors focused on managing wealth of founders and employees in private companies.
Explore the latest thought leadership about current market insights, recent investment trends, and industry leading research curated by Morgan Stanley.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Morgan Stanley Wealth Management is https://www.morganstanley.com/what-we-do/wealth-management.
According to Rankiteo, Morgan Stanley Wealth Management’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Morgan Stanley Wealth Management currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Morgan Stanley Wealth Management has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Morgan Stanley Wealth Management is not certified under SOC 2 Type 1.
According to Rankiteo, Morgan Stanley Wealth Management does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Morgan Stanley Wealth Management is not listed as GDPR compliant.
According to Rankiteo, Morgan Stanley Wealth Management does not currently maintain PCI DSS compliance.
According to Rankiteo, Morgan Stanley Wealth Management is not compliant with HIPAA regulations.
According to Rankiteo,Morgan Stanley Wealth Management is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Morgan Stanley Wealth Management operates primarily in the Financial Services industry.
Morgan Stanley Wealth Management employs approximately 384 people worldwide.
Morgan Stanley Wealth Management presently has no subsidiaries across any sectors.
Morgan Stanley Wealth Management’s official LinkedIn profile has approximately 261,803 followers.
Morgan Stanley Wealth Management is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Morgan Stanley Wealth Management does not have a profile on Crunchbase.
Yes, Morgan Stanley Wealth Management maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/morgan-stanley-wealth-management.
As of January 21, 2026, Rankiteo reports that Morgan Stanley Wealth Management has experienced 4 cybersecurity incidents.
Morgan Stanley Wealth Management has an estimated 30,812 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with guidehouse, and containment measures with disabled affected customer accounts and secured systems..
Title: Morgan Stanley Data Breach via Accellion FTA Server
Description: Morgan Stanley experienced a data breach incident after its third-party vendor Accellion FTA server was targeted in a ransomware attack. The breach compromised the personal data including names, addresses, Social Security numbers, and other information of its customers and clients. Morgan Stanley along with Guidehouse investigated the incident and took further preventive steps.
Type: Data Breach
Attack Vector: Ransomware attack via third-party vendor
Vulnerability Exploited: Accellion FTA server vulnerability
Title: Guidehouse Data Breach
Description: A vendor of Morgan Stanley, Guidehouse, experienced a data breach involving unauthorized access to personal information for approximately 116 Maine residents.
Date Detected: 2021-05-20
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Morgan Stanley Data Breach
Description: The California Office of the Attorney General reported a data breach involving Morgan Stanley on July 10, 2020. The breach history indicated potential exposure of personal information related to customer accounts due to mishandling of decommissioned equipment that may have contained unencrypted data; however, the exact breach date is not available.
Date Publicly Disclosed: 2020-07-10
Type: Data Breach
Attack Vector: Mishandling of decommissioned equipment
Vulnerability Exploited: Unencrypted data on decommissioned equipment
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Accellion FTA server and Voice phishing.

Data Compromised: Names, Addresses, Social security numbers, Other information
Systems Affected: Accellion FTA server

Data Compromised: Names, Addresses, Dates of birth, Social security numbers

Data Compromised: Personal information related to customer accounts
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers, Other Information, , Personal Information, and Personal information.

Entity Name: Morgan Stanley
Entity Type: Investment Banking Firm
Industry: Finance

Entity Name: Guidehouse
Entity Type: Vendor
Industry: Financial Services
Customers Affected: 116

Entity Name: Morgan Stanley
Entity Type: Financial Services
Industry: Finance

Third Party Assistance: Guidehouse.
Third-Party Assistance: The company involves third-party assistance in incident response through Guidehouse, .

Type of Data Compromised: Names, Addresses, Social security numbers, Other information
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 116
Sensitivity of Data: High

Type of Data Compromised: Personal information
Data Encryption: Unencrypted
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabled affected customer accounts and secured systems.

Source: Maine Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2020-07-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2020-07-10.

Investigation Status: Investigated by Morgan Stanley and Guidehouse

Entry Point: Accellion FTA server
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Guidehouse, .
Most Recent Incident Detected: The most recent incident detected was on 2021-05-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-07-10.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, other information, , names, addresses, dates of birth, Social Security numbers, and Personal information related to customer accounts.
Most Significant System Affected: The most significant system affected in an incident was Accellion FTA server.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was guidehouse, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disabled affected customer accounts and secured systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information related to customer accounts, names, Social Security numbers, addresses, dates of birth and other information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 116.0.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigated by Morgan Stanley and Guidehouse.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Accellion FTA server and Voice phishing.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.