Company Details
mts-group
10,085
42,665
517
mts.ru
0
MTS_2668904
In-progress


MTS Group Company CyberSecurity Posture
mts.ruMobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of December 31, 2010, the Group serviced over 108.1 million mobile subscribers in Russia, Ukraine, Uzbekistan, Turkmenistan, Armenia and Belarus, a region that boasts a total population of more than 230 million. The Group’s fixed business, as of December 31, 2010, had a total of 9.9 million households passed, 1.8 million broadband Internet and 2.6 million pay-TV subscribers. MTS has been listed on the New York Stock Exchange since July 2000 and trades under the ticker MBT. The Company’s shares have been listed locally on Moscow Interbank Currency Exchange (MICEX) since November 2003 under the symbol MTSI. The free float of the Company’s shares is approximately 49.2%. MTS is 50.8% majority-owned by Sistema, the largest public diversified financial corporation in Russia and the CIS. In 2010, MTS' revenues reached $11.3 billion. According to GSM Association Wireless Intelligence Information Service, MTS ranks as the 2nd largest operator in Europe by proportionate subscriptions at the end of 2010..
Company Details
mts-group
10,085
42,665
517
mts.ru
0
MTS_2668904
In-progress
Between 750 and 799

MTS Group Global Score (TPRM)XXXX



No incidents recorded for MTS Group in 2026.
No incidents recorded for MTS Group in 2026.
No incidents recorded for MTS Group in 2026.
MTS Group cyber incidents detection timeline including parent company and subsidiaries

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of December 31, 2010, the Group serviced over 108.1 million mobile subscribers in Russia, Ukraine, Uzbekistan, Turkmenistan, Armenia and Belarus, a region that boasts a total population of more than 230 million. The Group’s fixed business, as of December 31, 2010, had a total of 9.9 million households passed, 1.8 million broadband Internet and 2.6 million pay-TV subscribers. MTS has been listed on the New York Stock Exchange since July 2000 and trades under the ticker MBT. The Company’s shares have been listed locally on Moscow Interbank Currency Exchange (MICEX) since November 2003 under the symbol MTSI. The free float of the Company’s shares is approximately 49.2%. MTS is 50.8% majority-owned by Sistema, the largest public diversified financial corporation in Russia and the CIS. In 2010, MTS' revenues reached $11.3 billion. According to GSM Association Wireless Intelligence Information Service, MTS ranks as the 2nd largest operator in Europe by proportionate subscriptions at the end of 2010..


Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs
We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

WE ARE EMPOWERING DIGITAL LIFE We don't know what the world will look like in 2050, but we know that A1 Telekom Austria Group is geared up for current and future demands. We are a leading provider of digital services and communications solutions in Central and Eastern Europe, offering a state-of-t

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity an

As the supercharged Un-carrier, T-Mobile US, Inc. (NASDAQ: TMUS) is powered by an award-winning 5G network that connects more people, in more places, than ever before. With T-Mobile’s unique value proposition of best network, best value, and best experiences, the Un-carrier is redefining connectivit
Millicom (NASDAQ U.S.: TIGO, Nasdaq) is a leading provider of fixed and mobile telecommunications services in Latin America. Through our TIGO® and Tigo Business® brands, we provide a wide range of digital services and products, including TIGO Money for mobile financial services, TIGO Sports for loca

Pakistan’s number one digital operator and the largest internet and broadband service provider with over 70 million subscribers nationwide. With a legacy of more than 27 years, Jazz maintains market leadership through cutting-edge, integrated technology, the strongest brands and the largest portfoli
Make a new start. A start that will build beautiful relationships, shape millions of ideas. Enable a new way to live, learn, work and play. At Jio, we build products and services of the future to empower billions of Indians make their dreams a reality. Jio is about YOU. Join the movement to make I
Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a
.png)
MTS delivered a record-breaking performance in Q3 2025, strengthening its leadership in Russia's telecom market across B2C, B2B, and digital...
Belfast-based cybersecurity company Angoka has appointed Mark Gillan as chief executive. The firm recently announced a £1.8 million investment.
Just a decade ago, a ship simply dropped out of digital contact when it went over the horizon, and hackers had little if any access to its...
The US Coast Guard has been urged to improve the cybersecurity infrastructure of the Maritime Transportation System (MTS), which includes ports, waterways, and...
The USCG's Final Rule establishes cybersecurity requirements for U.S.-flagged vessels and facilities. Learn about the new rules, training,...
The Coast Guard has created its first two cyber-focused reserve commands to bolster cybersecurity for the Service's networks, the Marine Transportation System...
The government has taken important steps to improve cybersecurity in the country by launching several new programs.
The US has imposed sanctions on the developer of Zolotaya Korona payment system. The Center for Financial Technologies (CFT), the parent company and developer...
Cyber Anarchy Squad, a Ukrainian hacking group, has hit Russian cybersecurity company Avapost, stealing hundreds of gigabytes of information...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MTS Group is https://www.mts.ru.
According to Rankiteo, MTS Group’s AI-generated cybersecurity score is 773, reflecting their Fair security posture.
According to Rankiteo, MTS Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MTS Group has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MTS Group is not certified under SOC 2 Type 1.
According to Rankiteo, MTS Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MTS Group is not listed as GDPR compliant.
According to Rankiteo, MTS Group does not currently maintain PCI DSS compliance.
According to Rankiteo, MTS Group is not compliant with HIPAA regulations.
According to Rankiteo,MTS Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MTS Group operates primarily in the Telecommunications industry.
MTS Group employs approximately 10,085 people worldwide.
MTS Group presently has no subsidiaries across any sectors.
MTS Group’s official LinkedIn profile has approximately 42,665 followers.
MTS Group is classified under the NAICS code 517, which corresponds to Telecommunications.
No, MTS Group does not have a profile on Crunchbase.
Yes, MTS Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mts-group.
As of January 21, 2026, Rankiteo reports that MTS Group has not experienced any cybersecurity incidents.
MTS Group has an estimated 9,783 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, MTS Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.