Company Details
petrobras
53,942
3,611,728
211
petrobras.com.br
0
PET_1634199
In-progress

Petrobras Company CyberSecurity Posture
petrobras.com.brNosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de baixo carbono (inclusive produtos petroquímicos e fertilizantes), sustentabilidade, segurança, respeito ao meio ambiente e atenção total às pessoas. Saiba mais em petrobras.com.br
Company Details
petrobras
53,942
3,611,728
211
petrobras.com.br
0
PET_1634199
In-progress
Between 750 and 799

Petrobras Global Score (TPRM)XXXX

Description: The Everest ransomware group claimed a data breach targeting Petrobras, Brazil’s state-owned oil giant, alleging the theft of over **176 GB of seismic navigation data**, with **90+ GB belonging directly to Petrobras**. The compromised files include **highly sensitive technical details**—ship positioning, equipment configurations, hydrophone readings, depth measurements, quality control documents, metadata, and processed reports outlining survey progress and operational conclusions.Seismic surveys are **critical for oil/gas exploration**, requiring massive investments. Competitors gaining access to this data could **replicate Petrobras’ methods, reduce their own costs, or leverage it in contract negotiations**, undermining the company’s competitive edge. The group also targeted **Campos Basin seismic surveys (3D/4D datasets)**, totaling another **90+ GB** with similar sensitive information, including ship coordinates, source depths, and shot pressures.Everest demanded Petrobras contact them via **Tox encrypted messaging within four days**, threatening further action if ignored. The breach poses **strategic risks to Petrobras’ industrial competitiveness and operational security**, with potential long-term financial and reputational damage. The company has not yet publicly responded to the claims.


Petrobras has 17.65% more incidents than the average of same-industry companies with at least one recorded incident.
Petrobras has 28.21% more incidents than the average of all companies with at least one recorded incident.
Petrobras reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Petrobras cyber incidents detection timeline including parent company and subsidiaries

Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de baixo carbono (inclusive produtos petroquímicos e fertilizantes), sustentabilidade, segurança, respeito ao meio ambiente e atenção total às pessoas. Saiba mais em petrobras.com.br


In 1967, we pioneered commercial development of Canada's oil sands – one of the largest petroleum resource basins in the world. Since then, Suncor has grown to become a globally competitive integrated energy company with a balanced portfolio of high-quality assets, a strong balance sheet and signifi

Besmindo Group is a leader in providing new tool joints; repair & redress of tool joints, pup joints, drill pipes, threads for tool joints and OCTG tubing. The mission is to continually provide these and other services by promoting a reputation for excellence and value while fully anticipating, then

The need for energy is universal. That's why ExxonMobil scientists and engineers are pioneering new research and pursuing new technologies to reduce emissions while creating more efficient fuels. We're committed to responsibly meeting the world's energy needs. We aim to achieve #netzero emissions
At Enbridge, our goal is to be the first-choice energy delivery company in North America and beyond—for customers, communities, investors, regulators and policymakers, and employees. We also recognize the importance of a secure, reliable and affordable supply of energy, which we deliver every day th
We are one of the world's leading energy producers, and a primary catalyst for Abu Dhabi’s growth and diversification. We operate across the entire hydrocarbon value chain, through a network of fully-integrated businesses, with interests that range from exploration, production, storage, refining a
PT Pertamina (Persero) is an Indonesian state-owned enterprise, which is engaged in the integrated energy in Indonesia. Established on December 10, 1957, Pertamina had the experiences in upstream, midstream, downstream and renewable energy sectors for more than 50 years. This is the official Link

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemi

Tenaris is a leading supplier of tubes and related services for the world’s energy industry and certain other industrial applications. Our mission is to deliver value to our customers through product development, manufacturing excellence, and supply chain management. Tenaris employees around the wor
At Repsol, we are at the forefront of the energy sector to build the future of energy with innovation and sustainability. We are a strong multienergy company that creates value in an integrated, diversified, and sustainable way to promote progress in society. We leverage our past experience to be pr
.png)
The Petrobras data is believed to be contained in two large information packages extracted after the intrusion into the systems of SA...
Petrobras has signed a multi-billion dollar contract with Elea Digital to expand strategic data center services in Brazil.
Investments or partnerships in energy transition projects could alter Petrobras's risk profile and reduce its portfolio return, the company warned.
Discover what you can expect to earn in cybersecurity in Brazil. Learn about salaries for all levels and factors influencing pay.
Brazil is facing a potential shortage of 800,000 cybersecurity professionals by 2024, creating vast job opportunities.
Pedro Vieira, Manager at Petrobras, recently discussed with ARC how the company is leveraging digital technologies to improve efficiency,...
Paulina is a journalist who covers breaking news, focusing on science and exclusive cybersecurity research.
ENERGYWIRE | The chief executive of Brazil's state-run oil giant Petrobras resigned yesterday amid political pressure from top lawmakers and...
Electric-power and gas companies are vulnerable to cyberattacks, but a structured approach that applies communication, organizational, and process frameworks...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Petrobras is http://www.petrobras.com.br.
According to Rankiteo, Petrobras’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Petrobras currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Petrobras is not certified under SOC 2 Type 1.
According to Rankiteo, Petrobras does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Petrobras is not listed as GDPR compliant.
According to Rankiteo, Petrobras does not currently maintain PCI DSS compliance.
According to Rankiteo, Petrobras is not compliant with HIPAA regulations.
According to Rankiteo,Petrobras is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Petrobras operates primarily in the Oil and Gas industry.
Petrobras employs approximately 53,942 people worldwide.
Petrobras presently has no subsidiaries across any sectors.
Petrobras’s official LinkedIn profile has approximately 3,611,728 followers.
Petrobras is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
No, Petrobras does not have a profile on Crunchbase.
Yes, Petrobras maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/petrobras.
As of December 14, 2025, Rankiteo reports that Petrobras has experienced 1 cybersecurity incidents.
Petrobras has an estimated 10,552 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with no public comment as of disclosure, communication strategy with media outreach by hackread.com for statement..
Title: Everest Ransomware Group Targets Petrobras in Alleged Data Breach Involving Seismic Survey Data
Description: The Everest ransomware group listed two separate entries on its dark web leak site, both targeting Petrobras, a Brazilian state-owned petroleum corporation. The group claims to have stolen over 176 GB of seismic navigation data, including highly sensitive technical information related to Petrobras and its partner firm, SAExploration. The data includes ship positioning, equipment configurations, hydrophone readings, depth measurements, quality control documents, metadata, and processed reports. The group has demanded Petrobras contact them via Tox within four days or face further action. The breach could enable competitors to replicate Petrobras’ methods, lower their own costs, or gain leverage in contract negotiations.
Date Publicly Disclosed: 2025-11-14
Type: data breach
Threat Actor: Everest Ransomware Group
Motivation: financial gaindata exfiltration for competitive advantage
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Seismic navigation data (176 gb total), Ship positioning, Equipment configurations, Hydrophone readings, Depth measurements, Quality control documents, Metadata, Processed reports, 3d/4d seismic survey data (90 gb), Ship coordinates, Source depths, Shot pressures, Equipment alignment, Field survey documentation
Operational Impact: potential replication of Petrobras’ seismic survey methods by competitorslowered costs for competitorsleverage in contract negotiationsstrategic disadvantage in energy sector operations
Brand Reputation Impact: potential damage due to exposure of sensitive industrial datalack of public response may exacerbate reputational harm
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Seismic Navigation Data, Technical Operational Data, 3D/4D Survey Datasets, Quality Control Documents, Metadata, Processed Field Reports and .

Entity Name: Petrobras
Entity Type: majority state-owned multinational corporation
Industry: petroleum (oil and gas)
Location: Rio de Janeiro, Brazil
Size: large (multinational)

Entity Name: SAExploration
Entity Type: partner firm
Industry: oil and gas (seismic data services)

Communication Strategy: no public comment as of disclosuremedia outreach by Hackread.com for statement

Type of Data Compromised: Seismic navigation data, Technical operational data, 3d/4d survey datasets, Quality control documents, Metadata, Processed field reports
Sensitivity of Data: high (industrial trade secrets, proprietary survey methods, competitive intelligence)
Data Exfiltration: 176 GB total (90 GB directly attributed to Petrobras; additional 90 GB from Campos Basin surveys)
File Types Exposed: databasesdocumentsprocessed reportssurvey progress logsinitial field conclusions

Ransom Demanded: ['unspecified amount', 'contact via Tox within 4 days']
Ransomware Strain: Everest Ransomware
Data Exfiltration: 176 GB (seismic and survey data)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Hackread.comDate Accessed: 2025-11-14.

Investigation Status: ongoing (no public confirmation from Petrobras; media outreach pending)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through No Public Comment As Of Disclosure and Media Outreach By Hackread.Com For Statement.

High Value Targets: Seismic Survey Databases, Proprietary Oil/Gas Exploration Data,
Data Sold on Dark Web: Seismic Survey Databases, Proprietary Oil/Gas Exploration Data,
Last Ransom Demanded: The amount of the last ransom demanded was ['unspecified amount', 'contact via Tox within 4 days'].
Last Attacking Group: The attacking group in the last incident was an Everest Ransomware Group.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-14.
Most Significant Data Compromised: The most significant data compromised in an incident were seismic navigation data (176 GB total), ship positioning, equipment configurations, hydrophone readings, depth measurements, quality control documents, metadata, processed reports, 3D/4D seismic survey data (90 GB), ship coordinates, source depths, shot pressures, equipment alignment, field survey documentation and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were metadata, processed reports, equipment configurations, 3D/4D seismic survey data (90 GB), ship positioning, quality control documents, depth measurements, shot pressures, source depths, hydrophone readings, seismic navigation data (176 GB total), field survey documentation, equipment alignment and ship coordinates.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was ['unspecified amount', 'contact via Tox within 4 days'].
Most Recent Source: The most recent source of information about an incident is Hackread.com.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (no public confirmation from Petrobras; media outreach pending).
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.