Phone House Company Cyber Security Posture

phonehouse-tuttlingen.de

None

Phone House Company Details

Linkedin ID:

phone-house

Employees number:

None

Number of followers:

109

NAICS:

517

Industry Type:

Telecommunications

Homepage:

phonehouse-tuttlingen.de

IP Addresses:

Scan still pending

Company ID:

PHO_2866973

Scan Status:

In-progress

AI scorePhone House Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscorePhone House Global Score
blurone
Ailogo

Phone House Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Phone House Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Phone HouseRansomware100504/2022PHO2240181122Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The phone retailer Phone House was targeted in a ransomware attack by the Babuk ransomware group. The cybercriminals stole sensitive PII (Personally Identifiable Information) belonging to its customers and employees, potentially affecting around 3 million people. However, when the company refused to pay the ransom, the data of 1,048,575 people, contained in a 5.77 GB .csv file, was published. The operators of the Babuk ransomware also released the remaining files on the Dark Web including 113 GB of data corresponding to 13 million customers.

Phone House Company Subsidiaries

SubsidiaryImage

None

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=phone-house' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Phone House Cyber Security News

2025-06-24T07:00:00.000Z
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

"The Office of Cybersecurity has deemed WhatsApp a high-risk to users due to the lack of transparency in how it protects user data, absence ofย ...

2025-03-26T07:00:00.000Z
Gabbard says Signal comes โ€˜pre-installedโ€™ on government devices

Director of National Intelligence Tulsi Gabbard testified to House Intelligence Committee members Wednesday that encrypted messaging app Signal comes โ€œpre-ย ...

2025-06-23T07:00:00.000Z
Scoop: WhatsApp banned on House staffers' devices

The U.S. House's chief administrative officer informed congressional staffers Monday that messaging app WhatsApp is banned on their governmentย ...

2025-05-30T07:00:00.000Z
White House investigating how Trumpโ€™s chief of staffโ€™s phone was hacked

White House investigating how Trump's chief of staff's phone was hacked ยท Episource is notifying millions of people that their health data wasย ...

2025-04-25T07:00:00.000Z
Hegsethโ€™s Personal Phone Use Created Vulnerabilities

Hegseth opened himself โ€” and, potentially the pilots โ€” to foreign adversaries who have demonstrated their abilities to hack into accounts ofย ...

2025-06-24T07:00:00.000Z
WhatsApp messaging app banned on all US House of Representatives devices

Memo says cybersecurity office deemed WhatsApp a high risk due to 'lack of transparency in how it protects user data'.

2025-05-29T07:00:00.000Z
FBI probes effort to impersonate White House chief of staff Susie Wiles, sources say

The suspicious messages hit in-boxes over an unknown period of time, sources said. Wiles explained to people that her phone had been hacked,ย ...

2025-05-21T07:00:00.000Z
A house full of open windows: Why telecoms may never purge their networks of Salt Typhoon

Salt Typhoon's widespread intrusions for a U.S. adversary endangered the cellular communications of nearly all Americans โ€” including high-levelย ...

2024-12-04T08:00:00.000Z
At least 8 U.S. telecom firms were hit by Chinaโ€™s hacking campaign, White House says

A top White House official on Wednesday said at least eight US telecom firms and dozens of nations have been impacted by a Chinese hacking campaign.

similarCompanies

Phone House Similar Companies

TELUS Communications

TELUS (TSX: T, T.A; NYSE: TU) is a leading national telecommunications company in Canada, with $9.6 billion of annual revenue and 12 million customer connections including 6.5 million wireless subscribers, 4 million wireline network access lines and 1.2 million Internet subscribers and 170,000 TELUS

Rede Conecta

A Rede Conecta รฉ uma empresa prestadora de serviรงos de implantaรงรฃo e manutenรงรฃo em redes de Telecom. O nosso maior desafio รฉ promover e liderar a transformaรงรฃo do modelo de operaรงรฃo e manutenรงรฃo de redes de Telecom, utilizando tecnologia, revisando procedimentos, otimizando recursos e, principalment

Vodafone

At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

T-Mobile

T-Mobile US, Inc. (NASDAQ: TMUS) is Americaโ€™s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobileโ€™s customers benefit from its unmatched combination of value and quality, unwavering obsession with off

ethio telecom

We are Africaโ€šร„รดs pioneering telecom company with more than 130 years of immense experience. Today, here we are standing bold and BIG yet for another golden milestone leading Ethiopia and Ethiopians towards a bright future. We are always on the front line to streamline the overall effort of our peop

Telecom Egypt

Since its establishment in 1854, Telecom Egypt has played a pivotal role in driving growth within the local ICT market capitalizing on its vast infrastructure, which is one of the largest in the region. Its vast domestic and international infrastructure has helped it serve various customer groups in

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Phone House CyberSecurity History Information

How many cyber incidents has Phone House faced?

Total Incidents: According to Rankiteo, Phone House has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Phone House?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Phone House Ransomware Attack by Babuk Group

Description: Phone House was targeted in a ransomware attack by the Babuk ransomware group. The cybercriminals stole sensitive PII belonging to its customers and employees, potentially affecting around 3 million people. When the company refused to pay the ransom, the data of 1,048,575 people, contained in a 5.77 GB .csv file, was published. The operators of the Babuk ransomware also released the remaining files on the Dark Web including 113 GB of data corresponding to 13 million customers.

Type: Ransomware

Threat Actor: Babuk ransomware group

Motivation: Financial gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware PHO2240181122

Data Compromised: True

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are PII.

Which entities were affected by each incident?

Incident : Ransomware PHO2240181122

Entity Type: Retailer

Industry: Telecommunications

Customers Affected: 13000000

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware PHO2240181122

Type of Data Compromised: PII

Number of Records Exposed: 13000000

Sensitivity of Data: High

Data Exfiltration: True

File Types Exposed: .csv

Personally Identifiable Information: True

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware PHO2240181122

Ransom Demanded: True

Ransomware Strain: Babuk

Data Exfiltration: True

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Ransomware PHO2240181122

Additional Questions

General Information

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Babuk ransomware group.

Impact of the Incidents

Data Breach Information

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 130.0.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was True.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge