ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The nationally acclaimed Pierce County Library System serves 600,000 people throughout Pierce County with 19 libraries and online services. The system is the fourth largest in the state and is funded primarily through property taxes. People may choose from more than one million books, movies and other materials, as well as nearly half a million online/downloadable materials. Pierce County Library is committed to directing services in three primary areas: learning, enjoyment and community connection. Its services and programs spark success for Pierce County residents. More than a million people visit Pierce County Libraries each year. The Library provides services and programs directly to people in adult care facilities or who are homebound, and to children in child care centers and schools. Pierce County Libraries are located at Anderson Island, Bonney Lake, Buckley, DuPont, Eatonville, Fife, Gig Harbor, Graham, Key Center, Lakewood (temporarily closed), Milton/Edgewood, Orting, Parkland/Spanaway, Pierce County Library Administrative Center, South Hill, Steilacoom, Summit, Sumner, Tillicum and University Place. Pierce County Library is an independent municipal corporation and operates as a junior taxing district. Social Media Policy: https://mypcls.org/wp-content/uploads/2023/12/Social-Media_20231213_Final.pdf

Pierce County Library System A.I CyberSecurity Scoring

PCLS

Company Details

Linkedin ID:

pierceco-library-system

Employees number:

251

Number of followers:

1,359

NAICS:

51912

Industry Type:

Libraries

Homepage:

mypcls.org

IP Addresses:

0

Company ID:

PIE_1528575

Scan Status:

In-progress

AI scorePCLS Risk Score (AI oriented)

Between 550 and 599

https://images.rankiteo.com/companyimages/pierceco-library-system.jpeg
PCLS Libraries
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePCLS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/pierceco-library-system.jpeg
PCLS Libraries
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PCLS Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Pierce County Library System (PCLS)Breach8544/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Pierce County Library System (PCLS) experienced a data breach between **April 15–21**, where unauthorized actors accessed and exfiltrated files containing **personal details (names and dates of birth) of over 335,000 individuals**. While the library claimed no evidence of misuse, plaintiffs reported **increased spam calls, texts, and emails soliciting personal data**, along with **fraudulent credit checks and compromised debit cards**. The breach led to a **class-action lawsuit** alleging negligence in security measures, with plaintiffs seeking damages and mandatory system improvements. PCLS offered **one year of free credit monitoring**, but critics deemed this insufficient. The incident highlights risks of **identity theft and long-term fraud** from exposed sensitive data, even when limited in scope. The library, Washington’s fourth-largest system, faces reputational harm and potential financial liabilities, with similar local breaches (e.g., Pierce College, Virginia Mason) resulting in multimillion-dollar settlements.

Pierce County Library SystemRansomware1004/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The Pierce County Library System confirmed a data breach in April 2025 that compromised names and dates of birth of 336,826 people. The cyber attack disrupted many library services, including access to the library catalog, self-checkout, applications for library cards, printing, and access to library computers. Ransomware gang Inc took credit for the breach, claiming to have stolen 1.94 TB of data, including driver’s licenses, passports, and internal library documents. The attack involved ransomware, and the investigation determined unauthorized access to PCLS’ environment between April 15 and April 21, 2025. PCLS is offering eligible victims one year of free credit monitoring through IDX.

Pierce County Library System (PCLS)
Breach
Severity: 85
Impact: 4
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Pierce County Library System (PCLS) experienced a data breach between **April 15–21**, where unauthorized actors accessed and exfiltrated files containing **personal details (names and dates of birth) of over 335,000 individuals**. While the library claimed no evidence of misuse, plaintiffs reported **increased spam calls, texts, and emails soliciting personal data**, along with **fraudulent credit checks and compromised debit cards**. The breach led to a **class-action lawsuit** alleging negligence in security measures, with plaintiffs seeking damages and mandatory system improvements. PCLS offered **one year of free credit monitoring**, but critics deemed this insufficient. The incident highlights risks of **identity theft and long-term fraud** from exposed sensitive data, even when limited in scope. The library, Washington’s fourth-largest system, faces reputational harm and potential financial liabilities, with similar local breaches (e.g., Pierce College, Virginia Mason) resulting in multimillion-dollar settlements.

Pierce County Library System
Ransomware
Severity: 100
Impact:
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The Pierce County Library System confirmed a data breach in April 2025 that compromised names and dates of birth of 336,826 people. The cyber attack disrupted many library services, including access to the library catalog, self-checkout, applications for library cards, printing, and access to library computers. Ransomware gang Inc took credit for the breach, claiming to have stolen 1.94 TB of data, including driver’s licenses, passports, and internal library documents. The attack involved ransomware, and the investigation determined unauthorized access to PCLS’ environment between April 15 and April 21, 2025. PCLS is offering eligible victims one year of free credit monitoring through IDX.

Ailogo

PCLS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PCLS

Incidents vs Libraries Industry Average (This Year)

Pierce County Library System has 198.51% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Pierce County Library System has 212.5% more incidents than the average of all companies with at least one recorded incident.

Incident Types PCLS vs Libraries Industry Avg (This Year)

Pierce County Library System reported 2 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — PCLS (X = Date, Y = Severity)

PCLS cyber incidents detection timeline including parent company and subsidiaries

PCLS Company Subsidiaries

SubsidiaryImage

The nationally acclaimed Pierce County Library System serves 600,000 people throughout Pierce County with 19 libraries and online services. The system is the fourth largest in the state and is funded primarily through property taxes. People may choose from more than one million books, movies and other materials, as well as nearly half a million online/downloadable materials. Pierce County Library is committed to directing services in three primary areas: learning, enjoyment and community connection. Its services and programs spark success for Pierce County residents. More than a million people visit Pierce County Libraries each year. The Library provides services and programs directly to people in adult care facilities or who are homebound, and to children in child care centers and schools. Pierce County Libraries are located at Anderson Island, Bonney Lake, Buckley, DuPont, Eatonville, Fife, Gig Harbor, Graham, Key Center, Lakewood (temporarily closed), Milton/Edgewood, Orting, Parkland/Spanaway, Pierce County Library Administrative Center, South Hill, Steilacoom, Summit, Sumner, Tillicum and University Place. Pierce County Library is an independent municipal corporation and operates as a junior taxing district. Social Media Policy: https://mypcls.org/wp-content/uploads/2023/12/Social-Media_20231213_Final.pdf

Loading...
similarCompanies

PCLS Similar Companies

Shreve Memorial Library

Shreve Memorial Library transforms Caddo Parish lives with resources, services and support to create a better world by focusing on developing young readers, sparking imaginations, encouraging curiosity, fostering connection, and providing comfortable places. Shreve Memorial Library's 21-branch syste

Rock Island Public Library

Rock Island Public Library is a public library with a headquarters location (the "Downtown Library"​) located at 401 19th St, Rock Island, Illinois, United States, along with the Rock Island Southwest Branch Library at 9010 Ridgewood Road, and our newest roaming location, the Library2Go mobile libr

National Library of China

The National Library of China serves as the repository of the nation's publications, a national bibliographic center, as well a national center for the preservation and conservation for ancient books. The major mission of the NLC includes: the collection and preservation of domestic and foreign publ

Waltham Public Library

Follow us on Facebook: https://www.facebook.com/walthamlibrary/ Check us out on Instagram/Twitter: @walthamlibrary Signup to receive emails about Library events: https://bit.ly/2EJGAgE Waltham Public Library Vision The Waltham Public Library is a fully-funded community hub, fostering a healthy demo

ALDIS | Digital Asset Management

Aldis librarians and media experts organize your digital assets, streamline your workflow, and design & optimize your digital asset management (DAM) platform to fit the way you work. We design and build custom integrated systems and workflows with affordable ongoing operations and support. We also

RCS Community Library

THE LIBRARY RCS Community Library is an independent, 501(c)3 nonprofit organization serving the residents of the Ravena-Coeymans-Selkirk Central School District in southeastern Albany County, New York State. Its service area includes the southern part of the Town of Bethlehem (Selkirk, South Be

newsone

PCLS CyberSecurity News

September 09, 2025 07:00 AM
Pierce County Library faces 2 lawsuits after cyberattack

Court filings reveal negligence claims after a breach exposed over 335000 records at the Pierce County Library System.

September 09, 2025 07:00 AM
Pierce County library was hit by data breach. What was in the stolen files

The Pierce County Library System is being sued over a data breach earlier this year that compromised basic personal details of more than...

August 01, 2025 07:00 AM
Governments Face Rising Tide Of Ransomware Attacks In First Half Of 2025

Ransomware groups are ramping up pressure on the public sector. In the first half of 2025, 208 attacks were recorded against government...

July 31, 2025 07:00 AM
Comparitech reports 65% surge in ransomware attacks on government agencies in 2025

New Comparitech data showed a sharp rise in attacks on government agencies during the first half of 2025. Researchers logged 208 ransomware...

July 14, 2025 07:00 AM
July 2025: Global cyberthreats

In an increasingly interconnected world, the digital battleground knows no borders. Recent weeks have seen a surge in cyberattacks across...

May 19, 2025 07:00 AM
The Pierce County libraries system was hacked, information stolen. What we know

The library system confirmed on May 12 that it “was the target of a cybersecurity event” and that “some Library data was taken,” according to communications...

May 13, 2025 07:00 AM
Library confirms ‘cybersecurity event’ caused outage

The Pierce County Library system confirmed Tuesday that a “cybersecurity event” caused a multiweek outage affecting services at its branches around the county.

March 11, 2025 07:00 AM
The toll of Seattle library’s ransomware attack

The Seattle Public Library data breach last year affected nearly 27,000 people, including staff whose Social Security numbers and health...

May 29, 2024 07:00 AM
Why did ransomware hackers target Seattle Public Library?

The Seattle Public Library's Central branch in downtown Seattle. (GeekWire Photo / Kurt Schlosser) The ransomware attack on Seattle Public...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PCLS CyberSecurity History Information

Official Website of Pierce County Library System

The official website of Pierce County Library System is http://mypcls.org.

Pierce County Library System’s AI-Generated Cybersecurity Score

According to Rankiteo, Pierce County Library System’s AI-generated cybersecurity score is 570, reflecting their Very Poor security posture.

How many security badges does Pierce County Library System’ have ?

According to Rankiteo, Pierce County Library System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Pierce County Library System have SOC 2 Type 1 certification ?

According to Rankiteo, Pierce County Library System is not certified under SOC 2 Type 1.

Does Pierce County Library System have SOC 2 Type 2 certification ?

According to Rankiteo, Pierce County Library System does not hold a SOC 2 Type 2 certification.

Does Pierce County Library System comply with GDPR ?

According to Rankiteo, Pierce County Library System is not listed as GDPR compliant.

Does Pierce County Library System have PCI DSS certification ?

According to Rankiteo, Pierce County Library System does not currently maintain PCI DSS compliance.

Does Pierce County Library System comply with HIPAA ?

According to Rankiteo, Pierce County Library System is not compliant with HIPAA regulations.

Does Pierce County Library System have ISO 27001 certification ?

According to Rankiteo,Pierce County Library System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Pierce County Library System

Pierce County Library System operates primarily in the Libraries industry.

Number of Employees at Pierce County Library System

Pierce County Library System employs approximately 251 people worldwide.

Subsidiaries Owned by Pierce County Library System

Pierce County Library System presently has no subsidiaries across any sectors.

Pierce County Library System’s LinkedIn Followers

Pierce County Library System’s official LinkedIn profile has approximately 1,359 followers.

NAICS Classification of Pierce County Library System

Pierce County Library System is classified under the NAICS code 51912, which corresponds to Libraries and Archives.

Pierce County Library System’s Presence on Crunchbase

No, Pierce County Library System does not have a profile on Crunchbase.

Pierce County Library System’s Presence on LinkedIn

Yes, Pierce County Library System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pierceco-library-system.

Cybersecurity Incidents Involving Pierce County Library System

As of November 28, 2025, Rankiteo reports that Pierce County Library System has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Pierce County Library System has an estimated 1,268 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Pierce County Library System ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.

How does Pierce County Library System detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with idx for free credit monitoring, and communication strategy with public notification and offering free credit monitoring, and incident response plan activated with yes (immediate investigation post-detection), and remediation measures with free credit monitoring (1 year), remediation measures with identity protection services, and communication strategy with written notices mailed to affected individuals (~july 2024), communication strategy with public notice, communication strategy with dedicated helpline (1-855-201-0132)..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Pierce County Library System Data Breach

Description: A data breach occurred at the Pierce County Library System in April 2025, compromising names and dates of birth of 336,826 individuals. The breach disrupted many library services and was claimed by the Inc ransomware gang, which stole 1.94 TB of data.

Date Detected: April 2025

Date Publicly Disclosed: May 2025

Type: Ransomware

Attack Vector: Spear PhishingExploiting known vulnerabilities in software

Threat Actor: Inc Ransomware

Motivation: Financial Gain

Incident : Data Breach

Title: Pierce County Library System Data Breach (2024)

Description: Unauthorized access into the Pierce County Library System's network between April 15 and April 21, 2024, led to the copying and exfiltration of files containing personal details of over 335,000 individuals. The compromised data included names and dates of birth. While the library reported no evidence of misuse, two plaintiffs in a subsequent lawsuit claimed increased spam and fraudulent activity linked to the breach. A class-action lawsuit was filed in September 2024, alleging negligence in security measures and seeking damages along with enhanced security protocols.

Date Detected: 2024-04-21

Date Publicly Disclosed: 2024-07-01

Type: Data Breach

Motivation: Data TheftPotential Financial GainIdentity Fraud

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware PIE352071125

Data Compromised: Names, Dates of birth, Driver’s licenses, Passports, Internal library documents

Systems Affected: Library CatalogSelf-CheckoutLibrary Card ApplicationsPrintingLibrary Computers

Downtime: April and May 2025

Operational Impact: Disruption of library services

Incident : Data Breach PIE2932129090925

Data Compromised: Names, Dates of birth

Customer Complaints: ['Increased spam calls/texts/emails', 'Debit card fraud alerts', 'Unauthorized credit checks']

Brand Reputation Impact: Class-action lawsuitPublic distrustMedia coverage

Legal Liabilities: Class-action lawsuit (filed 2024-09-03)Allegations of negligencePotential damages and security mandates

Identity Theft Risk: ['High (combined with publicly available data)', 'Long-term monitoring required']

Payment Information Risk: ['Indirect (via linked fraud attempts)']

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Driver’S Licenses, Passports, Internal Library Documents, , Personally Identifiable Information (Pii) and .

Which entities were affected by each incident ?

Incident : Ransomware PIE352071125

Entity Name: Pierce County Library System

Entity Type: Public Library

Industry: Education

Location: Pierce County, Washington

Size: 19 libraries and an online catalog

Customers Affected: 336,826

Incident : Data Breach PIE2932129090925

Entity Name: Pierce County Library System (PCLS)

Entity Type: Public Library System

Industry: Education/Government

Location: Tacoma, WA, USA

Size: 4th-largest in Washington (19 locations)

Customers Affected: 335,868

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware PIE352071125

Third Party Assistance: IDX for free credit monitoring

Communication Strategy: Public notification and offering free credit monitoring

Incident : Data Breach PIE2932129090925

Incident Response Plan Activated: Yes (immediate investigation post-detection)

Remediation Measures: Free credit monitoring (1 year)Identity protection services

Communication Strategy: Written notices mailed to affected individuals (~July 2024)Public noticeDedicated helpline (1-855-201-0132)

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes (immediate investigation post-detection).

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through IDX for free credit monitoring.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware PIE352071125

Type of Data Compromised: Names, Dates of birth, Driver’s licenses, Passports, Internal library documents

Number of Records Exposed: 336,826

Sensitivity of Data: High

Data Exfiltration: 1.94 TB

File Types Exposed: ImagesDocuments

Personally Identifiable Information: NamesDates of BirthDriver’s LicensesPassports

Incident : Data Breach PIE2932129090925

Type of Data Compromised: Personally identifiable information (pii)

Number of Records Exposed: 335,868

Sensitivity of Data: Moderate-High (when combined with other public data)

Data Exfiltration: Yes (files copied and taken)

Personally Identifiable Information: Full NamesDates of Birth

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Free credit monitoring (1 year), Identity protection services, .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware PIE352071125

Ransomware Strain: Inc

Data Exfiltration: 1.94 TB

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach PIE2932129090925

Legal Actions: Class-action lawsuit (Pierce County Superior Court, filed 2024-09-03), Potential regulatory scrutiny (WA Attorney General),

Regulatory Notifications: Washington State Attorney General (breach reported in directory)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-action lawsuit (Pierce County Superior Court, filed 2024-09-03), Potential regulatory scrutiny (WA Attorney General), .

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Data Breach PIE2932129090925

Recommendations: Implement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security auditsImplement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security auditsImplement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security auditsImplement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security auditsImplement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security auditsImplement third-party security testing, Purge unnecessary personal data, Enhance incident response timeliness, Extend credit monitoring beyond 1 year, Adopt multi-factor authentication (MFA), Conduct regular security audits

References

Where can I find more information about each incident ?

Incident : Ransomware PIE352071125

Source: Comparitech

Incident : Data Breach PIE2932129090925

Source: The News Tribune

Incident : Data Breach PIE2932129090925

Source: Pierce County Superior Court Records (Case filed 2024-09-03)

Incident : Data Breach PIE2932129090925

Source: Washington State Attorney General Data Breach Directory

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Comparitech, and Source: The News Tribune, and Source: Pierce County Superior Court Records (Case filed 2024-09-03), and Source: Washington State Attorney General Data Breach Directory.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware PIE352071125

Investigation Status: Ongoing

Incident : Data Breach PIE2932129090925

Investigation Status: Completed (internal review ~May 2024)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public notification and offering free credit monitoring, Written Notices Mailed To Affected Individuals (~July 2024), Public Notice and Dedicated Helpline (1-855-201-0132).

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware PIE352071125

Stakeholder Advisories: Public notification and offering free credit monitoring

Customer Advisories: Public notification and offering free credit monitoring

Incident : Data Breach PIE2932129090925

Stakeholder Advisories: Written Notices To 335,868 Affected Individuals, Public Statement Via Library Channels.

Customer Advisories: Monitor financial accounts for fraudEnroll in provided credit monitoringReport suspicious activity to library helpline (1-855-201-0132)Contact library via mail: 3005 112th St. E., Tacoma, WA 98446

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public notification and offering free credit monitoring, Public notification and offering free credit monitoring, Written Notices To 335,868 Affected Individuals, Public Statement Via Library Channels, Monitor Financial Accounts For Fraud, Enroll In Provided Credit Monitoring, Report Suspicious Activity To Library Helpline (1-855-201-0132), Contact Library Via Mail: 3005 112Th St. E., Tacoma, Wa 98446 and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach PIE2932129090925

High Value Targets: Patron Pii Databases,

Data Sold on Dark Web: Patron Pii Databases,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach PIE2932129090925

Root Causes: Inadequate Security Measures (Alleged), Delayed Public Notification,

Corrective Actions: Credit Monitoring Offered, Legal Defense Prepared, Potential Security Upgrades (If Court-Mandated),

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as IDX for free credit monitoring.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Credit Monitoring Offered, Legal Defense Prepared, Potential Security Upgrades (If Court-Mandated), .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Inc Ransomware.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on April 2025.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-07-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Driver’s Licenses, Passports, Internal Library Documents, , Names, Dates of Birth and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Library CatalogSelf-CheckoutLibrary Card ApplicationsPrintingLibrary Computers.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was IDX for free credit monitoring.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Passports, Dates of Birth, Driver’s Licenses, Internal Library Documents and Names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 672.7K.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-action lawsuit (Pierce County Superior Court, filed 2024-09-03), Potential regulatory scrutiny (WA Attorney General), .

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Extend credit monitoring beyond 1 year, Implement third-party security testing, Adopt multi-factor authentication (MFA), Enhance incident response timeliness, Conduct regular security audits and Purge unnecessary personal data.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Comparitech, Washington State Attorney General Data Breach Directory, Pierce County Superior Court Records (Case filed 2024-09-03) and The News Tribune.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public notification and offering free credit monitoring, Written notices to 335,868 affected individuals, Public statement via library channels, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Public notification and offering free credit monitoring, Monitor financial accounts for fraudEnroll in provided credit monitoringReport suspicious activity to library helpline (1-855-201-0132)Contact library via mail: 3005 112th St. E., Tacoma and WA 98446.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=pierceco-library-system' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge