Company Details
pjsc-rosseti-
126
428
211
rosseti.ru
0
PJS_6139343
In-progress

PJSC "Rosseti" Company CyberSecurity Posture
rosseti.ruRosseti, Public Joint Stock Company (PJSC ROSSETI) – an operator of energy grids in Russia, is one of the largest electric companies in the world. The company maintains 2.30 million km of power transmission lines, 490,000 substations with transformer capacity of more than 761 GW. In 2015, net power supply to consumers amounted to 720,5 billion kWh. The number of employees of the Rosseti Group of Companies is 216,000 people. The asset portfolio of PJSC ROSSETI includes 37 subsidiaries and affiliates, including 14 interregional and a main network company. The controlling shareholder of the company is the state represented by the Federal Agency for State Property Management of the Russian Federation, which owns 87.9% of the share capital. PJSC ROSSETI is a leading company in the Russian market in introducing innovative technologies to the main and distribution grid complex. The company pays great attention to such issues as energy conservation, energy efficiency, international cooperation, environmental protection and occupational safety.
Company Details
pjsc-rosseti-
126
428
211
rosseti.ru
0
PJS_6139343
In-progress
Between 700 and 749

PJSC "Rosseti" Global Score (TPRM)XXXX

Description: PJSC Sberbank's security apparatus, in collaboration with Russian authorities, arrested three individuals for manufacturing and distributing 'Mamont,' an Android banking trojan that was spread through Telegram channels. The malware allowed illicit fund transfers from victims' accounts, made feasible by theft of banking credentials and sensitive financial data. Over 300 cybercrimes have been attributed to this scheme, comprising fraudulent transactions and unauthorized access to banking information. Authorities have seized equipment connected to the operation and have taken legal action against the perpetrators, continuing investigations into potential accomplices.


PJSC "Rosseti" has 19.05% more incidents than the average of same-industry companies with at least one recorded incident.
PJSC "Rosseti" has 56.25% more incidents than the average of all companies with at least one recorded incident.
PJSC "Rosseti" reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
PJSC "Rosseti" cyber incidents detection timeline including parent company and subsidiaries

Rosseti, Public Joint Stock Company (PJSC ROSSETI) – an operator of energy grids in Russia, is one of the largest electric companies in the world. The company maintains 2.30 million km of power transmission lines, 490,000 substations with transformer capacity of more than 761 GW. In 2015, net power supply to consumers amounted to 720,5 billion kWh. The number of employees of the Rosseti Group of Companies is 216,000 people. The asset portfolio of PJSC ROSSETI includes 37 subsidiaries and affiliates, including 14 interregional and a main network company. The controlling shareholder of the company is the state represented by the Federal Agency for State Property Management of the Russian Federation, which owns 87.9% of the share capital. PJSC ROSSETI is a leading company in the Russian market in introducing innovative technologies to the main and distribution grid complex. The company pays great attention to such issues as energy conservation, energy efficiency, international cooperation, environmental protection and occupational safety.


TechnipFMC is a leading technology provider to the traditional and new energies industry, delivering fully integrated projects, products, and services. With our proprietary technologies and comprehensive solutions, we are transforming our clients’ project economics, helping them unlock new possibi

Besmindo Group is a leader in providing new tool joints; repair & redress of tool joints, pup joints, drill pipes, threads for tool joints and OCTG tubing. The mission is to continually provide these and other services by promoting a reputation for excellence and value while fully anticipating, then

Marathon Petroleum Corporation (MPC) is a leading, integrated, downstream and midstream energy company headquartered in Findlay, Ohio. The company operates the nation's largest refining system. MPC's marketing system includes branded locations across the United States, including Marathon brand retai
Shell is a global group of energy and petrochemical companies, employing 103,000 people and with operations in more than 70 countries. We serve more than 1 million commercial and industrial customers, and around 33 million customers daily at more than 47,000 Shell-branded retail service stations. O
Fortune Global 500 Company, Bharat Petroleum is the second largest Indian Oil Marketing Company and one of the premier integrated energy companies in India, engaged in refining of crude oil and marketing of petroleum products, with a significant presence in the upstream and downstream sectors of the

Tenaris is a leading supplier of tubes and related services for the world’s energy industry and certain other industrial applications. Our mission is to deliver value to our customers through product development, manufacturing excellence, and supply chain management. Tenaris employees around the wor

In 1967, we pioneered commercial development of Canada's oil sands – one of the largest petroleum resource basins in the world. Since then, Suncor has grown to become a globally competitive integrated energy company with a balanced portfolio of high-quality assets, a strong balance sheet and signifi

Petróleos de Venezuela S.A. is a Venezuelan state company, began operations on January 1st, 1976 and whose activities are the oil exploration, production, refining, marketing and transportation of Venezuelan oil as well as the orimulsion, chemical, petrochemical businesses and coal. We have the lar
En YPF, tenemos un Plan 4x4 para convertirnos en una compañía de clase mundial y lograr transformarnos en grandes exportadores de hidrocarburos. Nuestros cuatro pilares son: la aceleración de la producción de petróleo en Vaca Muerta, el activo más importante que tiene nuestro país; la disciplina f
.png)
The Federal Communications Commission (FCC) decision late last week to rescind a telecom cybersecurity ruling enacted during the last days...
New telecom cybersecurity rules in force, DoT clarifies enforcement status - New Delhi [India] November 27 : The Department of...
HONG KONG, Nov. 26, 2025 /PRNewswire/ -- SGS, the world's leading testing, inspection and certification company, has awarded Ruijie Networks...
Pensacola, Fla. – Nov. 19, 2025 – The University of West Florida's new AI specialization in the B.S. in Cybersecurity program has been...
Press release - Exactitude Consultancy - Defense Cybersecurity Market Booms as Nations Strengthen Digital Warfare Capabilities and Modernize...
Mauritania joined 20 other countries in Doha for the first Arab cybersecurity exercise, aiming to boost regional coordination and crisis-response...
Richard Hughes, head of Office for Budget Responsibility, says he has apologised to chancellor for 'letting people down'
With the recent introduction of the Cyber Security and Resilience Bill in Parliament, now is a particularly crucial time to reflect on...
Small businesses have been urged by ministers to be proactive about cybersecurity to avoid the potentially devastating impact of an attack.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of PJSC "Rosseti" is http://www.rosseti.ru/eng/.
According to Rankiteo, PJSC "Rosseti"’s AI-generated cybersecurity score is 700, reflecting their Moderate security posture.
According to Rankiteo, PJSC "Rosseti" currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, PJSC "Rosseti" is not certified under SOC 2 Type 1.
According to Rankiteo, PJSC "Rosseti" does not hold a SOC 2 Type 2 certification.
According to Rankiteo, PJSC "Rosseti" is not listed as GDPR compliant.
According to Rankiteo, PJSC "Rosseti" does not currently maintain PCI DSS compliance.
According to Rankiteo, PJSC "Rosseti" is not compliant with HIPAA regulations.
According to Rankiteo,PJSC "Rosseti" is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
PJSC "Rosseti" operates primarily in the Oil and Gas industry.
PJSC "Rosseti" employs approximately 126 people worldwide.
PJSC "Rosseti" presently has no subsidiaries across any sectors.
PJSC "Rosseti"’s official LinkedIn profile has approximately 428 followers.
PJSC "Rosseti" is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
No, PJSC "Rosseti" does not have a profile on Crunchbase.
Yes, PJSC "Rosseti" maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pjsc-rosseti-.
As of November 27, 2025, Rankiteo reports that PJSC "Rosseti" has experienced 1 cybersecurity incidents.
PJSC "Rosseti" has an estimated 10,412 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes, and containment measures with arrests made and equipment seized..
Title: Arrests Made in Mamont Android Banking Trojan Scheme
Description: PJSC Sberbank's security apparatus, in collaboration with Russian authorities, arrested three individuals for manufacturing and distributing 'Mamont,' an Android banking trojan that was spread through Telegram channels. The malware allowed illicit fund transfers from victims' accounts, made feasible by theft of banking credentials and sensitive financial data. Over 300 cybercrimes have been attributed to this scheme, comprising fraudulent transactions and unauthorized access to banking information. Authorities have seized equipment connected to the operation and have taken legal action against the perpetrators, continuing investigations into potential accomplices.
Type: Malware
Attack Vector: Android Banking Trojan
Vulnerability Exploited: Theft of banking credentials and sensitive financial data
Threat Actor: Three individuals manufacturing and distributing 'Mamont'
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Telegram channels.

Data Compromised: Banking credentials and sensitive financial data
Systems Affected: Android devices
Legal Liabilities: Legal action against the perpetrators
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Banking credentials and sensitive financial data.

Entity Name: PJSC Sberbank
Entity Type: Bank
Industry: Financial Services
Location: Russia

Law Enforcement Notified: Yes
Containment Measures: Arrests made and equipment seized

Type of Data Compromised: Banking credentials and sensitive financial data
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by arrests made and equipment seized.

Legal Actions: Legal action against the perpetrators
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Legal action against the perpetrators.

Investigation Status: Ongoing

Entry Point: Telegram channels
High Value Targets: Banking credentials and sensitive financial data
Data Sold on Dark Web: Banking credentials and sensitive financial data

Root Causes: Manufacturing and distributing 'Mamont' Android banking trojan
Last Attacking Group: The attacking group in the last incident was an Three individuals manufacturing and distributing 'Mamont'.
Most Significant Data Compromised: The most significant data compromised in an incident was Banking credentials and sensitive financial data.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Arrests made and equipment seized.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Banking credentials and sensitive financial data.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Legal action against the perpetrators.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Telegram channels.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.