Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Positive Technologies is a leading developer of products, solutions and services for result-driven cybersecurity that enable detection and prevention of attacks before they cause unacceptable damage to businesses and entire economic sectors. The company's technology portfolio covers most categories of information security tools and continues to expand. We create meta-products — a new generation of tools for achieving effective cybersecurity with minimal human involvement. For over 20 years, we've been creating and implementing technologies that demonstrate real results in cybersecurity and radically improve our clients' security levels.

Positive Technologies A.I CyberSecurity Scoring

AI scorePositive Technologies Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/positivetechnologies.jpeg
Positive Technologies Technology, Information and Internet
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePositive Technologies Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/positivetechnologies.jpeg
Positive Technologies Technology, Information and Internet
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Positive Technologies Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Positive TechnologiesCyber Attack2511/2023NA
Rankiteo Explanation :
Attack without any consequences

Description: DarkGaboon: Financially Motivated Ransomware Group Targets Russian Organizations A cybercrime group known as *DarkGaboon* has been conducting ransomware attacks against Russian companies since at least 2023, according to research by Russian cybersecurity firm *Positive Technologies*. First identified in January, the group has targeted organizations across banking, retail, tourism, and public services. In its latest campaign this spring, DarkGaboon deployed *LockBit 3.0* ransomware, a variant originally leaked in 2022 and widely adopted by cybercriminals. Unlike typical *LockBit* affiliates operating under a ransomware-as-a-service (RaaS) model, DarkGaboon appears to operate independently. The group relies on *Russian-language phishing emails* sent to financial department employees, using urgent messaging and malicious attachments disguised as legitimate financial documents. These decoy files, sourced from legitimate Russian-language templates, have remained largely unchanged since 2023. Once inside a victim’s network, DarkGaboon encrypts files with *LockBit 3.0* and leaves a ransom note in Russian, including two contact email addresses. Positive Technologies found no evidence of data exfiltration in recent attacks. The same email addresses were previously linked to *LockBit*-based attacks on Russian financial institutions in early 2023. While the identities behind DarkGaboon remain unknown, researchers suggest the perpetrators are likely Russian-speaking. The group uses open-source tools like *Revenge RAT* and *XWorm* to evade attribution, blending in with broader cybercriminal activity. Russian entities have faced prior *LockBit* attacks, including a December 2023 incident targeting a major Siberian dairy plant following its humanitarian aid donations to Russian military efforts in Ukraine. That attack, however, has not been attributed to DarkGaboon.

Positive Technologies: New hacker group uses LockBit ransomware variant to target Russian companies
Cyber Attack
Severity: 25
Impact: 1
Seen: 1/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: DarkGaboon: Financially Motivated Ransomware Group Targets Russian Organizations A cybercrime group known as *DarkGaboon* has been conducting ransomware attacks against Russian companies since at least 2023, according to research by Russian cybersecurity firm *Positive Technologies*. First identified in January, the group has targeted organizations across banking, retail, tourism, and public services. In its latest campaign this spring, DarkGaboon deployed *LockBit 3.0* ransomware, a variant originally leaked in 2022 and widely adopted by cybercriminals. Unlike typical *LockBit* affiliates operating under a ransomware-as-a-service (RaaS) model, DarkGaboon appears to operate independently. The group relies on *Russian-language phishing emails* sent to financial department employees, using urgent messaging and malicious attachments disguised as legitimate financial documents. These decoy files, sourced from legitimate Russian-language templates, have remained largely unchanged since 2023. Once inside a victim’s network, DarkGaboon encrypts files with *LockBit 3.0* and leaves a ransom note in Russian, including two contact email addresses. Positive Technologies found no evidence of data exfiltration in recent attacks. The same email addresses were previously linked to *LockBit*-based attacks on Russian financial institutions in early 2023. While the identities behind DarkGaboon remain unknown, researchers suggest the perpetrators are likely Russian-speaking. The group uses open-source tools like *Revenge RAT* and *XWorm* to evade attribution, blending in with broader cybercriminal activity. Russian entities have faced prior *LockBit* attacks, including a December 2023 incident targeting a major Siberian dairy plant following its humanitarian aid donations to Russian military efforts in Ukraine. That attack, however, has not been attributed to DarkGaboon.

Ailogo

Positive Technologies Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Positive Technologies

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for Positive Technologies in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Positive Technologies in 2026.

Incident Types Positive Technologies vs Technology, Information and Internet Industry Avg (This Year)

No incidents recorded for Positive Technologies in 2026.

Incident History — Positive Technologies (X = Date, Y = Severity)

Positive Technologies cyber incidents detection timeline including parent company and subsidiaries

Positive Technologies Company Subsidiaries

SubsidiaryImage

Positive Technologies is a leading developer of products, solutions and services for result-driven cybersecurity that enable detection and prevention of attacks before they cause unacceptable damage to businesses and entire economic sectors. The company's technology portfolio covers most categories of information security tools and continues to expand. We create meta-products — a new generation of tools for achieving effective cybersecurity with minimal human involvement. For over 20 years, we've been creating and implementing technologies that demonstrate real results in cybersecurity and radically improve our clients' security levels.

Loading...
similarCompanies

Positive Technologies Similar Companies

Independiente / Freelance

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot

At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre

We are a technology company that unlocks access to energy for the benefit of all. As innovators, that’s been our mission for nearly a century. Today, we face a global imperative to create a future with more energy, but less carbon. Our diverse, innovative change makers are focused on going further i

Times Internet

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar

NetEase

As a leading internet technology company based in China, NetEase, Inc. (NASDAQ: NTES and HKEX:9999, "NetEase") provides premium online services centered around content creation. With extensive offerings across its expanding gaming ecosystem, NetEase develops and operates some of China's most popula

Synechron

At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron’s progressive technologies and optimization strategies span end-to-end Artificial

Arrow Electronics

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology lands

Peraton

At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thinking differently. We'r

Primary School

www.primaryschool.com.au is a directory of sites for students and lesson plans and reference material for teachers and parents. It is currently averaging up to 350,000 unique visitors a month and has over 44,000 subscribers to its free weekly newsletter which showcases the latest internet based reso

newsone

Positive Technologies CyberSecurity News

December 18, 2025 08:00 AM
Ctrl+Alt+Defy, the white-hat hacker rewriting the cybersecurity rulebook

Ethical hacker Betta Lyon Delsordo is challenging outdated stereotypes, mentoring the next generation of girls in tech, and showing that...

December 02, 2025 08:00 AM
Research detects espionage foothold while investigating ransomware intrusion

Research detects an espionage foothold during a ransomware intrusion, uncovering hidden threats and revealing long-term attacker presence...

November 25, 2025 08:00 AM
The relationship between cybersecurity awareness and data protection behaviors among Saudi secondary school students: the mediating role of cyber threat perception and the moderating role of internet usage duration

The current study explored the relationship between cybersecurity awareness and protective behaviors among Saudi secondary school students.

November 22, 2025 08:00 AM
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian...

November 20, 2025 08:00 AM
Zero-Day Research Needed To Protect Mexico’s Infrastructure

Results-driven cybersecurity and zero-day research help organizations protect critical infrastructure, says Positive Technologies' Maria...

November 10, 2025 08:00 AM
The influence of Blockchain technology on reducing cybersecurity risks in financial transactions of commercial banks

This quantitative research investigates the influence of Blockchain technology on reducing cybersecurity risks in financial transactions of...

November 03, 2025 08:00 AM
Rethinking Layer 8: the human side of cybersecurity

People, not systems, are the weakest link. Enterprises must address human behaviour to strengthen cybersecurity resilience.

October 29, 2025 07:00 AM
Private Power And The Future Of Cyber Conflict – Analysis

By Abhishek Sharma. Currently, only states are recognised as legitimate actors permitted to undertake countermeasures against their...

September 19, 2025 07:00 AM
Morocco Wins Top Three Spots at Global Cybersecurity Competition

Rabat – Moroccan teams have taken the top three spots at the Standoff International Cyberbattle organized by Russian cybersecurity firm...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Positive Technologies CyberSecurity History Information

Official Website of Positive Technologies
Positive Technologies’s AI-Generated Cybersecurity Score

According to Rankiteo, Positive Technologies’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Positive Technologies’ have ?

According to Rankiteo, Positive Technologies currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Positive Technologies been affected by any supply chain cyber incidents ?

According to Rankiteo, Positive Technologies has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Positive Technologies have SOC 2 Type 1 certification ?

According to Rankiteo, Positive Technologies is not certified under SOC 2 Type 1.

Does Positive Technologies have SOC 2 Type 2 certification ?

According to Rankiteo, Positive Technologies does not hold a SOC 2 Type 2 certification.

Does Positive Technologies comply with GDPR ?

According to Rankiteo, Positive Technologies is not listed as GDPR compliant.

Does Positive Technologies have PCI DSS certification ?

According to Rankiteo, Positive Technologies does not currently maintain PCI DSS compliance.

Does Positive Technologies comply with HIPAA ?

According to Rankiteo, Positive Technologies is not compliant with HIPAA regulations.

Does Positive Technologies have ISO 27001 certification ?

According to Rankiteo,Positive Technologies is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Positive Technologies

Positive Technologies operates primarily in the Technology, Information and Internet industry.

Number of Employees at Positive Technologies

Positive Technologies employs approximately 711 people worldwide.

Subsidiaries Owned by Positive Technologies

Positive Technologies presently has no subsidiaries across any sectors.

Positive Technologies’s LinkedIn Followers

Positive Technologies’s official LinkedIn profile has approximately 9,636 followers.

NAICS Classification of Positive Technologies

Positive Technologies is classified under the NAICS code 513, which corresponds to Others.

Positive Technologies’s Presence on Crunchbase

No, Positive Technologies does not have a profile on Crunchbase.

Positive Technologies’s Presence on LinkedIn

Yes, Positive Technologies maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/positivetechnologies.

Cybersecurity Incidents Involving Positive Technologies

As of January 23, 2026, Rankiteo reports that Positive Technologies has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Positive Technologies has an estimated 13,463 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Positive Technologies ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: DarkGaboon Ransomware Attacks on Russian Companies

Description: A financially motivated cybercrime group dubbed DarkGaboon has been targeting Russian companies in a series of ransomware attacks, deploying LockBit 3.0 ransomware. The group uses phishing emails with malicious attachments to gain access to victim networks.

Date Detected: 2023

Type: Ransomware

Attack Vector: Phishing emails

Threat Actor: DarkGaboon

Motivation: Financial gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing emails with malicious attachments.

Impact of the Incidents

Which entities were affected by each incident ?

Incident : Ransomware POS1766629641

Entity Type: Organization

Industry: Banking, Retail, Tourism, Public Services

Location: Russia

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware POS1766629641

Data Exfiltration: No signs of data exfiltration in recent incidents

Data Encryption: Files encrypted using LockBit 3.0

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware POS1766629641

Ransomware Strain: LockBit 3.0

Data Encryption: Yes

Data Exfiltration: No signs of data exfiltration in recent incidents

References

Where can I find more information about each incident ?

Incident : Ransomware POS1766629641

Source: Positive Technologies

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Positive Technologies.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Ransomware POS1766629641

Entry Point: Phishing emails with malicious attachments

High Value Targets: Employees in financial departments

Data Sold on Dark Web: Employees in financial departments

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an DarkGaboon.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Positive Technologies.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing emails with malicious attachments.

cve

Latest Global CVEs (Not Company-Specific)

Description

Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in `backend.reading.allow` to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in `@backstage/backend-defaults` version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict `backend.reading.allow` to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.

Risk Information
cvss3
Base: 3.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
Description

Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the `resolveSafeChildPath` utility function in `@backstage/backend-plugin-api`, which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating `link1 → link2 → /outside` where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in `@backstage/backend-plugin-api` version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.

Risk Information
cvss3
Base: 6.3
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Description

Backstage is an open framework for building developer portals. Multiple Scaffolder actions and archive extraction utilities were vulnerable to symlink-based path traversal attacks. An attacker with access to create and execute Scaffolder templates could exploit symlinks to read arbitrary files via the `debug:log` action by creating a symlink pointing to sensitive files (e.g., `/etc/passwd`, configuration files, secrets); delete arbitrary files via the `fs:delete` action by creating symlinks pointing outside the workspace, and write files outside the workspace via archive extraction (tar/zip) containing malicious symlinks. This affects any Backstage deployment where users can create or execute Scaffolder templates. This vulnerability is fixed in `@backstage/backend-defaults` versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0; `@backstage/plugin-scaffolder-backend` versions 2.2.2, 3.0.2, and 3.1.1; and `@backstage/plugin-scaffolder-node` versions 0.11.2 and 0.12.3. Users should upgrade to these versions or later. Some workarounds are available. Follow the recommendation in the Backstage Threat Model to limit access to creating and updating templates, restrict who can create and execute Scaffolder templates using the permissions framework, audit existing templates for symlink usage, and/or run Backstage in a containerized environment with limited filesystem access.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:L
Description

FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.

Risk Information
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., `email`, `groups`), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting `username` and `groups` values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.

Risk Information
cvss3
Base: 5.3
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=positivetechnologies' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge