Profero Company Cyber Security Posture

profero.io

Profero https://www.linkedin.com/in/omrimoyal

Profero Company Details

Linkedin ID:

proferosec

Employees number:

28 employees

Number of followers:

1280.0

NAICS:

none

Industry Type:

Computer and Network Security

Homepage:

profero.io

IP Addresses:

Scan still pending

Company ID:

PRO_2263050

Scan Status:

In-progress

AI scoreProfero Risk Score (AI oriented)

Between 200 and 800

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreProfero Global Score
blurone
Ailogo

Profero Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 800

Profero Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Profero's clientRansomware10058/2025PRO223081225Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: The company experienced a ransomware attack by the DarkBit gang, which encrypted multiple VMware ESXi servers. The attackers, linked to the Iranian state-sponsored APT group MuddyWater, did not engage in ransom negotiations but aimed to cause operational disruption and reputational damage. Profero successfully decrypted the files by exploiting weaknesses in DarkBit's encryption, recovering significant data without paying the ransom. The attack was politically motivated, likely in retaliation for drone strikes in Iran.

Profero Company Subsidiaries

SubsidiaryImage

Profero https://www.linkedin.com/in/omrimoyal

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=proferosec' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Profero Cyber Security News

2025-08-12T09:26:28.000Z
Researchers cracked the encryption used by DarkBit ransomware

Researchers at cybersecurity firm Profero cracked DarkBit ransomware encryption, allowing victims to recover files for free.

2021-02-13T08:00:00.000Z
As cyberattacks peak, so does the demand for Profero's services

Profero has been receiving more and more approaches since the outbreak of the pandemic to help in cases of sextortion in which people areย ...

2023-10-13T07:00:00.000Z
Israeli cyber security professionals band together amid Gaza war

A disparate group of hacktivists claiming to act in support of the Palestinian people have attempted intrusions and sabotage efforts. Websitesย ...

2022-06-02T07:00:00.000Z
Previously unreported Lebanon-based hacking group targeting Israel, Microsoft says

The new group is suspected of collaborating with "multiple" Iranian-linked hacking efforts.

2022-07-07T07:00:00.000Z
Online programming IDEs can be used to launch remote cyberattacks

Security researchers are warning that hackers can abuse online programming learning platforms to remotely launch cyberattacks, steal data,ย ...

2022-08-31T07:00:00.000Z
US issues rare security alert as Montenegro battles ongoing ransomware attack

The U.S. Embassy issued an unprecedented warning about an "persistent and ongoing" cyberattack in the eastern European country.

2020-12-19T08:00:00.000Z
โ€˜The Iranians are waiting for the Israeli responseโ€™: Who is behind the latest cyberattack on Israeli firms?

Israel is in the midst of a massive cyberattack by an Iranian group calling itself Pay2Key. The experts who first discovered it share whatย ...

2020-10-18T07:00:00.000Z
Report: Iranian hacking group launched concentrated attack on Israeli companies

The Iranian hacker group, dubbed MuddyWater, used a relatively new tactic in order to penetrate the Israeli companies' security systems. Hackingย ...

2023-10-13T07:00:00.000Z
Israeli cyber-security professionals band together amid Gaza war

Mr Ohad Zaidenberg, an Israeli information technology specialist, is leading a group of volunteers to help Israeli companies that are beingย ...

similarCompanies

Profero Similar Companies

CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the worldโ€™s most advanced cloud-native platform for protecting critical areas of enterprise risk โ€” endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

Thales Cyber Solutions

Drawing on a team of 6,000 experts and developers, Thales is a global leader in cybersecurity โ€šร„รฌ no.1 in data security - with solutions deployed in 148 countries, generating annual revenues in excess of โ€šร‡ยจ2 billion in the domain. Thales supports its enterprise and government customers in the cybe

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Profero CyberSecurity History Information

How many cyber incidents has Profero faced?

Total Incidents: According to Rankiteo, Profero has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Profero?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does Profero detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with profero and remediation measures with decryption of files, recovery of data from vmdk files and recovery measures with brute-forcing decryption keys, extracting data from sparse vmdk files.

Incident Details

Can you provide details on each incident?

Incident : Ransomware Attack

Title: DarkBit Ransomware Attack on VMware ESXi Servers

Description: Cybersecurity firm Profero cracked the encryption of the DarkBit ransomware gang's encryptors, allowing them to recover a victim's files for free without paying a ransom. The attack targeted VMware ESXi servers and was linked to Iranian state-sponsored APT group MuddyWater.

Date Detected: 2023

Type: Ransomware Attack

Attack Vector: Ransomware

Threat Actor: DarkBit (linked to MuddyWater, Iranian state-sponsored APT group)

Motivation: Retaliation for 2023 drone strikes in Iran, operational disruption, reputational damage

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware Attack PRO223081225

Systems Affected: VMware ESXi servers

Operational Impact: Operational disruption

Brand Reputation Impact: Reputational damage

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware Attack PRO223081225

Incident Response Plan Activated: True

Third Party Assistance: Profero

Remediation Measures: Decryption of files, recovery of data from VMDK files

Recovery Measures: Brute-forcing decryption keys, extracting data from sparse VMDK files

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Profero.

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware Attack PRO223081225

Data Encryption: AES-128-CBC with RSA-2048

File Types Exposed: VMDK files

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Decryption of files, recovery of data from VMDK files.

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware Attack PRO223081225

Ransom Demanded: 80 Bitcoin

Ransom Paid: None

Ransomware Strain: DarkBit

Data Encryption: AES-128-CBC with RSA-2048

How does the company recover data encrypted by ransomware?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Brute-forcing decryption keys, extracting data from sparse VMDK files.

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Ransomware Attack PRO223081225

Lessons Learned: DarkBit's objectives would have been better served with a data wiper rather than ransomware.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are DarkBit's objectives would have been better served with a data wiper rather than ransomware.

References

Where can I find more information about each incident?

Incident : Ransomware Attack PRO223081225

Source: BleepingComputer

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Ransomware Attack PRO223081225

Investigation Status: Resolved

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Ransomware Attack PRO223081225

Root Causes: Low entropy key generation in DarkBit ransomware

Corrective Actions: Development of a tool to brute-force decryption keys, extraction of data from sparse VMDK files

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Profero.

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Development of a tool to brute-force decryption keys, extraction of data from sparse VMDK files.

Additional Questions

General Information

Has the company ever paid ransoms?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was 80 Bitcoin.

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an DarkBit (linked to MuddyWater and Iranian state-sponsored APT group).

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2023.

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was VMware ESXi servers.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Profero.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 80 Bitcoin.

What was the highest ransom paid in a ransomware incident?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was None.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was DarkBit's objectives would have been better served with a data wiper rather than ransomware.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is BleepingComputer.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge