Company Details
s-rm
374
48,706
5616
s-rminform.com
0
S-R_2459360
In-progress


S-RM Company CyberSecurity Posture
s-rminform.comS-RM is a global intelligence and cyber security consultancy. Founded in 2005, we have 400+ practitioners spanning nine international offices, serving clients across all regions and major sectors. We support our clients by providing intelligence that informs critical decision-making and strategies, from investments and partnerships through to disputes; by helping organisations build resilience to cyber security threats; and by responding to cyber-attacks and organisational crises. Client focus is at the heart of what we do. Our advice is direct, honest and objective. We deliver actionable results for our clients by bringing together the best talent and creating teams designed to address unique problems and complex challenges. For more information: www.s-rminform.com
Company Details
s-rm
374
48,706
5616
s-rminform.com
0
S-R_2459360
In-progress
Between 0 and 549

S-RM Global Score (TPRM)XXXX

Description: Weaxor Ransomware Exploits React2Shell Vulnerability in Rapid Attacks A ransomware gang leveraged the critical React2Shell vulnerability (CVE-2025-55182) to breach corporate networks and deploy Weaxor ransomware in under a minute. The flaw, an insecure deserialization issue in React Server Components (RSC) and Next.js, allows unauthenticated remote code execution on vulnerable servers. First disclosed in late 2024, React2Shell quickly became a target for both nation-state hackers deploying cyberespionage tools like EtherRAT and cybercriminals, who used it for cryptocurrency mining. On December 5, researchers at S-RM observed the Weaxor ransomware operation exploiting the vulnerability in a real-world attack. Weaxor, a rebrand of the Mallox/FARGO ransomware (active since 2024), is a low-complexity operation targeting public-facing servers with opportunistic attacks. Unlike more advanced ransomware groups, it does not exfiltrate data or use double-extortion tactics, instead demanding relatively modest ransoms. The attack unfolded rapidly: - Initial access via React2Shell was followed by an obfuscated PowerShell command deploying a Cobalt Strike beacon for command-and-control (C2). - The threat actor disabled Windows Defender’s real-time protection before executing the ransomware payload. - Encrypted files received the .WEAX extension, with ransom notes (RECOVERY INFORMATION.txt) left in affected directories. - The attackers wiped volume shadow copies and cleared event logs to hinder recovery and forensic analysis. Notably, the breach remained contained to the vulnerable endpoint, with no observed lateral movement. However, the same compromised host was later targeted by additional attackers, underscoring the high demand for React2Shell exploits. S-RM researchers recommend monitoring for suspicious process creation particularly cmd.exe or PowerShell spawned from node.exe as well as unusual outbound connections, disabled security tools, and log tampering. While patching is critical, defenders should also review EDR telemetry for signs of exploitation.
Description: S-RM encountered a sophisticated ransomware attack initiated by the Akira group, involving the exploitation of IoT devices, specifically an insecure webcam, to bypass EDR tools and encrypt files on the network. This innovative tactic allowed the attackers to overcome security measures and establish persistent access through AnyDesk.exe and lateral movement via RDP. The incident required a response team to address the breach and implement new security strategies. The data exfiltration and encryption caused considerable disruption to the company's operations, likely affecting its finances and reputation due to the sophisticated nature of the attack.


No incidents recorded for S-RM in 2026.
No incidents recorded for S-RM in 2026.
No incidents recorded for S-RM in 2026.
S-RM cyber incidents detection timeline including parent company and subsidiaries

S-RM is a global intelligence and cyber security consultancy. Founded in 2005, we have 400+ practitioners spanning nine international offices, serving clients across all regions and major sectors. We support our clients by providing intelligence that informs critical decision-making and strategies, from investments and partnerships through to disputes; by helping organisations build resilience to cyber security threats; and by responding to cyber-attacks and organisational crises. Client focus is at the heart of what we do. Our advice is direct, honest and objective. We deliver actionable results for our clients by bringing together the best talent and creating teams designed to address unique problems and complex challenges. For more information: www.s-rminform.com


Force humaine de près de 100 000 hommes et femmes placée sous l’autorité du ministère de l’Intérieur, la Gendarmerie nationale est une institution militaire garante de la sécurité et de la paix de nos concitoyens, et de la protection de leurs biens. Elle assure des missions de police judiciaire, d'a
At Prosegur, being aware of who we are is what defines our identity and commitment. 🌐 We are Prosegur. Leaders in the private security sector for more than 45 years and in more than 30 countries. 💡 We are innovation. We reinvent ourselves, adapt and integrate trends to offer more advanced security.

Door de juiste inzet van mens, kennis en techniek vinden we de ideale ‘veiligheidsbalans’ voor iedere situatie. Dat begint altijd met heel goed luisteren om zo te doorgronden wat de specifieke omstandigheden en wensen van de klant zijn. Vervolgens groeien we samen naar de gewenste situatie waarin de

One of the largest companies in the professional services and security markets in Brazil. Formed by four branches, patrimonial security, personal security, electronic security and general services. Counting with around 16.000 employees, Gocil is present at several brazillian states and offers its se

Securitas knows Security. It is our only business. As The Leader in Protective Services, we invest in people, knowledge and technology to deliver customized, cost-effective and class-leading solutions. Our parent company, Securitas AB, is a global company headquartered in Stockholm, Sweden and emplo
G4S is a leading security and facility services company that provides proactive security services and cutting-edge smart technology to deliver tailored, integrated security solutions that allow clients to focus on their core business. Through a global workforce of approximately 800,000 people, we le
GardaWorld is the world’s largest privately-owned security services company, offering cash services, physical and specialized security solutions, and with our Crisis24 portal, the dissemination of verified information related to international security. GardaWorld est la plus importante entreprise
.png)
Inside Britain's cyber crisis rooms, S-RM and the NCSC navigate ransomware attacks, ransom ethics and rapid response as firms weigh paying...
Cybersecurity experts reveal what they do for high-profile clients targeted by hackers such as Scattered Spider.
This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems.
With marked policy shifts and regulatory uncertainty impacting the energy and environment sectors, many deals have fallen through...
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and...
Global intelligence and cyber security consultancy S-RM has promoted Casey O'Brien to global head of incident response.
S-RM has named Casey O'Brien as Global Head of Incident Response to boost its 24/7 cyber security services across EMEA, APAC and North...
Researchers at South Korea's cybersecurity firm Genians say North Korean hacking group KONNI used Google's Find My Device service to...
Attacks by the Qilin ransomware gang have escalated, with the group exploiting vulnerable VPN appliances and management interfaces to mostly...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of S-RM is https://www.s-rminform.com.
According to Rankiteo, S-RM’s AI-generated cybersecurity score is 529, reflecting their Critical security posture.
According to Rankiteo, S-RM currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, S-RM has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, S-RM is not certified under SOC 2 Type 1.
According to Rankiteo, S-RM does not hold a SOC 2 Type 2 certification.
According to Rankiteo, S-RM is not listed as GDPR compliant.
According to Rankiteo, S-RM does not currently maintain PCI DSS compliance.
According to Rankiteo, S-RM is not compliant with HIPAA regulations.
According to Rankiteo,S-RM is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
S-RM operates primarily in the Security and Investigations industry.
S-RM employs approximately 374 people worldwide.
S-RM presently has no subsidiaries across any sectors.
S-RM’s official LinkedIn profile has approximately 48,706 followers.
S-RM is classified under the NAICS code 5616, which corresponds to Investigation and Security Services.
No, S-RM does not have a profile on Crunchbase.
Yes, S-RM maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/s-rm.
As of January 25, 2026, Rankiteo reports that S-RM has experienced 2 cybersecurity incidents.
S-RM has an estimated 3,674 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with s-rm (corporate intelligence and cybersecurity company), and enhanced monitoring with review of windows event logs and edr telemetry for process creation from node/react binaries..
Title: Sophisticated Ransomware Attack on S-RM
Description: S-RM encountered a sophisticated ransomware attack initiated by the Akira group, involving the exploitation of IoT devices, specifically an insecure webcam, to bypass EDR tools and encrypt files on the network. This innovative tactic allowed the attackers to overcome security measures and establish persistent access through AnyDesk.exe and lateral movement via RDP. The incident required a response team to address the breach and implement new security strategies. The data exfiltration and encryption caused considerable disruption to the company's operations, likely affecting its finances and reputation due to the sophisticated nature of the attack.
Type: Ransomware
Attack Vector: Insecure IoT DeviceAnyDesk.exeRDP
Vulnerability Exploited: Insecure webcam
Threat Actor: Akira group
Motivation: Financial gain and data exfiltration
Title: Weaxor Ransomware Attack via React2Shell Vulnerability
Description: A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate networks and deployed the Weaxor ransomware strain within less than a minute. The attack involved disabling Windows Defender, deploying Cobalt Strike, and encrypting files without evidence of lateral movement or data exfiltration.
Date Detected: 2024-12-05
Type: Ransomware
Attack Vector: Insecure deserialization (React2Shell - CVE-2025-55182)
Vulnerability Exploited: CVE-2025-55182 (React2Shell)
Threat Actor: Weaxor ransomware gang (rebrand of Mallox/FARGO/TargetCompany)
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Insecure webcam and React2Shell vulnerability (CVE-2025-55182).

Operational Impact: Considerable disruption
Brand Reputation Impact: Likely affected

Systems Affected: Public-facing servers, vulnerable endpoints
Operational Impact: File encryption, system disruption

Entity Type: Corporate

Third Party Assistance: S-RM (corporate intelligence and cybersecurity company)
Enhanced Monitoring: Review of Windows event logs and EDR telemetry for process creation from Node/React binaries
Third-Party Assistance: The company involves third-party assistance in incident response through S-RM (corporate intelligence and cybersecurity company).

Data Encryption: True

Data Encryption: True

Lessons Learned: Patching alone is insufficient; monitoring for unusual process creation (e.g., cmd.exe/powershell.exe from node.exe) and disabled security solutions is critical. React2Shell is actively exploited by multiple threat actors.

Recommendations: Review Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe, Apply patches for CVE-2025-55182 and implement additional security controlsReview Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe, Apply patches for CVE-2025-55182 and implement additional security controlsReview Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe, Apply patches for CVE-2025-55182 and implement additional security controlsReview Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe, Apply patches for CVE-2025-55182 and implement additional security controls
Key Lessons Learned: The key lessons learned from past incidents are Patching alone is insufficient; monitoring for unusual process creation (e.g., cmd.exe/powershell.exe from node.exe) and disabled security solutions is critical. React2Shell is actively exploited by multiple threat actors.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Review Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe and Apply patches for CVE-2025-55182 and implement additional security controls.

Source: S-RM
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: S-RM.

Investigation Status: Completed (by S-RM)

Entry Point: React2Shell vulnerability (CVE-2025-55182)
Backdoors Established: Cobalt Strike beacon

Root Causes: Insecure IoT devices

Root Causes: Exploitation of unpatched React2Shell vulnerability (CVE-2025-55182) in React Server Components (RSC) 'Flight' protocol
Corrective Actions: Patch Vulnerable Systems, Enhance Monitoring For Exploitation Indicators, Implement Network Segmentation And Endpoint Protection,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as S-RM (corporate intelligence and cybersecurity company), Review of Windows event logs and EDR telemetry for process creation from Node/React binaries.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patch Vulnerable Systems, Enhance Monitoring For Exploitation Indicators, Implement Network Segmentation And Endpoint Protection, .
Last Attacking Group: The attacking group in the last incident were an Akira group and Weaxor ransomware gang (rebrand of Mallox/FARGO/TargetCompany).
Most Recent Incident Detected: The most recent incident detected was on 2024-12-05.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was S-RM (corporate intelligence and cybersecurity company).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Patching alone is insufficient; monitoring for unusual process creation (e.g., cmd.exe/powershell.exe from node.exe) and disabled security solutions is critical. React2Shell is actively exploited by multiple threat actors.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Review Windows event logs and EDR telemetry for evidence of React2Shell exploitation, Investigate unusual outbound connections, disabled security solutions, log clearing, and resource spikes, Monitor for process spawning of cmd.exe or powershell.exe from node.exe and Apply patches for CVE-2025-55182 and implement additional security controls.
Most Recent Source: The most recent source of information about an incident is S-RM.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (by S-RM).
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Insecure webcam and React2Shell vulnerability (CVE-2025-55182).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insecure IoT devices, Exploitation of unpatched React2Shell vulnerability (CVE-2025-55182) in React Server Components (RSC) 'Flight' protocol.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patch vulnerable systemsEnhance monitoring for exploitation indicatorsImplement network segmentation and endpoint protection.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.