Company Details
saudi-aramco
152,474
6,041,279
211
aramco.com
0
ARA_2248243
In-progress

aramco Company CyberSecurity Posture
aramco.comWe’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemicals companies. And we are part of the global effort toward building a low carbon economy. Our horizon has never been clearer.
Company Details
saudi-aramco
152,474
6,041,279
211
aramco.com
0
ARA_2248243
In-progress
Between 800 and 849

aramco Global Score (TPRM)XXXX

Description: In August 2017, the Petro Rabigh complex, part-operated by Saudi Aramco, experienced a significant cybersecurity incident involving the Triton malware. This malware targeted Schneider Electric safety equipment within the facility, leading to the shutdown of part of the complex. The attack was distinguished by its sophistication, targeting the safety systems designed to prevent catastrophic industrial accidents. The Triton malware attack not only signaled a new chapter in cyber warfare aimed at industrial control systems but also demonstrated the potential for causing physical damage and even loss of life. The attack was later attributed with high confidence to a state-backed actor, showcasing the evolving landscape of cyber threats to critical infrastructure around the globe. The incident underscored the necessity for heightened cybersecurity measures and resilience against sophisticated cyberespionage tools targeting industrial safety and control systems.


No incidents recorded for aramco in 2025.
No incidents recorded for aramco in 2025.
No incidents recorded for aramco in 2025.
aramco cyber incidents detection timeline including parent company and subsidiaries

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemicals companies. And we are part of the global effort toward building a low carbon economy. Our horizon has never been clearer.

Baker Hughes (NASDAQ: BKR) is an energy technology company that provides solutions for energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, clea

Petróleos de Venezuela S.A. is a Venezuelan state company, began operations on January 1st, 1976 and whose activities are the oil exploration, production, refining, marketing and transportation of Venezuelan oil as well as the orimulsion, chemical, petrochemical businesses and coal. We have the lar
En YPF, tenemos un Plan 4x4 para convertirnos en una compañía de clase mundial y lograr transformarnos en grandes exportadores de hidrocarburos. Nuestros cuatro pilares son: la aceleración de la producción de petróleo en Vaca Muerta, el activo más importante que tiene nuestro país; la disciplina f
Weatherford International plc (Nasdaq: WFRD) is a leading global energy services company. Operating in approximately 75 countries, the Company answers the challenges of the energy industry with its global talent network of approximately 17,000 team members and approximately 350 operating locations,

Valero is an international manufacturer and marketer of transportation fuels and petrochemical products. We are a Fortune 500 company based in San Antonio, Texas, fueled by nearly 10,000 employees and 15 petroleum refineries with a combined throughput capacity of approximately 3.2 million barrels pe

NOV delivers technology-driven solutions to empower the global energy industry. For more than 150 years, NOV has pioneered innovations that enable its customers to safely produce abundant energy while minimizing environmental impact. The energy industry depends on NOV’s deep expertise and technology
Petróleos Mexicanos es la mayor empresa de México, el mayor contribuyente fiscal del país, así como una de las empresas más grandes de América Latina. Es de las pocas empresas petroleras del mundo que desarrolla toda la cadena productiva de la industria, desde la exploración, hasta la distribució

Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de

TechnipFMC is a leading technology provider to the traditional and new energies industry, delivering fully integrated projects, products, and services. With our proprietary technologies and comprehensive solutions, we are transforming our clients’ project economics, helping them unlock new possibi
.png)
Aramco Ventures, the investment arm of Saudi oil-major Saudi Aramco, is opening an office in Paris to manage and expand its European...
Saudi Arabia's National Cybersecurity Authority (NCA) has granted Tier 1 licenses to six companies to provide Managed Security Operations...
A threat actor operating on a dark web forum has allegedly published 11 GB of data purportedly belonging to Saudi Arabia's General Intelligence Presidency (GIP...
As risks evolve, organisations must strengthen resilience through collaboration and vigilance, the World Economic Forum advises in its...
Honeywell (NASDAQ: HON) has launched a new center in Jubail, Saudi Arabia, dedicated to providing localized Honeywell cybersecurity...
Discover how to get a cybersecurity analyst role in Saudi Arabia. Learn about education, essential skills, networking, and job search...
With CISOs leading the security posture of a company, Cyber Magazine examines the top 10 CISOs who exemplify excellence in the field.
Aramco Digital is at the forefront of Saudi Arabia's shift toward a technology-driven economy, implementing key initiatives in cybersecurity, 5G infrastructure...
Ahmad Al-Khowaiter, Aramco EVP of Technology & Innovation, speaks at the Global AI Summit (GAIN) in Riyadh, Saudi Arabia.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of aramco is https://www.aramco.com.
According to Rankiteo, aramco’s AI-generated cybersecurity score is 836, reflecting their Good security posture.
According to Rankiteo, aramco currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, aramco is not certified under SOC 2 Type 1.
According to Rankiteo, aramco does not hold a SOC 2 Type 2 certification.
According to Rankiteo, aramco is not listed as GDPR compliant.
According to Rankiteo, aramco does not currently maintain PCI DSS compliance.
According to Rankiteo, aramco is not compliant with HIPAA regulations.
According to Rankiteo,aramco is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
aramco operates primarily in the Oil and Gas industry.
aramco employs approximately 152,474 people worldwide.
aramco presently has no subsidiaries across any sectors.
aramco’s official LinkedIn profile has approximately 6,041,279 followers.
aramco is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
Yes, aramco has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/aramco-overseas-company.
Yes, aramco maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/saudi-aramco.
As of December 06, 2025, Rankiteo reports that aramco has experienced 1 cybersecurity incidents.
aramco has an estimated 10,499 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Triton Malware Attack on Petro Rabigh Complex
Description: In August 2017, the Petro Rabigh complex, part-operated by Saudi Aramco, experienced a significant cybersecurity incident involving the Triton malware. This malware targeted Schneider Electric safety equipment within the facility, leading to the shutdown of part of the complex. The attack was distinguished by its sophistication, targeting the safety systems designed to prevent catastrophic industrial accidents. The Triton malware attack not only signaled a new chapter in cyber warfare aimed at industrial control systems but also demonstrated the potential for causing physical damage and even loss of life. The attack was later attributed with high confidence to a state-backed actor, showcasing the evolving landscape of cyber threats to critical infrastructure around the globe. The incident underscored the necessity for heightened cybersecurity measures and resilience against sophisticated cyberespionage tools targeting industrial safety and control systems.
Date Detected: August 2017
Type: Cyberattack
Attack Vector: Malware
Vulnerability Exploited: Schneider Electric safety equipment
Threat Actor: State-backed actor
Motivation: Cyber warfare, industrial espionage
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Schneider Electric safety equipment
Downtime: Partial shutdown of the complex
Operational Impact: Significant
Brand Reputation Impact: High

Entity Name: Petro Rabigh
Entity Type: Industrial Complex
Industry: Oil and Gas
Location: Saudi Arabia

Lessons Learned: Necessity for heightened cybersecurity measures and resilience against sophisticated cyberespionage tools targeting industrial safety and control systems.

Recommendations: Heightened cybersecurity measures and resilience against sophisticated cyberespionage tools.
Key Lessons Learned: The key lessons learned from past incidents are Necessity for heightened cybersecurity measures and resilience against sophisticated cyberespionage tools targeting industrial safety and control systems.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Heightened cybersecurity measures and resilience against sophisticated cyberespionage tools..

Root Causes: Vulnerabilities in Schneider Electric safety equipment
Last Attacking Group: The attacking group in the last incident was an State-backed actor.
Most Recent Incident Detected: The most recent incident detected was on August 2017.
Most Significant System Affected: The most significant system affected in an incident was Schneider Electric safety equipment.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Necessity for heightened cybersecurity measures and resilience against sophisticated cyberespionage tools targeting industrial safety and control systems.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Heightened cybersecurity measures and resilience against sophisticated cyberespionage tools..
.png)
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.