Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity and digital solutions. With a nationwide network of over 271,000 BTS, we serve 159.4 million mobile users and 9.6 million fixed broadband (IndiHome B2C) customers. We continually expand our 4G coverage, advance 5G innovation, and deploy the latest fixed broadband technologies to enhance our customers' experiences. Beyond connectivity, Telkomsel plays a key role in driving Indonesia's digital transformation through services such as Digital Lifestyle, Advertising, Enterprise Solutions, and the Internet of Things (IoT). Guided by Environmental, Social, and Governance (ESG) principles, we are committed to creating a sustainable and inclusive digital ecosystem that benefits both people and the planet. Discover more at telkomsel.com or connect via the MyTelkomsel App, Facebook (Telkomsel), X (@telkomsel), and Instagram (@telkomsel).

Telkomsel A.I CyberSecurity Scoring

Telkomsel

Company Details

Linkedin ID:

telkomsel

Employees number:

16,661

Number of followers:

509,817

NAICS:

517

Industry Type:

Telecommunications

Homepage:

telkomsel.com

IP Addresses:

0

Company ID:

TEL_1085853

Scan Status:

In-progress

AI scoreTelkomsel Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/telkomsel.jpeg
Telkomsel Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreTelkomsel Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/telkomsel.jpeg
Telkomsel Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Telkomsel Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
TelkomselData Leak85407/2020NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A man who worked at the customer service unit of state-owned telecommunication company Telkomsel stole personal data of social media sensation Denny Siregar. He accessed personal data of Telkomsel customers. The suspect is an outsourced worker at Grapari with limited access to the company’s data server. The suspect took a picture of Denny’s personal data and published it on Twitter account @opposite6890. Police charged him under the Electronic Information and Transaction (ITE) Law.

Telkomsel
Data Leak
Severity: 85
Impact: 4
Seen: 07/2020
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A man who worked at the customer service unit of state-owned telecommunication company Telkomsel stole personal data of social media sensation Denny Siregar. He accessed personal data of Telkomsel customers. The suspect is an outsourced worker at Grapari with limited access to the company’s data server. The suspect took a picture of Denny’s personal data and published it on Twitter account @opposite6890. Police charged him under the Electronic Information and Transaction (ITE) Law.

Ailogo

Telkomsel Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Telkomsel

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Telkomsel in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Telkomsel in 2026.

Incident Types Telkomsel vs Telecommunications Industry Avg (This Year)

No incidents recorded for Telkomsel in 2026.

Incident History — Telkomsel (X = Date, Y = Severity)

Telkomsel cyber incidents detection timeline including parent company and subsidiaries

Telkomsel Company Subsidiaries

SubsidiaryImage

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity and digital solutions. With a nationwide network of over 271,000 BTS, we serve 159.4 million mobile users and 9.6 million fixed broadband (IndiHome B2C) customers. We continually expand our 4G coverage, advance 5G innovation, and deploy the latest fixed broadband technologies to enhance our customers' experiences. Beyond connectivity, Telkomsel plays a key role in driving Indonesia's digital transformation through services such as Digital Lifestyle, Advertising, Enterprise Solutions, and the Internet of Things (IoT). Guided by Environmental, Social, and Governance (ESG) principles, we are committed to creating a sustainable and inclusive digital ecosystem that benefits both people and the planet. Discover more at telkomsel.com or connect via the MyTelkomsel App, Facebook (Telkomsel), X (@telkomsel), and Instagram (@telkomsel).

Loading...
similarCompanies

Telkomsel Similar Companies

Telefónica

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

MTS Group

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

TIM Brasil

A TIM é a empresa de telefonia móvel que mais cresce no Brasil. Atualmente, possui mais de 13 mil colaboradores em todo o país que trabalham entregando serviços inovadores e de qualidade em telefonia móvel, fixa e internet banda larga. É uma companhia feita de pessoas criativas, com energia real

Globe Telecom

Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

airtel

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

Spectrum

Charter Communications, Inc. (NASDAQ: CHTR) is a leading broadband connectivity company and cable operator with services available to more than 57 million homes and businesses in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a full range of state-o

BT Group

We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co

Airtel Africa

Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a

newsone

Telkomsel CyberSecurity News

October 30, 2025 07:00 AM
What Is Mobile Device Management? 5 Must-Have Features

Discover what is mobile device management and how it helps businesses secure, manage, and control all mobile devices from one platform.

October 28, 2025 07:00 AM
Telcos in Transition: Can Singtel and StarHub Deliver Growth Beyond 5G?

Explore the future of Singtel and StarHub as they navigate growth challenges in the evolving telecom sector.

October 15, 2025 07:00 AM
8 QRIS Benefits for MSMEs: Streamline Payments, Grow Business

Discover the benefits of QRIS for MSMEs. Learn how this digital payment system can simplify transactions and drive growth in your business.

October 14, 2025 07:00 AM
$500 bn B2B Opportunity for Telecom Operators: GSMA Highlights Enterprise Digital Transformation Market Growth

GSMA Intelligence estimates a $500 billion opportunity for telecom operators from the enterprise digital transformation market.

September 26, 2025 07:00 AM
7 Mobile Device Security Tips to Prevent Business Threats

Learnn mobile device security management best practice to protect business from evolving mobile device security threats and and boost...

September 26, 2025 07:00 AM
Next-Level Biometric Security with Palm Vein Reader

Telkomsel Enterprise and Tencent Cloud join in a strategic collaboration to drive secure digital transformation using advanced Palm Vein...

September 25, 2025 07:00 AM
Mobile Device Management Solutions to Secure Business Devices

What is mobile device management (MDM) and how mobile device management solutions protect your business data from cyber threats and...

September 24, 2025 07:00 AM
BYOD: Risks and How to Secure Your Business

BYOD is a workplace policy that permits employees to bring and use their own personal devices. like smartphones, tablets, and laptops for...

September 23, 2025 07:00 AM
Igloo and Telkomsel partner to offer embedded insurance in Indonesia

Singapore-based regional insurtech Igloo has partnered with Telkomsel, Indonesia's biggest telecommunications service provider, to introduce...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Telkomsel CyberSecurity History Information

Official Website of Telkomsel

The official website of Telkomsel is http://www.telkomsel.com.

Telkomsel’s AI-Generated Cybersecurity Score

According to Rankiteo, Telkomsel’s AI-generated cybersecurity score is 773, reflecting their Fair security posture.

How many security badges does Telkomsel’ have ?

According to Rankiteo, Telkomsel currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Telkomsel been affected by any supply chain cyber incidents ?

According to Rankiteo, Telkomsel has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Telkomsel have SOC 2 Type 1 certification ?

According to Rankiteo, Telkomsel is not certified under SOC 2 Type 1.

Does Telkomsel have SOC 2 Type 2 certification ?

According to Rankiteo, Telkomsel does not hold a SOC 2 Type 2 certification.

Does Telkomsel comply with GDPR ?

According to Rankiteo, Telkomsel is not listed as GDPR compliant.

Does Telkomsel have PCI DSS certification ?

According to Rankiteo, Telkomsel does not currently maintain PCI DSS compliance.

Does Telkomsel comply with HIPAA ?

According to Rankiteo, Telkomsel is not compliant with HIPAA regulations.

Does Telkomsel have ISO 27001 certification ?

According to Rankiteo,Telkomsel is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Telkomsel

Telkomsel operates primarily in the Telecommunications industry.

Number of Employees at Telkomsel

Telkomsel employs approximately 16,661 people worldwide.

Subsidiaries Owned by Telkomsel

Telkomsel presently has no subsidiaries across any sectors.

Telkomsel’s LinkedIn Followers

Telkomsel’s official LinkedIn profile has approximately 509,817 followers.

NAICS Classification of Telkomsel

Telkomsel is classified under the NAICS code 517, which corresponds to Telecommunications.

Telkomsel’s Presence on Crunchbase

No, Telkomsel does not have a profile on Crunchbase.

Telkomsel’s Presence on LinkedIn

Yes, Telkomsel maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telkomsel.

Cybersecurity Incidents Involving Telkomsel

As of January 21, 2026, Rankiteo reports that Telkomsel has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Telkomsel has an estimated 9,783 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Telkomsel ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Telkomsel

Description: An outsourced worker at Telkomsel's customer service unit stole and published personal data of social media sensation Denny Siregar.

Type: Data Breach

Attack Vector: Insider Threat

Vulnerability Exploited: Access Control

Threat Actor: Insider

Motivation: Unauthorized Data Access and Disclosure

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach TEL212216123

Data Compromised: Personal Data

Brand Reputation Impact: Negative

Legal Liabilities: Electronic Information and Transaction (ITE) Law

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data.

Which entities were affected by each incident ?

Incident : Data Breach TEL212216123

Entity Name: Telkomsel

Entity Type: Telecommunication Company

Industry: Telecommunications

Location: Indonesia

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach TEL212216123

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach TEL212216123

Type of Data Compromised: Personal Data

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach TEL212216123

Regulations Violated: Electronic Information and Transaction (ITE) Law

Legal Actions: Police charged the suspect

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Police charged the suspect.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Insider.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Personal Data.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Data.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Police charged the suspect.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=telkomsel' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge