Company Details
telkomsel
16,661
509,817
517
telkomsel.com
0
TEL_1085853
In-progress


Telkomsel Company CyberSecurity Posture
telkomsel.comConnecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity and digital solutions. With a nationwide network of over 271,000 BTS, we serve 159.4 million mobile users and 9.6 million fixed broadband (IndiHome B2C) customers. We continually expand our 4G coverage, advance 5G innovation, and deploy the latest fixed broadband technologies to enhance our customers' experiences. Beyond connectivity, Telkomsel plays a key role in driving Indonesia's digital transformation through services such as Digital Lifestyle, Advertising, Enterprise Solutions, and the Internet of Things (IoT). Guided by Environmental, Social, and Governance (ESG) principles, we are committed to creating a sustainable and inclusive digital ecosystem that benefits both people and the planet. Discover more at telkomsel.com or connect via the MyTelkomsel App, Facebook (Telkomsel), X (@telkomsel), and Instagram (@telkomsel).
Company Details
telkomsel
16,661
509,817
517
telkomsel.com
0
TEL_1085853
In-progress
Between 750 and 799

Telkomsel Global Score (TPRM)XXXX

Description: A man who worked at the customer service unit of state-owned telecommunication company Telkomsel stole personal data of social media sensation Denny Siregar. He accessed personal data of Telkomsel customers. The suspect is an outsourced worker at Grapari with limited access to the company’s data server. The suspect took a picture of Denny’s personal data and published it on Twitter account @opposite6890. Police charged him under the Electronic Information and Transaction (ITE) Law.


No incidents recorded for Telkomsel in 2026.
No incidents recorded for Telkomsel in 2026.
No incidents recorded for Telkomsel in 2026.
Telkomsel cyber incidents detection timeline including parent company and subsidiaries

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity and digital solutions. With a nationwide network of over 271,000 BTS, we serve 159.4 million mobile users and 9.6 million fixed broadband (IndiHome B2C) customers. We continually expand our 4G coverage, advance 5G innovation, and deploy the latest fixed broadband technologies to enhance our customers' experiences. Beyond connectivity, Telkomsel plays a key role in driving Indonesia's digital transformation through services such as Digital Lifestyle, Advertising, Enterprise Solutions, and the Internet of Things (IoT). Guided by Environmental, Social, and Governance (ESG) principles, we are committed to creating a sustainable and inclusive digital ecosystem that benefits both people and the planet. Discover more at telkomsel.com or connect via the MyTelkomsel App, Facebook (Telkomsel), X (@telkomsel), and Instagram (@telkomsel).

Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

A TIM é a empresa de telefonia móvel que mais cresce no Brasil. Atualmente, possui mais de 13 mil colaboradores em todo o país que trabalham entregando serviços inovadores e de qualidade em telefonia móvel, fixa e internet banda larga. É uma companhia feita de pessoas criativas, com energia real
Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f
Charter Communications, Inc. (NASDAQ: CHTR) is a leading broadband connectivity company and cable operator with services available to more than 57 million homes and businesses in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a full range of state-o

We’re one of the world’s leading communications services companies. At BT Group, the solutions we sell are integral to modern life. Our purpose is as simple as it is ambitious: we connect for good. There are no limits to what people can do when they connect. And as technology changes our world, co
Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a
.png)
Discover what is mobile device management and how it helps businesses secure, manage, and control all mobile devices from one platform.
Explore the future of Singtel and StarHub as they navigate growth challenges in the evolving telecom sector.
Discover the benefits of QRIS for MSMEs. Learn how this digital payment system can simplify transactions and drive growth in your business.
GSMA Intelligence estimates a $500 billion opportunity for telecom operators from the enterprise digital transformation market.
Learnn mobile device security management best practice to protect business from evolving mobile device security threats and and boost...
Telkomsel Enterprise and Tencent Cloud join in a strategic collaboration to drive secure digital transformation using advanced Palm Vein...
What is mobile device management (MDM) and how mobile device management solutions protect your business data from cyber threats and...
BYOD is a workplace policy that permits employees to bring and use their own personal devices. like smartphones, tablets, and laptops for...
Singapore-based regional insurtech Igloo has partnered with Telkomsel, Indonesia's biggest telecommunications service provider, to introduce...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Telkomsel is http://www.telkomsel.com.
According to Rankiteo, Telkomsel’s AI-generated cybersecurity score is 773, reflecting their Fair security posture.
According to Rankiteo, Telkomsel currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Telkomsel has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Telkomsel is not certified under SOC 2 Type 1.
According to Rankiteo, Telkomsel does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Telkomsel is not listed as GDPR compliant.
According to Rankiteo, Telkomsel does not currently maintain PCI DSS compliance.
According to Rankiteo, Telkomsel is not compliant with HIPAA regulations.
According to Rankiteo,Telkomsel is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Telkomsel operates primarily in the Telecommunications industry.
Telkomsel employs approximately 16,661 people worldwide.
Telkomsel presently has no subsidiaries across any sectors.
Telkomsel’s official LinkedIn profile has approximately 509,817 followers.
Telkomsel is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Telkomsel does not have a profile on Crunchbase.
Yes, Telkomsel maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telkomsel.
As of January 21, 2026, Rankiteo reports that Telkomsel has experienced 1 cybersecurity incidents.
Telkomsel has an estimated 9,783 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Data Breach at Telkomsel
Description: An outsourced worker at Telkomsel's customer service unit stole and published personal data of social media sensation Denny Siregar.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Access Control
Threat Actor: Insider
Motivation: Unauthorized Data Access and Disclosure
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Personal Data
Brand Reputation Impact: Negative
Legal Liabilities: Electronic Information and Transaction (ITE) Law
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data.

Entity Name: Telkomsel
Entity Type: Telecommunication Company
Industry: Telecommunications
Location: Indonesia


Type of Data Compromised: Personal Data

Regulations Violated: Electronic Information and Transaction (ITE) Law
Legal Actions: Police charged the suspect
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Police charged the suspect.
Last Attacking Group: The attacking group in the last incident was an Insider.
Most Significant Data Compromised: The most significant data compromised in an incident was Personal Data.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Data.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Police charged the suspect.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.