Company Details
un-multi-partner-trust-fund-office
8
1,089
8135
undp.org
0
UN _1943465
In-progress

UN Multi-Partner Trust Fund Office Company CyberSecurity Posture
undp.orgThe MPTF Office supports UN coherence and the achievement of the Sustainable Development Goals with a well-designed and professionally managed portfolio of innovative pooled financing instruments.
Company Details
un-multi-partner-trust-fund-office
8
1,089
8135
undp.org
0
UN _1943465
In-progress
Between 650 and 699

UMTFO Global Score (TPRM)XXXX

Description: A new report by the Financial Crimes Enforcement Network (FinCEN) shows that ransomware activity peaked in 2023 before falling in 2024, following a series of law enforcement actions targeting the ALPHV/BlackCat and LockBit ransomware gangs. From thousands of Bank Secrecy Act filings, the report documents 4,194 ransomware incidents between January 2022 and December 2024. These reports show that organizations paid more than $2.1 billion in ransom payments, nearly reaching the total reported over 8 years from 2013 to 2021. In total, from 2013 through 2024, FinCEN tracked approximately $4.5 billion in payments to ransomware gangs. Law enforcement operations show impact According to the report, 2023 was the best year for ransomware gangs, with victims reporting 1,512 individual incidents and approximately $1.1 billion in ransom payments, a 77 percent increase from 2022. However, both stats fell in 2024, with a slight dip to 1,476 incidents, but a dramatic decrease to $734 million in payments. This decrease is believed to be due to law enforcement operations targeting BlackCat in 2023 and LockBit at the beginning of 2024. Both of these ransomware gangs were the most active at the time of disruption, with the threat actors moving to new operations or struggling to relaunch. FinCEN says the amount paid varied, with most ransom payments below $250,000. The analysis also showed that manufacturing, financial services, and healthcare suffered the most ransomware attacks, with fina


UN Multi-Partner Trust Fund Office has 36.99% more incidents than the average of same-industry companies with at least one recorded incident.
UN Multi-Partner Trust Fund Office has 53.85% more incidents than the average of all companies with at least one recorded incident.
UN Multi-Partner Trust Fund Office reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
UMTFO cyber incidents detection timeline including parent company and subsidiaries

The MPTF Office supports UN coherence and the achievement of the Sustainable Development Goals with a well-designed and professionally managed portfolio of innovative pooled financing instruments.


Every day, we help millions of people to make journeys across London: By Tube, bus, tram, car, bike – and more. People don’t associate us with journeys by river, on foot or via the air, but we help with that, too. Getting people to where they need to go has been our business for over 100 years, and

We support peace and prosperity by building connections, understanding and trust between people in the UK and countries worldwide. We uniquely combine the UK’s deep expertise in arts and culture, education and the English language, our global presence and relationships in over 100 countries, our un

AIESEC develops leadership among youth aged 18 to 30 and contributes to strengthening the global employability market by providing an end-to-end international talent recruitment solution for Enterprises, NGOs, and Start-ups. AIESEC is the world's largest youth-run organization developing the leader

Established in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from th

UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories, we work for every child, everywhere, every day, to build a better world fo

YMCA of the USA is the national resource office for the nation's YMCAs. Located in Chicago, IL, YMCA of the USA exists to serve YMCAs. To address the specific needs of communities, each YMCA is an independent organization, autonomous and separate from YMCA of the USA. They are required by the nation
Goodwill Industries is all about people working. We are North America’s leading nonprofit provider of education, training, and career services for people with disadvantages, such as welfare dependency, homelessness, and lack of education or work experience, as well as those with physical, mental an
The Salvation Army is the nation's largest direct provider of social services. Annually, we help millions overcome poverty, addiction, and spiritual and economic hardships by preaching the gospel of Jesus Christ and meeting human needs in His name without discrimination in nearly every zip code.

Médecins Sans Frontières (MSF) is an international, independent, medical humanitarian organisation working to provide medical assistance to people affected by conflict, epidemics, disasters, or exclusion from healthcare. Since our founding in 1971, we’ve grown to a global movement delivering human
.png)
The Republic of Iraq and the Kingdom of the Netherlands, along with the United Nations Counter-Terrorism Centre (UNCCT) of the United Nations Office of...
Sustainable and predictable funding is essential for UNOCT to be able to perform on its mandate consistently at the highest level and for greatest impact.
Digitalization is a transformative force that can drive productivity-led growth and enhance the efficiency of critical services such as...
WHO works to improve prevention and control of cholera globally, as well as increase awareness. WHO and partners also support research for...
Japan is engaged in science and technology cooperation through the “Science and Technology Research Partnership for Sustainable Development (SATREPS) program”
2025 marks 60 years since the establishment of UNDP. Central to the UN's mandate, UNDP has consistently advanced development thinking and achieved tangible...
The Trump administration ordered temporary freezes in funding for programs spanning virtually every part of the government.
IOM promotes policy coherence, contributes to advocacy efforts, harnesses resources and fosters innovation to align migration policies with development goals.
The Migration Multi-Partner Trust Fund is the only pooled funding instrument dedicated to migration and is open to all States.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UN Multi-Partner Trust Fund Office is http://Mptfo.undp.org.
According to Rankiteo, UN Multi-Partner Trust Fund Office’s AI-generated cybersecurity score is 654, reflecting their Weak security posture.
According to Rankiteo, UN Multi-Partner Trust Fund Office currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UN Multi-Partner Trust Fund Office is not certified under SOC 2 Type 1.
According to Rankiteo, UN Multi-Partner Trust Fund Office does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UN Multi-Partner Trust Fund Office is not listed as GDPR compliant.
According to Rankiteo, UN Multi-Partner Trust Fund Office does not currently maintain PCI DSS compliance.
According to Rankiteo, UN Multi-Partner Trust Fund Office is not compliant with HIPAA regulations.
According to Rankiteo,UN Multi-Partner Trust Fund Office is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UN Multi-Partner Trust Fund Office operates primarily in the Non-profit Organizations industry.
UN Multi-Partner Trust Fund Office employs approximately 8 people worldwide.
UN Multi-Partner Trust Fund Office presently has no subsidiaries across any sectors.
UN Multi-Partner Trust Fund Office’s official LinkedIn profile has approximately 1,089 followers.
UN Multi-Partner Trust Fund Office is classified under the NAICS code 8135, which corresponds to Others.
No, UN Multi-Partner Trust Fund Office does not have a profile on Crunchbase.
Yes, UN Multi-Partner Trust Fund Office maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/un-multi-partner-trust-fund-office.
As of December 11, 2025, Rankiteo reports that UN Multi-Partner Trust Fund Office has experienced 1 cybersecurity incidents.
UN Multi-Partner Trust Fund Office has an estimated 20,901 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $4.50 billion.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes..
Title: Global Ransomware Surge and Decline (2022-2024)
Description: A report by FinCEN documents 4,194 ransomware incidents between January 2022 and December 2024, with over $2.1 billion in ransom payments. The peak occurred in 2023 with $1.1 billion in payments, followed by a decline in 2024 due to law enforcement actions targeting ALPHV/BlackCat and LockBit ransomware gangs.
Type: Ransomware
Threat Actor: ALPHV/BlackCatLockBit
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Financial Loss: $4.5 billion (2013-2024)
Average Financial Loss: The average financial loss per incident is $4.50 billion.

Entity Type: Organization
Industry: Manufacturing, Financial Services, Healthcare

Law Enforcement Notified: Yes

Data Encryption: Yes

Ransom Paid: $2.1 billion (2022-2024)
Ransomware Strain: ALPHV/BlackCatLockBit
Data Encryption: Yes

Lessons Learned: Law enforcement actions targeting ransomware gangs can significantly reduce ransomware activity and payments.

Recommendations: Organizations should enhance cybersecurity measures, report incidents to authorities, and avoid paying ransoms to disrupt the ransomware economy.
Key Lessons Learned: The key lessons learned from past incidents are Law enforcement actions targeting ransomware gangs can significantly reduce ransomware activity and payments.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Organizations should enhance cybersecurity measures, report incidents to authorities and and avoid paying ransoms to disrupt the ransomware economy..

Source: Financial Crimes Enforcement Network (FinCEN)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Financial Crimes Enforcement Network (FinCEN).

Investigation Status: Ongoing

Root Causes: Proliferation of ransomware-as-a-service (RaaS) models, exploitation of vulnerabilities, and lack of robust cybersecurity defenses.
Corrective Actions: Law enforcement disruptions, enhanced monitoring, and improved incident response strategies.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Law enforcement disruptions, enhanced monitoring, and improved incident response strategies..
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident was an ALPHV/BlackCatLockBit.
Highest Financial Loss: The highest financial loss from an incident was $4.5 billion (2013-2024).
Highest Ransom Paid: The highest ransom paid in a ransomware incident was $2.1 billion (2022-2024).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Law enforcement actions targeting ransomware gangs can significantly reduce ransomware activity and payments.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Organizations should enhance cybersecurity measures, report incidents to authorities and and avoid paying ransoms to disrupt the ransomware economy..
Most Recent Source: The most recent source of information about an incident is Financial Crimes Enforcement Network (FinCEN).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.