Company Details
united-states-air-force
237,826
753,336
336414
airforce.com
0
UNI_2710140
In-progress

United States Air Force Company CyberSecurity Posture
airforce.comThe mission of the United States Air Force is to fly, fight and win … in air, space and cyberspace. To achieve that mission, the Air Force has a vision of Global Vigilance, Reach and Power. That vision orbits around three core competencies: developing Airmen, technology to war fighting and integrating operations. These core competencies make our six distinctive capabilities possible. Air and Space Superiority: With it, joint forces can dominate enemy operations in all dimensions: land, sea, air and space. Global Attack: Because of technological advances, the Air Force can attack anywhere, anytime and do so quickly and with greater precision than ever before. Rapid Global Mobility: Being able to respond quickly and decisively anywhere we're needed is key to maintaining rapid global mobility. Precision Engagement: The essence lies in the ability to apply selective force against specific targets because the nature and variety of future contingencies demand both precise and reliable use of military power with minimal risk and collateral damage. Information Superiority: The ability of joint force commanders to keep pace with information and incorporate it into a campaign plan is crucial. Agile Combat Support: Deployment and sustainment are keys to successful operations and cannot be separated. Agile combat support applies to all forces, from those permanently based to contingency buildups to expeditionary
Company Details
united-states-air-force
237,826
753,336
336414
airforce.com
0
UNI_2710140
In-progress
Between 750 and 799

USAF Global Score (TPRM)XXXX

Description: The US Air Force is investigating a critical data breach involving the exposure of **Personally Identifiable Information (PII)** and **Protected Health Information (PHI)** due to vulnerabilities in **Microsoft SharePoint**. The breach, linked to **Chinese-affiliated hacking groups (Linen Typhoon, Violet Typhoon, Storm-2603)**, exploited authentication bypass and remote code execution flaws, enabling unauthorized access to sensitive data, including **MachineKey information**. As a precaution, the Air Force blocked all SharePoint access across its systems, with potential extensions to **Microsoft Teams and Power BI dashboards** due to their integration with SharePoint. The incident follows a broader pattern of state-sponsored cyberattacks targeting US federal agencies, raising concerns over national security and data integrity. The breach’s full scope remains under investigation by **Microsoft and US authorities**, with suspicions also directed toward **Russian state-sponsored actors** given historical precedents. The exposed data includes highly sensitive military personnel records, posing risks of identity theft, espionage, or operational disruptions.
Description: The U.S. Air Force experienced significant disruption due to coordinated DDoS attacks orchestrated by pro-Iranian hacktivist groups following geopolitical tensions. These attacks, executed by groups like Mr Hamza and Keymous+, targeted military domains and resulted in sustained downtime over 10-hour periods. The Department of Homeland Security issued warnings about potential low-level and sophisticated attacks, highlighting the persistent threat to national cybersecurity infrastructure.
Description: Thousands of US Air Force records, including highly private personnel data on senior and high-ranking commanders exposed due to an unprotected backup disc. The compromised data includes personal information, such as names and addresses, ranks, and Social Security numbers of more than 4,000 officers. Another file lists the security clearance levels of hundreds of other officers, some of whom possess "top secret" clearance, and access to the sensitive compartmented information and codeword-level clearance. The internet-connected backup drive's lack of a password made the gigabytes of files accessible to everyone, according to security researchers.


United States Air Force has 173.97% more incidents than the average of same-industry companies with at least one recorded incident.
United States Air Force has 156.41% more incidents than the average of all companies with at least one recorded incident.
United States Air Force reported 2 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
USAF cyber incidents detection timeline including parent company and subsidiaries

The mission of the United States Air Force is to fly, fight and win … in air, space and cyberspace. To achieve that mission, the Air Force has a vision of Global Vigilance, Reach and Power. That vision orbits around three core competencies: developing Airmen, technology to war fighting and integrating operations. These core competencies make our six distinctive capabilities possible. Air and Space Superiority: With it, joint forces can dominate enemy operations in all dimensions: land, sea, air and space. Global Attack: Because of technological advances, the Air Force can attack anywhere, anytime and do so quickly and with greater precision than ever before. Rapid Global Mobility: Being able to respond quickly and decisively anywhere we're needed is key to maintaining rapid global mobility. Precision Engagement: The essence lies in the ability to apply selective force against specific targets because the nature and variety of future contingencies demand both precise and reliable use of military power with minimal risk and collateral damage. Information Superiority: The ability of joint force commanders to keep pace with information and incorporate it into a campaign plan is crucial. Agile Combat Support: Deployment and sustainment are keys to successful operations and cannot be separated. Agile combat support applies to all forces, from those permanently based to contingency buildups to expeditionary


We protect the security, independence and interests of the United Kingdom at home and abroad. We work with our allies and partners whenever possible. Our aim is to ensure that the UK’s Armed Forces have the training, equipment and support necessary for their work, and that we keep within budget.

The world relies on what we do. Headquartered in Bethesda, Maryland, with offices across the U.S. and around the globe, our team delivers solutions that strengthen national security, shape industries and push engineering and technology to new levels. We collaborate to win. We put our customers fi

With headquarters in New York City and approximately 31,000 employees worldwide, L3 develops advanced defense technologies and commercial solutions in pilot training, aviation security, night vision and EO/IR, weapons, maritime systems and space. The company reported 2018 sales of $10.2 billion. To

Leonardo is a global security company that realises multi-domain technological capabilities in AD&S. With over 53,000 employees worldwide, the company has a significant industrial presence in Italy, the UK, Poland, and the US. It also has a commercial presence in 150 countries through subsidiaries
At BAE Systems, we help our customers to stay a step ahead when protecting people and national security, critical infrastructure and vital information. We provide some of the world’s most advanced, technology-led defence, aerospace and security solutions and employ a skilled workforce of 107,000 peo
V2X is a leading provider of critical mission solutions and support to defense clients globally, formed by the 2022 Merger of Vectrus and Vertex to build on more than 120 combined years of successful mission support. We deliver a comprehensive suite of integrated solutions across the operations and

As an international naval defence player, Naval Group is a partner for countries seeking to maintain control of their maritime sovereignty. Naval Group develops innovative solutions to meet its customers’ requirements. The group is present throughout the entire life cycle of vessels. It designs, pro

The freedom to explore. The promise to deliver. General Atomics, based in San Diego, CA, develops advanced technology solutions for government and commercial applications. Privately owned and vertically integrated, we have the freedom to invest in the most innovative technologies, and the resource

The Republic of Korea Air Force (ROKAF; Korean: 대한민국 공군; Hanja: 大韓民國 空軍; Revised Romanization: Daehanminguk Gong-gun), also known as the ROK Air Force, is the aerial warfare service branch of South Korea, operating under the South Korean Ministry of National Defense. The ROKAF has about 450 combat
.png)
MIAMI, Dec. 11, 2025 /PRNewswire/ -- Qryptonic LLC today disclosed the nine senior leaders and advisors shaping its Q-Scout cryptographic...
Space travel and cyber warfare may have once been confined to novels and movie screens, but for state leaders, those concepts are now less...
A small satellite named Deloitte-1 is hunting for hackers in orbit. Launched in March, it's the first of nine spacecraft the consulting firm...
China has blamed the US for a "major cyberattack" against its National Time Service Center, alleging it could have disrupted the country's...
Mathematicians at Angelo State University are studying a process called “skew zero forcing," which involves new ways of modeling and...
Exclusive The US Air Force confirmed it's investigating a "privacy-related issue" amid reports of a Microsoft SharePoint-related breach and...
Fighter jets will no longer fly out of Martin State Airport in Middle River. The MD National Guard unit will transition to cybersecurity.
Follow Air Force Master Sergeant Ray Magden's path from military service to cybersecurity through Boise State's flexible online degree...
The CSIS Commission on U.S. Cyber Force Generation will convene leading experts to examine how the United States can best build a dedicated cyber service.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of United States Air Force is http://www.airforce.com.
According to Rankiteo, United States Air Force’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, United States Air Force currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, United States Air Force is not certified under SOC 2 Type 1.
According to Rankiteo, United States Air Force does not hold a SOC 2 Type 2 certification.
According to Rankiteo, United States Air Force is not listed as GDPR compliant.
According to Rankiteo, United States Air Force does not currently maintain PCI DSS compliance.
According to Rankiteo, United States Air Force is not compliant with HIPAA regulations.
According to Rankiteo,United States Air Force is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
United States Air Force operates primarily in the Defense and Space Manufacturing industry.
United States Air Force employs approximately 237,826 people worldwide.
United States Air Force presently has no subsidiaries across any sectors.
United States Air Force’s official LinkedIn profile has approximately 753,336 followers.
United States Air Force is classified under the NAICS code 336414, which corresponds to Guided Missile and Space Vehicle Manufacturing.
No, United States Air Force does not have a profile on Crunchbase.
Yes, United States Air Force maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/united-states-air-force.
As of December 14, 2025, Rankiteo reports that United States Air Force has experienced 3 cybersecurity incidents.
United States Air Force has an estimated 2,359 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with microsoft, and and containment measures with air force-wide block of sharepoint, containment measures with potential block of microsoft teams and power bi, and communication strategy with data breach notification issued via social media by air force personnel center directorate of technology and information..
Title: US Air Force Data Exposure
Description: Thousands of US Air Force records, including highly private personnel data on senior and high-ranking commanders, were exposed due to an unprotected backup disc.
Type: Data Breach
Attack Vector: Unprotected Backup Drive
Vulnerability Exploited: Lack of Password Protection
Title: Coordinated DDoS Attacks by Pro-Iranian Hacktivist Groups
Description: Multiple pro-Iranian hacktivist groups launched coordinated distributed denial-of-service (DDoS) attacks against American military domains, aerospace companies, and financial institutions following U.S. airstrikes on Iranian nuclear facilities on June 21, 2025.
Date Detected: 2025-06-21
Date Publicly Disclosed: 2025-06-22
Type: DDoS Attack
Attack Vector: Volumetric DDoS Attacks
Threat Actor: Mr HamzaTeam 313Cyber Jihad MovementKeymous+
Motivation: Geopolitical retaliation and disruption
Title: US Air Force SharePoint Breach Exposing PII and PHI
Description: The US Air Force is investigating a data breach caused by a Microsoft SharePoint vulnerability, exposing Personally Identifiable Information (PII) and Protected Health Information (PHI). Chinese-linked hacking groups (Linen Typhoon, Violet Typhoon, and Storm-2603) exploited SharePoint flaws for authentication bypass and remote code execution, leading to data theft, including MachineKey information. The breach prompted an Air Force-wide block of SharePoint, Microsoft Teams, and Power BI dashboards to mitigate risks. The incident is under active investigation by Microsoft and US authorities, with suspicions primarily directed at Chinese state-sponsored actors, though Russian groups are also considered potential culprits.
Date Publicly Disclosed: 2025-07
Type: Data Breach
Attack Vector: Authentication BypassRemote Code Execution (RCE)
Vulnerability Exploited: Microsoft SharePoint Server Vulnerabilities (On-Premises)
Threat Actor: Linen Typhoon (Chinese-affiliated)Violet Typhoon (Chinese-affiliated)Storm-2603 (Chinese-affiliated)
Motivation: EspionageData Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Exploited SharePoint vulnerabilities (authentication bypass and RCE).

Data Compromised: Personal information, Ranks, Social security numbers, Security clearance levels

Systems Affected: U.S. Air Force domainsAerospace and defense contractorsBanking institutions
Downtime: Sustained 10-hour periods on June 22 (Mr Hamza), Concentrated one-hour periods (Keymous+)
Operational Impact: Service unavailability

Data Compromised: Personally identifiable information (pii), Protected health information (phi), Machinekey information
Systems Affected: Microsoft SharePoint (Air Force-wide)Microsoft Teams (potentially blocked)Power BI Dashboards (potentially blocked)
Operational Impact: Air Force-wide block of SharePoint, Teams, and Power BIDisruption to workflows and collaboration tools
Brand Reputation Impact: Potential erosion of trust in US Air Force cybersecurityScrutiny of Microsoft's security practices
Identity Theft Risk: ['High (due to PII exposure)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Social Security Numbers, Security Clearance Levels, , Personally Identifiable Information (Pii), Protected Health Information (Phi), Machinekey Information and .

Entity Name: US Air Force
Entity Type: Military
Industry: Defense
Location: United States

Entity Type: Military, Aerospace, Financial
Industry: Defense, Aerospace, Finance
Location: United States

Entity Name: United States Air Force (USAF)
Entity Type: Government/Military
Industry: Defense
Location: United States

Entity Name: At least two unnamed US federal agencies
Entity Type: Government
Location: United States

Entity Name: Numerous global organizations (unspecified)
Location: Global

Incident Response Plan Activated: True
Third Party Assistance: Microsoft.
Containment Measures: Air Force-wide block of SharePointPotential block of Microsoft Teams and Power BI
Communication Strategy: Data breach notification issued via social media by Air Force Personnel Center Directorate of Technology and Information
Third-Party Assistance: The company involves third-party assistance in incident response through Microsoft, .

Type of Data Compromised: Personal information, Social security numbers, Security clearance levels
Number of Records Exposed: 4000
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Machinekey information
Sensitivity of Data: High
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by air force-wide block of sharepoint, potential block of microsoft teams and power bi and .

Data Exfiltration: True

Source: Cyble

Source: The Register

Source: Microsoft (July 2025 confirmation of SharePoint exploits by Chinese groups)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyble, and Source: The Register, and Source: Microsoft (July 2025 confirmation of SharePoint exploits by Chinese groups).

Investigation Status: Ongoing (by Microsoft and US authorities)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Data Breach Notification Issued Via Social Media By Air Force Personnel Center Directorate Of Technology And Information.

Stakeholder Advisories: Air Force Personnel Center Directorate Of Technology And Information Notification.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Air Force Personnel Center Directorate Of Technology And Information Notification.

Entry Point: Exploited Sharepoint Vulnerabilities (Authentication Bypass, Rce),
High Value Targets: Us Air Force Pii/Phi, Machinekey Information,
Data Sold on Dark Web: Us Air Force Pii/Phi, Machinekey Information,

Root Causes: Vulnerabilities In On-Premises Sharepoint Servers, Potential Lapses In Microsoft'S Cybersecurity Practices,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Microsoft, .
Last Attacking Group: The attacking group in the last incident were an Mr HamzaTeam 313Cyber Jihad MovementKeymous+ and Linen Typhoon (Chinese-affiliated)Violet Typhoon (Chinese-affiliated)Storm-2603 (Chinese-affiliated).
Most Recent Incident Detected: The most recent incident detected was on 2025-06-21.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-07.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, Ranks, Social Security Numbers, Security Clearance Levels, , Personally Identifiable Information (PII), Protected Health Information (PHI), MachineKey Information and .
Most Significant System Affected: The most significant system affected in an incident was U.S. Air Force domainsAerospace and defense contractorsBanking institutions and Microsoft SharePoint (Air Force-wide)Microsoft Teams (potentially blocked)Power BI Dashboards (potentially blocked).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was microsoft, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Air Force-wide block of SharePointPotential block of Microsoft Teams and Power BI.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Protected Health Information (PHI), Personally Identifiable Information (PII), Security Clearance Levels, Ranks, Social Security Numbers, MachineKey Information and Personal Information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 400.0.
Most Recent Source: The most recent source of information about an incident are Microsoft (July 2025 confirmation of SharePoint exploits by Chinese groups), The Register and Cyble.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (by Microsoft and US authorities).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Air Force Personnel Center Directorate of Technology and Information notification, .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.