Company Details
united-states-of-america
708
0
92
wikipedia.org
0
UNI_9408273
In-progress

United States of America Company CyberSecurity Posture
wikipedia.orgNone
Company Details
united-states-of-america
708
0
92
wikipedia.org
0
UNI_9408273
In-progress
Between 800 and 849

USA Global Score (TPRM)XXXX

Description: The case number for Alexander Pakhtusov's accusation is 19-cr-310 in the United States District Court for the District of Columbia. Under the alias "Mrtikov," Mr. Pakhtusov sold goods on Slilpp and Paysell (now named Blackpass). Over 17 million economically valuable accounts of individuals housed at various firms and banks were listed for sale as part of his involvement, which lasted from at least April 2016 to September 2019. In reality, he sold almost 14,000 different sets of login information. The individuals who bought those login credentials utilised them to steal money from victim accounts. You can get up-to-date information on this case on the website at https://www.justice.gov/information-victims-large-cases due to the significant number of victims in this matter.


No incidents recorded for United States of America in 2025.
No incidents recorded for United States of America in 2025.
No incidents recorded for United States of America in 2025.
USA cyber incidents detection timeline including parent company and subsidiaries

None


Bij UWV werken we aan een samenleving waarin iedereen mee kan doen. We helpen mensen op weg bij het vinden of behouden van werk. In geval van ziekte kijken we wat iemand nog wél kan. En als werken niet mogelijk is, zorgt UWV snel voor inkomen. We geven op deskundige en efficiënte wijze uitvoering a

Tallinn is the capital of Estonia. The mission of the city organization is to make Tallinn the best place to live for the people staying here, the desired destination for people arriving here, and a good place of departure for people who start here. For this purpose, the management of Tallinn as a

OVERVIEW Framingham was incorporated as a town on June 25, 1700. Chapter 143 of the Acts of 1949 established the Town of Framingham Representative Town Government by Limited Town Meetings. The Citizens of Framingham adopted the Home Rule Charter for the City of Framingham at an election held on Ap

Der Arbeitgeber Niedersachsen vereint über 2000 Dienststellen mit einem gemeinsamen Ziel: Wir gestalten das Leben in Niedersachsen verantwortungsvoll und zukunftsorientiert. Als der größte Arbeitgeber im Land Niedersachsen bieten wir sichere Arbeitsplätze, sinnstiftende Aufgaben und vielfältige Ei

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect famil

Home to a respected and energetic cultural arts scene, celebrated restaurants featuring flavors from 35 countries, world-renowned theater groups and the brains behind U.S. space exploration, Houston is a diverse metropolis brimming with personality. With nearly 21,000 concerts, plays, exhibition

Welcome to the official LinkedIn page for the Federal Emergency Management Agency (FEMA). When disaster strikes, America looks to FEMA to support survivors and first responders in communities all across the country. This page provides career related information, job announcements and relevant updat

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive
.png)
State, Local, Tribal, and Territorial (SLTT) governments operate the systems that keep American society functioning: 911 dispatch centers,...
Tech News News: The US government has launched US TechForce to hire 1000 engineers for federal roles, focusing on software engineering, AI,...
A new cybersecurity whitepaper from The Brattle Group and Dragos claims that a 100MW/400MWh BESS outage could cause US$1.2 million in...
Cybersecurity US Stocks Week Ahead (Dec. 15–19, 2025): Zscaler's Bounce Test, SailPoint's Post-Earnings Reset, and Fed-Cut Volatility...
The US government has reportedly scuttled plans to sanction China's Ministry of State Security for its role in the Salt Typhoon attacks that...
Discover ten essential steps policymakers should take to strengthen the United States' cybersecurity, protect critical infrastructure,...
The Bureau of Cyberspace and Digital Policy (CDP) advances U.S. leadership abroad in critical and emerging technologies, including artificial intelligence...
Cybersecurity Ventures expects global cybercrime costs to grow by 15 percent per year over the next five years, reaching $10.5 trillion USD annually by 2025.
The Trump administration's recalibrated cybersecurity policy could enhance focus on high-end threats and accelerate the adoption of AI and post-...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of United States of America is https://en.wikipedia.org/wiki/United_States.
According to Rankiteo, United States of America’s AI-generated cybersecurity score is 834, reflecting their Good security posture.
According to Rankiteo, United States of America currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, United States of America is not certified under SOC 2 Type 1.
According to Rankiteo, United States of America does not hold a SOC 2 Type 2 certification.
According to Rankiteo, United States of America is not listed as GDPR compliant.
According to Rankiteo, United States of America does not currently maintain PCI DSS compliance.
According to Rankiteo, United States of America is not compliant with HIPAA regulations.
According to Rankiteo,United States of America is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
United States of America operates primarily in the Government Administration industry.
United States of America employs approximately 708 people worldwide.
United States of America presently has no subsidiaries across any sectors.
United States of America’s official LinkedIn profile has approximately 0 followers.
United States of America is classified under the NAICS code 92, which corresponds to Public Administration.
No, United States of America does not have a profile on Crunchbase.
Yes, United States of America maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/united-states-of-america.
As of December 16, 2025, Rankiteo reports that United States of America has experienced 1 cybersecurity incidents.
United States of America has an estimated 11,663 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes..
Title: Alexander Pakhtusov Cyber Incident
Description: Alexander Pakhtusov, under the alias 'Mrtikov,' sold stolen login credentials on Slilpp and Paysell (now named Blackpass). He sold approximately 14,000 sets of login information, which were used to steal money from victim accounts.
Type: Data Breach
Attack Vector: Credential Theft
Threat Actor: Alexander Pakhtusov (alias 'Mrtikov')
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Credential Theft.

Data Compromised: Login credentials
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Login Credentials and .

Entity Type: Firms, Banks
Industry: Financial Services
Customers Affected: Over 17 million

Law Enforcement Notified: Yes

Type of Data Compromised: Login credentials
Number of Records Exposed: Over 17 million
Sensitivity of Data: High
Data Exfiltration: Yes

Legal Actions: Criminal Charges
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Criminal Charges.

Source: United States Department of Justice
URL: https://www.justice.gov/information-victims-large-cases
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: United States Department of JusticeUrl: https://www.justice.gov/information-victims-large-cases.

Investigation Status: Ongoing

Entry Point: Credential Theft
Last Attacking Group: The attacking group in the last incident was an Alexander Pakhtusov (alias 'Mrtikov').
Most Significant Data Compromised: The most significant data compromised in an incident were Login Credentials and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Login Credentials.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 17.0M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Criminal Charges.
Most Recent Source: The most recent source of information about an incident is United States Department of Justice.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.justice.gov/information-victims-large-cases .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Credential Theft.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.