Company Details
us-census-bureau
11,969
63,325
92
census.gov
0
U.S_1398862
In-progress

U.S. Census Bureau Company CyberSecurity Posture
census.govThe Census Bureau serves as the nation’s leading provider of quality data about its people and economy. We have been headquartered in Suitland, Maryland since 1942, and currently employ about 4,285 staff members. We are part of the U.S. Department of Commerce and overseen by the Economics and Statistics Administration (ESA). We honor privacy, protect confidentiality, share our expertise globally, and conduct our work openly. We are guided on this mission by our strong and capable workforce, our readiness to innovate, and our abiding commitment to our customers. View our comment policy: https://www.census.gov/about/contact-us/comment-policy.html View our privacy policy: https://www.census.gov/about/policies/privacy/privacy-policy.html
Company Details
us-census-bureau
11,969
63,325
92
census.gov
0
U.S_1398862
In-progress
Between 750 and 799

UCB Global Score (TPRM)XXXX

Description: United States Census Bureau fell victim to a cyberattack in January 2020 that was traced back to a Citrix vulnerability. The attackers managed to breach the internal network used to manage the agency’s remote workers but the automated firewall blocked communications with the attacker’s command and control servers. No census information or data was accessed by the attackers as the backdoor was discovered and removed.


No incidents recorded for U.S. Census Bureau in 2025.
No incidents recorded for U.S. Census Bureau in 2025.
No incidents recorded for U.S. Census Bureau in 2025.
UCB cyber incidents detection timeline including parent company and subsidiaries

The Census Bureau serves as the nation’s leading provider of quality data about its people and economy. We have been headquartered in Suitland, Maryland since 1942, and currently employ about 4,285 staff members. We are part of the U.S. Department of Commerce and overseen by the Economics and Statistics Administration (ESA). We honor privacy, protect confidentiality, share our expertise globally, and conduct our work openly. We are guided on this mission by our strong and capable workforce, our readiness to innovate, and our abiding commitment to our customers. View our comment policy: https://www.census.gov/about/contact-us/comment-policy.html View our privacy policy: https://www.census.gov/about/policies/privacy/privacy-policy.html


The Ministry of Health (MOH), by way of its objectives, policies and projects included in this strategy, seeks to accomplish a promising future vision; namely, delivering best-quality integrated and comprehensive healthcare services. Carrying health conditions or health status of Saudi inhabitants t

Welcome! We're the National Oceanic & Atmospheric Administration or NOAA. From daily weather forecasts, severe storm warnings and climate monitoring to fisheries management, coastal restoration and supporting marine commerce, our products and services support economic vitality and affect more than

The Philippine Department of Health (abbreviated as DOH; Filipino: Kagawaran ng Kalusugan) is the executive department of the Philippine government responsible for ensuring access to basic public health services by all Filipinos through the provision of quality health care and the regulation of all

We are the largest and most diverse organisation in our state. We have more than 90 government departments and organisations providing essential services across 4000+ locations—from the Torres Strait to the Gold Coast; Mount Isa to Brisbane. We are passionate about making Queensland better through

Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state. We are a team of dedicated public servants committed to high performance, innovative thinking, and delivering excellent and efficien

The Department of Education is responsible for delivering the Victorian Government’s commitment to making Victoria the Education State, where all Victorians have the best learning and development experience, regardless of their background, postcode or circumstances. Education remains a cornerstone f

Working for Amsterdam means working for the most beautiful city in the world. Think of its rich history, the role Amsterdam plays internationally, and events such as Sail, Gay Pride and King’s Day. Of course everybody wants to visit Amsterdam, or work or live here. As you can probably imagine, work

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s
.png)
In the intricate world of data privacy and federal statistics, a Republican-backed proposal is stirring significant debate among...
The financial world finds itself adrift on October 10, 2025, as a sophisticated and unprecedented cyberattack has crippled the United...
Beau Houser serves as the Chief Information Security Officer (CISO) for the US Census Bureau where he leads the agency's cybersecurity program.
Josh Williams helps clients assess and manage the impact of US economic sanctions and export controls on their global operations.
The first United States Census was taken at the dawn of the nation in 1790, under George Washington's presidency and then-Secretary of State...
The 2030 census program could encounter multiple issues, which are likely to influence the design and implementation of the population...
Gunnison Consulting Group has secured a five-year contract from the State Department to provide cybersecurity support services for the Bureau of Consular...
In August, the not seasonally adjusted monthly unemployment rate increased from 4.2% to 4.3%. Total nonfarm employment increased by 200 jobs in the...
Cybercriminals register fake US Census Bureau domains to dupe unsuspecting citizens to provide personal information and install malware, the FBI warns.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of U.S. Census Bureau is http://www.census.gov.
According to Rankiteo, U.S. Census Bureau’s AI-generated cybersecurity score is 776, reflecting their Fair security posture.
According to Rankiteo, U.S. Census Bureau currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, U.S. Census Bureau is not certified under SOC 2 Type 1.
According to Rankiteo, U.S. Census Bureau does not hold a SOC 2 Type 2 certification.
According to Rankiteo, U.S. Census Bureau is not listed as GDPR compliant.
According to Rankiteo, U.S. Census Bureau does not currently maintain PCI DSS compliance.
According to Rankiteo, U.S. Census Bureau is not compliant with HIPAA regulations.
According to Rankiteo,U.S. Census Bureau is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
U.S. Census Bureau operates primarily in the Government Administration industry.
U.S. Census Bureau employs approximately 11,969 people worldwide.
U.S. Census Bureau presently has no subsidiaries across any sectors.
U.S. Census Bureau’s official LinkedIn profile has approximately 63,325 followers.
U.S. Census Bureau is classified under the NAICS code 92, which corresponds to Public Administration.
No, U.S. Census Bureau does not have a profile on Crunchbase.
Yes, U.S. Census Bureau maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/us-census-bureau.
As of December 19, 2025, Rankiteo reports that U.S. Census Bureau has experienced 1 cybersecurity incidents.
U.S. Census Bureau has an estimated 11,750 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with automated firewall blocked communications, containment measures with backdoor discovered and removed..
Title: United States Census Bureau Cyberattack
Description: The United States Census Bureau fell victim to a cyberattack in January 2020 that was traced back to a Citrix vulnerability. The attackers managed to breach the internal network used to manage the agency’s remote workers but the automated firewall blocked communications with the attacker’s command and control servers. No census information or data was accessed by the attackers as the backdoor was discovered and removed.
Date Detected: January 2020
Type: Cyberattack
Attack Vector: Network Intrusion
Vulnerability Exploited: Citrix Vulnerability
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Citrix Vulnerability.

Systems Affected: Internal network for remote workers

Entity Name: United States Census Bureau
Entity Type: Government Agency
Industry: Government
Location: United States

Containment Measures: Automated firewall blocked communicationsBackdoor discovered and removed
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by automated firewall blocked communications, backdoor discovered and removed and .

Entry Point: Citrix Vulnerability
Backdoors Established: ['Backdoor discovered and removed']

Root Causes: Citrix Vulnerability,
Most Recent Incident Detected: The most recent incident detected was on January 2020.
Most Significant System Affected: The most significant system affected in an incident was Internal network for remote workers.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Automated firewall blocked communicationsBackdoor discovered and removed.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Citrix Vulnerability.
.png)
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.
Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.
Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.
Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.