ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Oil and Gas, Manufacturing, Accounting and Finance, Environmental, Health & Safety, and Private Equity and Venture backed Executive and Management roles.

White Oak Search Group A.I CyberSecurity Scoring

WOSG

Company Details

Linkedin ID:

white-oak-search-group

Employees number:

1

Number of followers:

445

NAICS:

5613

Industry Type:

Staffing and Recruiting

Homepage:

whiteoaksearchgroup.com

IP Addresses:

Scan still pending

Company ID:

WHI_2039065

Scan Status:

In-progress

AI scoreWOSG Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/white-oak-search-group.jpeg
WOSG Staffing and Recruiting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWOSG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/white-oak-search-group.jpeg
WOSG Staffing and Recruiting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

White Oak Search Group

Moderate
Current Score
737
Ba (Moderate)
01000
1 incidents
0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

JANUARY 2026
737
DECEMBER 2025
737
NOVEMBER 2025
736
OCTOBER 2025
736
SEPTEMBER 2025
735
AUGUST 2025
735
JULY 2025
734
JUNE 2025
734
MAY 2025
733
APRIL 2025
733
MARCH 2025
732
FEBRUARY 2025
732
JANUARY 2025
755
Cyber Attack
01 Jan 2025 • iVerify and The White House: Chinese hackers, user lapses turn smartphones into 'mobile security crisis'
Sophisticated Cyberattack Targeting Smartphones of Government, Political, Tech, and Journalism Professionals

**Sophisticated Chinese-Linked Cyberattack Targets US Officials, Journalists, and Tech Figures via Mobile Devices** Cybersecurity investigators uncovered a highly sophisticated cyberattack targeting the smartphones of US government officials, political figures, tech professionals, and journalists—many with ties to China’s strategic interests. The campaign, which began in late 2024 and extended into 2025, exploited vulnerabilities to infiltrate devices *without requiring user interaction*, leaving no clear traces of the attackers’ identities. Researchers at cybersecurity firm **iVerify** identified the victims as individuals previously targeted by Chinese state-linked hackers, suggesting a deliberate focus on high-value intelligence. The attack underscores the growing threat to mobile security, with experts warning that smartphones—often overlooked in cyber defenses—have become prime targets for espionage. **"The world is in a mobile security crisis right now,"** said **Rocky Cole**, former NSA and Google cybersecurity expert and COO of iVerify. **"No one is watching the phones."** The incident aligns with broader US intelligence assessments of China’s cyber capabilities. In December 2024, US authorities revealed a **large-scale Chinese hacking operation** that accessed text messages and real-time phone calls of an unknown number of Americans. **Rep. Raja Krishnamoorthi (D-Ill.)**, a member of the House Intelligence Committee, confirmed hackers had attempted to breach devices used by **Donald Trump and JD Vance** during the 2024 presidential campaign. China has denied the allegations, accusing the US of hypocrisy and citing its own claims of American cyberespionage. Mobile devices, particularly those used by senior officials, present a **lucrative intelligence opportunity**, containing sensitive communications, passwords, and policy discussions. However, their security often lags behind their ubiquity. While smartphones themselves may have robust protections, **third-party apps, connected devices, and outdated software** create vulnerabilities. Fitness trackers, smart appliances, and even **internet-connected toys** (such as a hacked Barbie doll with a microphone) have been exploited as entry points for malware and network infiltration. The US has taken steps to mitigate risks, including banning Chinese telecom firms from domestic networks and launching a **"cyber trust mark"** program for secure IoT devices. Yet concerns persist, particularly around **Chinese state-owned companies** that maintain routing and cloud infrastructure in the US. **Rep. John Moolenaar (R-Mich.)**, chair of the House China Committee, issued subpoenas in April 2025 to investigate whether these firms pose a backdoor threat to critical infrastructure. User behavior also remains a critical weak point. High-profile security lapses have highlighted the dangers of **unsecured communications**, even among top officials. Former Trump national security adviser **Mike Waltz** accidentally added a journalist to a **Signal chat** discussing military plans, while **Defense Secretary Pete Hegseth** reportedly bypassed Pentagon security protocols to use Signal on a personal device—despite the app’s lack of approval for classified communications. Experts stress that such oversights provide adversaries like China with exploitable openings. As mobile devices grow more integrated into national security and daily operations, the attack serves as a stark reminder of their **dual role as tools and targets**—and the urgent need for stronger safeguards in an era of escalating digital conflict.

731
critical -24
IVEWHI1767166021
Cyber Espionage
Zero-click exploit
Mobile device and app security weaknesses
Espionage, access to sensitive information, and geopolitical advantage
Data Compromised: Text messages, phone calls, sensitive government information, passwords, policy discussions Systems Affected: Smartphones (unspecified models) Operational Impact: Potential exposure of classified or sensitive information Identity Theft Risk: High
Third Party Assistance: iVerify (cybersecurity firm)
Text messages Phone calls Sensitive government information Passwords Policy discussions Sensitivity Of Data: High Data Exfiltration: Yes Personally Identifiable Information: Yes
Mobile devices and apps are a weak link in cyber defenses, requiring enhanced security measures and user precautions. Basic security lapses can expose sensitive information to state-sponsored hackers.
Implement stricter security protocols for mobile devices handling sensitive information Enhance monitoring of mobile networks and connected devices Educate users on basic security precautions Phase out involvement of state-controlled telecom firms in critical infrastructure Adopt federal security standards for connected devices (e.g., 'cyber trust mark')
['Ongoing']
US authorities have warned about Chinese hacking campaigns targeting mobile devices. National security officials are urged to use approved secure communications platforms.
Entry Point: Mobile devices and apps High Value Targets: Government officials, political figures, tech professionals, journalists
Mobile device and app security weaknesses Lack of user precautions Involvement of state-controlled telecom firms in critical infrastructure Enhanced monitoring of mobile networks Stricter security protocols for sensitive information Phasing out Chinese telecom firms from critical infrastructure

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for White Oak Search Group is 737, which corresponds to a Moderate rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 737.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 736.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 736.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 735.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 735.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 734.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 734.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 733.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 733.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 732.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 732.

Over the past 12 months, the average per-incident point impact on White Oak Search Group’s A.I Rankiteo Cyber Score has been 0 points.

You can access White Oak Search Group’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/white-oak-search-group.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view White Oak Search Group’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/white-oak-search-group.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.