Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Zain Group is a leading provider of innovative ICT technologies & digital lifestyle communications operating in 8 markets across the Middle East & Africa, serving 50.9 million active customers as of 30 June 2025. Zain provides mobile voice, data and B2B services in: Kuwait, Bahrain, Iraq, Jordan, Saudi Arabia, Sudan and South Sudan. Headquartered in the UAE, ZainTECH, the Group’s one-stop digital and ICT solutions provider, is playing a key role in the digital transformation of enterprise and government clientele across the MENA region. Also UAE based, Zain Omantel International (ZOI) is revolutionizing the international telecommunications wholesale landscape as the premier wholesale powerhouse serving regional operators, international carriers, and global hyperscalers. In Morocco, Zain has a 15.5% stake in ‘INWI’, through a joint venture. Zain is listed on the Boursa Kuwait (stock ticker: ZAIN). We recommend the Investor Community to download the “Zain Group Investor Relations” Mobile App. For more, please email [email protected]

Zain Group A.I CyberSecurity Scoring

Zain Group

Company Details

Linkedin ID:

zain

Employees number:

15,982

Number of followers:

321,194

NAICS:

517

Industry Type:

Telecommunications

Homepage:

zain.com

IP Addresses:

0

Company ID:

ZAI_8354262

Scan Status:

In-progress

AI scoreZain Group Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/zain.jpeg
Zain Group Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreZain Group Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/zain.jpeg
Zain Group Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Zain Group Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Zain GroupCyber Attack10066/2021NA
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: Threat actors linked to China exploited the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint to breach a Middle Eastern telecommunications company shortly after its public disclosure in July 2025. The attack involved bypassing authentication and achieving remote code execution (RCE) on on-premise SharePoint servers, enabling persistent and stealthy access for credential theft and espionage. The Salt Typhoon (Glowworm) group deployed malicious tools like Zingdoor, ShadowPad, and KrustyLoader, a Rust-based loader previously tied to China-nexus espionage campaigns. The attackers aimed to exfiltrate sensitive data, establish long-term access, and likely gather intelligence for geopolitical or economic advantage. While no explicit data leak was confirmed, the compromise of a telecom provider a critical infrastructure sector poses risks to national security, customer privacy, and regional stability. The attack aligns with broader campaigns targeting government agencies, universities, and financial institutions globally, suggesting a coordinated effort by multiple Chinese state-sponsored groups. The use of living-off-the-land (LotL) techniques and privilege escalation exploits (e.g., CVE-2021-36942/PetitPotam) further obscured detection, increasing the potential for unauthorized lateral movement across networks.

Telecommunications company in the Middle East
Cyber Attack
Severity: 100
Impact: 6
Seen: 6/2021
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: Threat actors linked to China exploited the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint to breach a Middle Eastern telecommunications company shortly after its public disclosure in July 2025. The attack involved bypassing authentication and achieving remote code execution (RCE) on on-premise SharePoint servers, enabling persistent and stealthy access for credential theft and espionage. The Salt Typhoon (Glowworm) group deployed malicious tools like Zingdoor, ShadowPad, and KrustyLoader, a Rust-based loader previously tied to China-nexus espionage campaigns. The attackers aimed to exfiltrate sensitive data, establish long-term access, and likely gather intelligence for geopolitical or economic advantage. While no explicit data leak was confirmed, the compromise of a telecom provider a critical infrastructure sector poses risks to national security, customer privacy, and regional stability. The attack aligns with broader campaigns targeting government agencies, universities, and financial institutions globally, suggesting a coordinated effort by multiple Chinese state-sponsored groups. The use of living-off-the-land (LotL) techniques and privilege escalation exploits (e.g., CVE-2021-36942/PetitPotam) further obscured detection, increasing the potential for unauthorized lateral movement across networks.

Ailogo

Zain Group Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Zain Group

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Zain Group in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Zain Group in 2026.

Incident Types Zain Group vs Telecommunications Industry Avg (This Year)

No incidents recorded for Zain Group in 2026.

Incident History — Zain Group (X = Date, Y = Severity)

Zain Group cyber incidents detection timeline including parent company and subsidiaries

Zain Group Company Subsidiaries

SubsidiaryImage

Zain Group is a leading provider of innovative ICT technologies & digital lifestyle communications operating in 8 markets across the Middle East & Africa, serving 50.9 million active customers as of 30 June 2025. Zain provides mobile voice, data and B2B services in: Kuwait, Bahrain, Iraq, Jordan, Saudi Arabia, Sudan and South Sudan. Headquartered in the UAE, ZainTECH, the Group’s one-stop digital and ICT solutions provider, is playing a key role in the digital transformation of enterprise and government clientele across the MENA region. Also UAE based, Zain Omantel International (ZOI) is revolutionizing the international telecommunications wholesale landscape as the premier wholesale powerhouse serving regional operators, international carriers, and global hyperscalers. In Morocco, Zain has a 15.5% stake in ‘INWI’, through a joint venture. Zain is listed on the Boursa Kuwait (stock ticker: ZAIN). We recommend the Investor Community to download the “Zain Group Investor Relations” Mobile App. For more, please email [email protected]

Loading...
similarCompanies

Zain Group Similar Companies

ACN is the leading direct selling telecommunications and essential services provider. ACN Inc. was founded in 1993 by four entrepreneurs and is now operating in North America. ACN offers essential products and services that people use every day, while also offering a powerful business ownership oppo

PTCL.Official

𝗩𝗶𝘀𝗶𝗼𝗻: To be the leading and most admired Telecom and ICT provider in and for Pakistan. 𝐌𝐢𝐬𝐬𝐢𝐨𝐧: To be the partner of choice for our customers, to develop our people and to deliver value to our shareholders. 𝗖𝗼𝗿𝗽𝗼𝗿𝗮𝘁𝗲 𝗩𝗮𝗹𝘂𝗲𝘀: Be resilient Think Big Win Every Battle Value Success PTCL is goin

Rogers Communications

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de commu

Motorola Solutions

About Motorola Solutions | Solving for safer Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, sa

Totalplay

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion

(Formerly etisalat UAE) For more than four decades, we have connected people and now we’ve evolved to become the digital telco of the future. Our mission is to grow, transform and excel as the region’s technology leader while enhancing digital customer experience and operation agility. e& UAE offe

Nokia

Nokia is a global leader in connectivity for the AI era. With expertise across fixed, mobile, and transport networks, powered by the innovation of Nokia Bell Labs, we’re advancing connectivity to secure a brighter world. Advanced connectivity is key to enable the opportunities of AI – opening new d

Telkomsel

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity an

Proximus Group

Proximus Group is a provider of future-proof connectivity, IT and digital services, headquartered in Brussels. The Group is actively engaged in building a connected world that people trust, so society blooms. The Domestic segment is focused on providing state-of-the art telecommunications and IT se

newsone

Zain Group CyberSecurity News

January 16, 2026 11:55 AM
Oman Data Park and ZainTECH forge strategic partnership to advance cybersecurity capabilities

The partnership brings together in-country cloud infrastructure and regional cybersecurity expertise to support government and enterprise...

January 08, 2026 08:00 AM
ODP and Zain partner for cybersecurity in Oman – and beyond

Oman Data Park (ODP), a managed services and cloud provider delivering ICT solutions, has entered into a strategic partnership with ZainTECH...

January 08, 2026 08:00 AM
ZAWYA-SNG: Oman Data Park, ZainTECH forge cybersecurity partnership

Staff WriterOman Data Park (ODP), the Sultanate's first managed services and cloud provider delivering secure, scalable, and locally hosted...

December 24, 2025 08:00 AM
Zain Kuwait’s ‘Women in Tech’ opens new pathways for women into digital roles

KUWAIT: Zain Kuwait's 'Women in Tech' initiative proved to be a resounding success in 2025, as the company continued to open new pathways...

December 17, 2025 08:00 AM
ZainTECH and Vortex join forces to revolutionize video compression and AI visual intelligence

ZainTECH, the integrated digital solutions arm of Zain Group, has announced a strategic partnership with Vortex Global, a cutting-edge...

November 30, 2025 08:00 AM
Zain invests in youth cyber capabilities to safeguard and enhance digital future

KUWAIT: Zain Kuwait has supported the Kuwait Technical College (ktech) Cyberthon challenge, held in cooperation with the Ministry of...

November 21, 2025 08:00 AM
Clop Ransomware Attack Targets Zain Group in Kuwait

On November 21, 2025, the Clop ransomware group announced they had successfully breached the systems of Zain Group (zain.com),...

October 18, 2025 07:00 AM
Bourisli: Zain seeks purpose-driven talent who share our passion for creating positive change

KUWAIT: Zain Kuwait sponsored the 4th edition of Watheefti, the largest career gathering in Kuwait. The event was held over the weekend at...

October 14, 2025 07:00 AM
Zain digitally empowers over 500 girls and young women

KUWAIT: Zain announced the successful conclusion of the second edition of the Academy X program in strategic partnership with CODED Academy,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Zain Group CyberSecurity History Information

Official Website of Zain Group

The official website of Zain Group is https://www.zain.com.

Zain Group’s AI-Generated Cybersecurity Score

According to Rankiteo, Zain Group’s AI-generated cybersecurity score is 774, reflecting their Fair security posture.

How many security badges does Zain Group’ have ?

According to Rankiteo, Zain Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Zain Group been affected by any supply chain cyber incidents ?

According to Rankiteo, Zain Group has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Zain Group have SOC 2 Type 1 certification ?

According to Rankiteo, Zain Group is not certified under SOC 2 Type 1.

Does Zain Group have SOC 2 Type 2 certification ?

According to Rankiteo, Zain Group does not hold a SOC 2 Type 2 certification.

Does Zain Group comply with GDPR ?

According to Rankiteo, Zain Group is not listed as GDPR compliant.

Does Zain Group have PCI DSS certification ?

According to Rankiteo, Zain Group does not currently maintain PCI DSS compliance.

Does Zain Group comply with HIPAA ?

According to Rankiteo, Zain Group is not compliant with HIPAA regulations.

Does Zain Group have ISO 27001 certification ?

According to Rankiteo,Zain Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Zain Group

Zain Group operates primarily in the Telecommunications industry.

Number of Employees at Zain Group

Zain Group employs approximately 15,982 people worldwide.

Subsidiaries Owned by Zain Group

Zain Group presently has no subsidiaries across any sectors.

Zain Group’s LinkedIn Followers

Zain Group’s official LinkedIn profile has approximately 321,194 followers.

NAICS Classification of Zain Group

Zain Group is classified under the NAICS code 517, which corresponds to Telecommunications.

Zain Group’s Presence on Crunchbase

No, Zain Group does not have a profile on Crunchbase.

Zain Group’s Presence on LinkedIn

Yes, Zain Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/zain.

Cybersecurity Incidents Involving Zain Group

As of January 21, 2026, Rankiteo reports that Zain Group has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Zain Group has an estimated 9,783 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Zain Group ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does Zain Group detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with broadcom's symantec threat hunter team (investigation), and remediation measures with patching cve-2025-53770 (if not already applied)..

Incident Details

Can you provide details on each incident ?

Incident : Cyber Espionage

Title: Exploitation of CVE-2025-53770 (ToolShell) in Microsoft SharePoint by China-Linked Threat Actors

Description: Threat actors with ties to China exploited the ToolShell security vulnerability (CVE-2025-53770) in Microsoft SharePoint to breach multiple entities globally, including a telecommunications company in the Middle East, government departments in Africa and South America, a U.S. university, a state technology agency in Africa, a government department in the Middle East, and a finance company in Europe. The attacks involved bypassing authentication to achieve remote code execution, deploying malware (e.g., Zingdoor, ShadowPad, KrustyLoader), and leveraging living-off-the-land (LotL) tools for credential theft and persistence. The activity is attributed to multiple China-nexus groups, including Linen Typhoon, Violet Typhoon, Storm-2603, and Salt Typhoon, with motives likely tied to espionage.

Date Publicly Disclosed: 2025-07

Type: Cyber Espionage

Attack Vector: Exploitation of Public-Facing Application (CVE-2025-53770)DLL Side-LoadingPrivilege Escalation (CVE-2021-36942)Living-off-the-Land (LotL) Tools

Vulnerability Exploited: CVE-2025-53770 (ToolShell, patch bypass for CVE-2025-49704/CVE-2025-49706)CVE-2021-36942 (PetitPotam)Unspecified SQL Server VulnerabilitiesUnspecified Adobe ColdFusion Vulnerabilities

Threat Actor: Linen Typhoon (Budworm)Violet Typhoon (Sheathminer)Storm-2603Salt Typhoon (Glowworm)UNC5221 (suspected overlap)

Motivation: EspionageCredential TheftPersistent Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Exploited Microsoft SharePoint (CVE-2025-53770)SQL ServersAdobe ColdFusion Vulnerabilities.

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyber Espionage ZAI2703327102325

Data Compromised: Credentials, Potentially sensitive government/telecom/financial data

Systems Affected: Microsoft SharePoint Servers (On-Premise)SQL ServersApache HTTP Servers with Adobe ColdFusionDomain Controllers (via CVE-2021-36942)

Brand Reputation Impact: Potential reputational damage to affected entities (e.g., telecom company, government agencies)

Identity Theft Risk: High (due to credential theft)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credentials, Potentially Government/Telecom/Financial Data and .

Which entities were affected by each incident ?

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Unnamed Telecommunications Company

Entity Type: Private

Industry: Telecommunications

Location: Middle East

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Government Departments (Multiple)

Entity Type: Government

Industry: Public Sector

Location: Africa

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Government Agencies

Entity Type: Government

Industry: Public Sector

Location: South America

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Unnamed University

Entity Type: Educational

Industry: Higher Education

Location: United States

Incident : Cyber Espionage ZAI2703327102325

Entity Name: State Technology Agency

Entity Type: Government

Industry: Technology

Location: Africa

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Government Department

Entity Type: Government

Industry: Public Sector

Location: Middle East

Incident : Cyber Espionage ZAI2703327102325

Entity Name: Finance Company

Entity Type: Private

Industry: Financial Services

Location: Europe

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cyber Espionage ZAI2703327102325

Third Party Assistance: Broadcom'S Symantec Threat Hunter Team (Investigation).

Remediation Measures: Patching CVE-2025-53770 (if not already applied)

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Broadcom's Symantec Threat Hunter Team (investigation), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Cyber Espionage ZAI2703327102325

Type of Data Compromised: Credentials, Potentially government/telecom/financial data

Sensitivity of Data: High (government, telecom, financial sectors targeted)

Data Exfiltration: Likely (for espionage purposes)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Patching CVE-2025-53770 (if not already applied), .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Cyber Espionage ZAI2703327102325

Ransomware Strain: WarlockLockBitBabuk (deployed by Storm-2603 in unrelated recent attacks)

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Cyber Espionage ZAI2703327102325

Lessons Learned: 1. Patch management is critical, especially for publicly disclosed vulnerabilities like CVE-2025-53770, which was exploited even after patches were available. 2. China-nexus threat actors continue to target high-value sectors (telecom, government, finance) for espionage, leveraging both zero-days and known vulnerabilities. 3. Defense-in-depth strategies (e.g., monitoring for LotL tools, privilege escalation attempts) are essential to detect post-exploitation activity.

What recommendations were made to prevent future incidents ?

Incident : Cyber Espionage ZAI2703327102325

Recommendations: 1. Immediate patching of Microsoft SharePoint servers for CVE-2025-53770 and related flaws (CVE-2025-49704, CVE-2025-49706). 2. Audit and harden SQL servers and Adobe ColdFusion instances to prevent exploitation via side-loading or other techniques. 3. Monitor for indicators of compromise (IoCs) tied to KrustyLoader, ShadowPad, Zingdoor, and other tools used in these attacks. 4. Implement multi-factor authentication (MFA) and least-privilege access controls to mitigate credential theft risks. 5. Enhance logging and detection for privilege escalation attempts (e.g., PetitPotam exploitation). 6. Conduct threat hunting for signs of persistent access or backdoors established by China-linked groups.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are 1. Patch management is critical, especially for publicly disclosed vulnerabilities like CVE-2025-53770, which was exploited even after patches were available. 2. China-nexus threat actors continue to target high-value sectors (telecom, government, finance) for espionage, leveraging both zero-days and known vulnerabilities. 3. Defense-in-depth strategies (e.g., monitoring for LotL tools, privilege escalation attempts) are essential to detect post-exploitation activity.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: 1. Immediate patching of Microsoft SharePoint servers for CVE-2025-53770 and related flaws (CVE-2025-49704, CVE-2025-49706). 2. Audit and harden SQL servers and Adobe ColdFusion instances to prevent exploitation via side-loading or other techniques. 3. Monitor for indicators of compromise (IoCs) tied to KrustyLoader, ShadowPad, Zingdoor, and other tools used in these attacks. 4. Implement multi-factor authentication (MFA) and least-privilege access controls to mitigate credential theft risks. 5. Enhance logging and detection for privilege escalation attempts (e.g. and PetitPotam exploitation). 6. Conduct threat hunting for signs of persistent access or backdoors established by China-linked groups..

References

Where can I find more information about each incident ?

Incident : Cyber Espionage ZAI2703327102325

Source: Broadcom's Symantec Threat Hunter Team

Incident : Cyber Espionage ZAI2703327102325

Source: Synacktiv (KrustyLoader analysis)

Date Accessed: 2024-01

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Broadcom's Symantec Threat Hunter Team, and Source: Synacktiv (KrustyLoader analysis)Date Accessed: 2024-01.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Cyber Espionage ZAI2703327102325

Investigation Status: Ongoing (attribution to specific groups remains inconclusive; evidence points to China-based actors)

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Cyber Espionage ZAI2703327102325

Entry Point: Exploited Microsoft Sharepoint (Cve-2025-53770), Sql Servers, Adobe Coldfusion Vulnerabilities,

Backdoors Established: ['ShadowPad', 'KrustyLoader', 'Zingdoor']

High Value Targets: Telecommunications Infrastructure, Government Networks, Financial Data,

Data Sold on Dark Web: Telecommunications Infrastructure, Government Networks, Financial Data,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Cyber Espionage ZAI2703327102325

Root Causes: 1. Delayed or incomplete patching of critical vulnerabilities (CVE-2025-53770). 2. Insufficient monitoring for post-exploitation activity (e.g., LotL tools, privilege escalation). 3. Overlap in tools/TTPs with previously attributed China-linked groups (e.g., Glowworm) suggests targeted espionage campaigns.

Corrective Actions: 1. Accelerate vulnerability management processes for high-severity flaws. 2. Deploy behavioral detection for malware loaders (e.g., KrustyLoader) and espionage tools (e.g., ShadowPad). 3. Isolate and segment high-value systems (e.g., government/telecom networks) to limit lateral movement. 4. Conduct red team exercises to test defenses against similar attack chains.

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Broadcom'S Symantec Threat Hunter Team (Investigation), .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: 1. Accelerate vulnerability management processes for high-severity flaws. 2. Deploy behavioral detection for malware loaders (e.g., KrustyLoader) and espionage tools (e.g., ShadowPad). 3. Isolate and segment high-value systems (e.g., government/telecom networks) to limit lateral movement. 4. Conduct red team exercises to test defenses against similar attack chains..

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Linen Typhoon (Budworm)Violet Typhoon (Sheathminer)Storm-2603Salt Typhoon (Glowworm)UNC5221 (suspected overlap).

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-07.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Credentials, Potentially Sensitive Government/Telecom/Financial Data and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Microsoft SharePoint Servers (On-Premise)SQL ServersApache HTTP Servers with Adobe ColdFusionDomain Controllers (via CVE-2021-36942).

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was broadcom's symantec threat hunter team (investigation), .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Credentials and Potentially Sensitive Government/Telecom/Financial Data.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was 1. Patch management is critical, especially for publicly disclosed vulnerabilities like CVE-2025-53770, which was exploited even after patches were available. 2. China-nexus threat actors continue to target high-value sectors (telecom, government, finance) for espionage, leveraging both zero-days and known vulnerabilities. 3. Defense-in-depth strategies (e.g., monitoring for LotL tools, privilege escalation attempts) are essential to detect post-exploitation activity.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was 1. Immediate patching of Microsoft SharePoint servers for CVE-2025-53770 and related flaws (CVE-2025-49704, CVE-2025-49706). 2. Audit and harden SQL servers and Adobe ColdFusion instances to prevent exploitation via side-loading or other techniques. 3. Monitor for indicators of compromise (IoCs) tied to KrustyLoader, ShadowPad, Zingdoor, and other tools used in these attacks. 4. Implement multi-factor authentication (MFA) and least-privilege access controls to mitigate credential theft risks. 5. Enhance logging and detection for privilege escalation attempts (e.g. and PetitPotam exploitation). 6. Conduct threat hunting for signs of persistent access or backdoors established by China-linked groups..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Broadcom's Symantec Threat Hunter Team and Synacktiv (KrustyLoader analysis).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (attribution to specific groups remains inconclusive; evidence points to China-based actors).

Initial Access Broker

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=zain' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge