Company Details
abb
112,125
3,964,929
33325
abb.com
109
ABB_3110492
Completed

ABB Company CyberSecurity Posture
abb.comABB is a technology leader in electrification and automation, enabling a more sustainable and resource-efficient future. The company’s solutions connect engineering know-how and software to optimize how things are manufactured, moved, powered and operated. Building on over 140 years of excellence, ABB’s more than 110,000 employees are committed to driving innovations that accelerate industrial transformation. www.abb.com Privacy notice & house rules: https://social.abb/social-media-information Before applying for a job at ABB, please read our Fraud Warning: https://careers.abb/global/en/fraud-warning
Company Details
abb
112,125
3,964,929
33325
abb.com
109
ABB_3110492
Completed
Between 800 and 849

ABB Global Score (TPRM)XXXX

Description: The California Office of the Attorney General disclosed that **ABB, Inc.** suffered a data breach on **August 25, 2017**, stemming from suspicious login activity in an employee’s email account. The incident exposed sensitive personal information, including **names, addresses, Social Security numbers, and medical records** of an unspecified number of individuals. While the exact scale of the breach remains undisclosed, the compromised data suggests a significant risk of identity theft or fraud. In response, ABB offered **one year of identity monitoring services** to affected parties, indicating an effort to mitigate potential harm. The breach highlights vulnerabilities in employee account security, raising concerns about unauthorized access to highly confidential data. The exposure of medical records further escalates the severity, as such information is often targeted for exploitation in cybercrime schemes.
Description: The world's largest provider of automation and electrification technology, ABB of Switzerland, acknowledged a data breach following a ransomware attack that purportedly affected its business operations. The company's Windows Active Directory was compromised by the attack, infecting hundreds of devices, according to BleepingComputer, which broke the news of the incident first. According to BleepingComputer, the Black Basta ransomware organisation was responsible for the attack, which also caused some projects to be postponed and affected some of the corporate factories. The company claimed via a news release that threat actors gained unauthorised access to several ABB systems, installed ransomware, and stole some data.


No incidents recorded for ABB in 2025.
No incidents recorded for ABB in 2025.
No incidents recorded for ABB in 2025.
ABB cyber incidents detection timeline including parent company and subsidiaries

ABB is a technology leader in electrification and automation, enabling a more sustainable and resource-efficient future. The company’s solutions connect engineering know-how and software to optimize how things are manufactured, moved, powered and operated. Building on over 140 years of excellence, ABB’s more than 110,000 employees are committed to driving innovations that accelerate industrial transformation. www.abb.com Privacy notice & house rules: https://social.abb/social-media-information Before applying for a job at ABB, please read our Fraud Warning: https://careers.abb/global/en/fraud-warning


Emerson is a leading global technology, software, and engineering company providing innovative solutions for customers in industrial and commercial markets. We help customers in the world’s most essential industries solve the biggest challenges of modern life. Every day, our global workforce fulfil

KUKA SE & Co. KGaA is a global leader in intelligent automation solutions, generating around 3.7 billion euro in sales and employing approximately 15,000 people worldwide. Headquartered in Augsburg, Germany, KUKA’s mission is to make automation accessible for everyone - simple, intuitive and sustain

Astra was established in 1957 as a trading company. Over the course of its development, Astra has formed a number of strategic alliances with leading global players. Since 1990, the Company has been listed on the Indonesia Stock Exchange. Astra currently engages in seven business lines: Autom
Siemens AG (Berlin and Munich) is a leading technology company focused on industry, infrastructure, mobility, and healthcare. The company’s purpose is to create technology to transform the everyday, for everyone. By combining the real and the digital worlds, Siemens empowers customers to accelerate

Schneider Electric is a global energy technology leader, driving efficiency and sustainability by electrifying, automating, and digitalizing industries, businesses, and homes. Its technologies enable buildings, data centers, factories, infrastructure, and grids to operate as open, interconnected e
.png)
ABB India and Deloitte partner to accelerate AI-driven, secure digital transformation for Indian enterprises.
The alliance combines ABB India's automation and digital solutions with Deloitte India's transformation and cybersecurity expertise.
AI-driven Digital Transformation In Manufacturing: Partnership combines ABB's industrial automation platforms with Deloitte's transformation...
ABB India and Deloitte India team up to provide AI-enabled digital solutions to enterprises, aiming to accelerate digital transformation and...
From natural gas operations to oil refineries and petrochemical plants, gas chromatographs (GCs) play a crucial role across the hydrocarbon...
ABB has launched the GCP100 gas chromatograph, setting a new standard in cybersecurity and real-time analysis of complex gas mixtures in the...
ABB has unveiled the GCP100, the first gas chromatograph of its kind to integrate advanced cybersecurity features and built-in Wi-Fi...
ProcessMaster, ABB's next generation electromagnetic flowmeters, now allow for high-speed transmission of field data in hazardous...
ABB has launched the GCP100 gas chromatograph, setting a new benchmark for cybersecurity in gas analysis. It enables real-time analysis of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ABB is https://social.abb/website.
According to Rankiteo, ABB’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, ABB currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ABB is not certified under SOC 2 Type 1.
According to Rankiteo, ABB does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ABB is not listed as GDPR compliant.
According to Rankiteo, ABB does not currently maintain PCI DSS compliance.
According to Rankiteo, ABB is not compliant with HIPAA regulations.
According to Rankiteo,ABB is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ABB operates primarily in the Automation Machinery Manufacturing industry.
ABB employs approximately 112,125 people worldwide.
ABB presently has no subsidiaries across any sectors.
ABB’s official LinkedIn profile has approximately 3,964,929 followers.
ABB is classified under the NAICS code 33325, which corresponds to Others.
No, ABB does not have a profile on Crunchbase.
Yes, ABB maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/abb.
As of December 11, 2025, Rankiteo reports that ABB has experienced 2 cybersecurity incidents.
ABB has an estimated 3,233 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with news release, and remediation measures with offered one year of identity monitoring services to affected individuals..
Title: ABB Data Breach and Ransomware Attack
Description: ABB of Switzerland acknowledged a data breach following a ransomware attack that affected its business operations. The company's Windows Active Directory was compromised, infecting hundreds of devices. The Black Basta ransomware organization was responsible for the attack, which also caused some projects to be postponed and affected some of the corporate factories. Threat actors gained unauthorized access to several ABB systems, installed ransomware, and stole some data.
Type: Data Breach and Ransomware Attack
Attack Vector: Windows Active Directory
Threat Actor: Black Basta ransomware organization
Motivation: Data theft and ransom
Title: ABB, Inc. Data Breach via Suspicious Email Login Activity
Description: The California Office of the Attorney General reported that ABB, Inc. experienced a data breach involving suspicious login activity to an employee's email account on August 25, 2017. The breach potentially exposed personal information including names, addresses, Social Security numbers, and medical records, affecting an unspecified number of individuals. ABB is offering one year of identity monitoring services as a response to the incident.
Date Detected: 2017-08-25
Type: Data Breach
Attack Vector: Compromised Email Account (Suspicious Login Activity)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Windows Active Directory and Compromised employee email account.

Data Compromised: Some data stolen
Systems Affected: Windows Active Directoryhundreds of devices
Downtime: Some projects postponed
Operational Impact: Affected some corporate factories

Data Compromised: Names, Addresses, Social security numbers, Medical records
Systems Affected: Employee Email Account
Identity Theft Risk: High (PII and medical records exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Entity Name: ABB
Entity Type: Company
Industry: Automation and Electrification Technology
Location: Switzerland

Entity Name: ABB, Inc.
Entity Type: Corporation
Industry: Engineering, Technology, and Automation
Location: California, USA (HQ: Switzerland)
Customers Affected: Unspecified

Communication Strategy: News release

Remediation Measures: Offered one year of identity monitoring services to affected individuals

Data Exfiltration: Some data stolen

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: Unspecified
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesSocial Security NumbersMedical Records
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Offered one year of identity monitoring services to affected individuals, .

Ransomware Strain: Black Basta
Data Encryption: Ransomware installed
Data Exfiltration: Some data stolen

Regulatory Notifications: Reported to the California Office of the Attorney General

Source: BleepingComputer

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: California Office of the Attorney General.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through News release.

Customer Advisories: One year of identity monitoring services offered to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were One Year Of Identity Monitoring Services Offered To Affected Individuals and .

Entry Point: Windows Active Directory

Entry Point: Compromised employee email account
Last Attacking Group: The attacking group in the last incident was an Black Basta ransomware organization.
Most Recent Incident Detected: The most recent incident detected was on 2017-08-25.
Most Significant Data Compromised: The most significant data compromised in an incident were Some data stolen, Names, Addresses, Social Security Numbers, Medical Records and .
Most Significant System Affected: The most significant system affected in an incident was Windows Active Directoryhundreds of devices and Employee Email Account.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Some data stolen, Names, Social Security Numbers, Addresses and Medical Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Recent Source: The most recent source of information about an incident are BleepingComputer and California Office of the Attorney General.
Most Recent Customer Advisory: The most recent customer advisory issued was an One year of identity monitoring services offered to affected individuals.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Compromised employee email account and Windows Active Directory.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.