Company Details
morgan-stanley
94,632
3,465,892
52
morganstanley.com
615
MOR_1576279
Completed

Morgan Stanley Company CyberSecurity Posture
morganstanley.comMorgan Stanley (NYSE: MS) is a leading global financial services firm providing a wide range of investment banking, securities, wealth management and investment management services. With offices in 42 countries, our firm's employees serve clients worldwide including corporations, governments, institutions and individuals. We are committed to maintaining the first-class service and high standard of excellence that have always defined the firm and everything we do is guided by our five core values: Do the right thing, put clients first, lead with exceptional ideas, commit to diversity and inclusion, and give back.
Company Details
morgan-stanley
94,632
3,465,892
52
morganstanley.com
615
MOR_1576279
Completed
Between 800 and 849

Morgan Stanley Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported that a vendor of Morgan Stanley, Guidehouse, experienced a data breach on January 20, 2021, involving unauthorized access to personal information for approximately 116 Maine residents. The breach was discovered on May 20, 2021, and compromised information included names, addresses, dates of birth, and Social Security numbers. Affected residents are being offered 24 months of Experian IdentityWorks credit monitoring services at no charge.
Description: The California Office of the Attorney General reported a data breach involving Morgan Stanley on July 10, 2020. The breach history indicated potential exposure of personal information related to customer accounts due to mishandling of decommissioned equipment that may have contained unencrypted data; however, the exact breach date is not available.
Description: Investment banking firm Morgan Stanley experienced a data breach incident after its third-party vendor Accellion FTA server was targeted in a ransomware attack. The breach compromised the personal data including names, addresses, Social security numbers, and other information of its customers and clients. Morgan Stanley along with Guidehouse investigated the incident and took further preventive steps.
Description: The wealth and asset management division of Morgan Stanley, Morgan Stanley Wealth Management suffered a social engineering attack. The customers were targeted as a result of vishing (aka voice phishing), a social engineering attack where scammers impersonate a trusted entity during a voice call to convince their targets into revealing sensitive information. The hackers also electronically transferred money to their own bank account by initiating payments using the Zelle payment service. Morgan Stanley immediately disabled the accounts of all customers affected by these attacks and secured its systems.


No incidents recorded for Morgan Stanley in 2025.
No incidents recorded for Morgan Stanley in 2025.
No incidents recorded for Morgan Stanley in 2025.
Morgan Stanley cyber incidents detection timeline including parent company and subsidiaries

Morgan Stanley (NYSE: MS) is a leading global financial services firm providing a wide range of investment banking, securities, wealth management and investment management services. With offices in 42 countries, our firm's employees serve clients worldwide including corporations, governments, institutions and individuals. We are committed to maintaining the first-class service and high standard of excellence that have always defined the firm and everything we do is guided by our five core values: Do the right thing, put clients first, lead with exceptional ideas, commit to diversity and inclusion, and give back.


A formidable global conglomerate, LOLC Holdings has strategically diversified into key economic growth sectors across financial services, leisure, agriculture and plantations, construction and real estate, manufacturing and trading, technology, research and innovation and strategic investments. The
Aditya Birla Capital Ltd is a financial services company based out of One World Center, Tower 1, 18th Floor, Jupiter Mills Compound, 841, Senapati Bapat Marg, Elphinstone Road, MUMBAI, India. - Aditya Birla Capital is committed to provide equal opportunity to all in employment and prohibits discrim

Sparkassen: Nah, präsent und persönlich Als verlässliche Hausbank stehen wir immer und überall an der Seite unserer Kund:innen und Mitarbeitenden. Mit den Sparkassen können Sie auf exzellente Beratung und einen echten Finanzverbund zählen, der nicht nur Ihre persönlichen Finanzen, sondern auch die f

Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $23 billion and more than 85,000 colleagues,

Northwestern Mutual is here for what’s most important—helping families and businesses experience the freedom of financial security for over 160 years. Through our personalized, holistic approach, including both insurance and investments, we’re helping people make the most of life today, and for days

From local communities to global markets, we are dedicated to shaping the future responsibly and helping clients thrive in a changing world. “Bank of America Merrill Lynch” is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Bank of America is
Edward Jones is a leading North American financial services firm in the U.S. and through its affiliate in Canada. The firm’s more than 20,000 financial advisors throughout North America serve more than 9 million clients with a total of $2.2 trillion in client assets under care as of December 31, 202

From the largest cities to the smallest villages, India is filled with ambition and enterprise. As Indians from all walks of life set out to write their growth story, our timely and affordable credit empowers them to bring their dreams alive. As part of the TVS Group, we empower Indians from vario

At Ameriprise Financial, we have been helping people feel more confident about their financial future for 130 years. With extensive investment advice, asset management and insurance capabilities and a nationwide network of approximately 10,000 financial advisors*, we have the strength and expertise
.png)
A data breach at SitusAMC has affected several major US banks after attackers breached the finance technology company's network.
A cyberattack on a New York-based tech vendor has led to the exposure of sensitive customer data, including records belonging to three of...
A cyberattack on vendor SitusAMC has potentially exposed client data from JPMorgan Chase, Citi, and Morgan Stanley, prompting an FBI...
A third-party attack on residential loan mortgage origination and collection company SitusAMC caused great concern because the company...
Morgan Stanley Stock Today, November 24, 2025: Analyst Upgrade, Cyberattack Fallout and What It Means for MS Shareholders - TechStock².
A recent cyberattack on New York-based real estate services firm SitusAMC may have compromised sensitive client and internal data of major...
Morgan Stanley sees stronger outlooks for palo alto networks, CrowdStrike, and Zscaler, thanks to ongoing growth and market share wins.
Key Takeaways Morgan Stanley raises CrowdStrike (CRWD) price target from $475 to $515. Current rating by Morgan Stanley remains...
Saudi Arabia's PIF has appointed advisers to prepare for the planned IPO of cybersecurity subsidiary Saudi Information Technology Co.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Morgan Stanley is http://www.morganstanley.com.
According to Rankiteo, Morgan Stanley’s AI-generated cybersecurity score is 809, reflecting their Good security posture.
According to Rankiteo, Morgan Stanley currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Morgan Stanley is not certified under SOC 2 Type 1.
According to Rankiteo, Morgan Stanley does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Morgan Stanley is not listed as GDPR compliant.
According to Rankiteo, Morgan Stanley does not currently maintain PCI DSS compliance.
According to Rankiteo, Morgan Stanley is not compliant with HIPAA regulations.
According to Rankiteo,Morgan Stanley is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Morgan Stanley operates primarily in the Financial Services industry.
Morgan Stanley employs approximately 94,632 people worldwide.
Morgan Stanley presently has no subsidiaries across any sectors.
Morgan Stanley’s official LinkedIn profile has approximately 3,465,892 followers.
Morgan Stanley is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Morgan Stanley does not have a profile on Crunchbase.
Yes, Morgan Stanley maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/morgan-stanley.
As of December 11, 2025, Rankiteo reports that Morgan Stanley has experienced 4 cybersecurity incidents.
Morgan Stanley has an estimated 30,346 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with guidehouse, and containment measures with disabled affected customer accounts and secured systems..
Title: Morgan Stanley Data Breach via Accellion FTA Server
Description: Morgan Stanley experienced a data breach incident after its third-party vendor Accellion FTA server was targeted in a ransomware attack. The breach compromised the personal data including names, addresses, Social Security numbers, and other information of its customers and clients. Morgan Stanley along with Guidehouse investigated the incident and took further preventive steps.
Type: Data Breach
Attack Vector: Ransomware attack via third-party vendor
Vulnerability Exploited: Accellion FTA server vulnerability
Title: Guidehouse Data Breach
Description: A vendor of Morgan Stanley, Guidehouse, experienced a data breach involving unauthorized access to personal information for approximately 116 Maine residents.
Date Detected: 2021-05-20
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Morgan Stanley Data Breach
Description: The California Office of the Attorney General reported a data breach involving Morgan Stanley on July 10, 2020. The breach history indicated potential exposure of personal information related to customer accounts due to mishandling of decommissioned equipment that may have contained unencrypted data; however, the exact breach date is not available.
Date Publicly Disclosed: 2020-07-10
Type: Data Breach
Attack Vector: Mishandling of decommissioned equipment
Vulnerability Exploited: Unencrypted data on decommissioned equipment
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Accellion FTA server and Voice phishing.

Data Compromised: Names, Addresses, Social security numbers, Other information
Systems Affected: Accellion FTA server

Data Compromised: Names, Addresses, Dates of birth, Social security numbers

Data Compromised: Personal information related to customer accounts
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers, Other Information, , Personal Information, and Personal information.

Entity Name: Morgan Stanley
Entity Type: Investment Banking Firm
Industry: Finance

Entity Name: Guidehouse
Entity Type: Vendor
Industry: Financial Services
Customers Affected: 116

Entity Name: Morgan Stanley
Entity Type: Financial Services
Industry: Finance

Third Party Assistance: Guidehouse.
Third-Party Assistance: The company involves third-party assistance in incident response through Guidehouse, .

Type of Data Compromised: Names, Addresses, Social security numbers, Other information
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 116
Sensitivity of Data: High

Type of Data Compromised: Personal information
Data Encryption: Unencrypted
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabled affected customer accounts and secured systems.

Source: Maine Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2020-07-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2020-07-10.

Investigation Status: Investigated by Morgan Stanley and Guidehouse

Entry Point: Accellion FTA server
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Guidehouse, .
Most Recent Incident Detected: The most recent incident detected was on 2021-05-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-07-10.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, other information, , names, addresses, dates of birth, Social Security numbers, and Personal information related to customer accounts.
Most Significant System Affected: The most significant system affected in an incident was Accellion FTA server.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was guidehouse, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disabled affected customer accounts and secured systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were other information, names, dates of birth, Social Security numbers, addresses and Personal information related to customer accounts.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 116.0.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigated by Morgan Stanley and Guidehouse.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Accellion FTA server and Voice phishing.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
