Company Details
rbc
96,639
871,247
52211
rbc.com
0
RBC_1412822
In-progress

RBC Company CyberSecurity Posture
rbc.comRoyal Bank of Canada is a global financial institution with a purpose-driven, principles-led approach to delivering leading performance. Our success comes from the 94,000+ employees who leverage their imaginations and insights to bring our vision, values and strategy to life so we can help our clients thrive and communities prosper. As Canada's biggest bank and one of the largest in the world, based on market capitalization, we have a diversified business model with a focus on innovation and providing exceptional experiences to our more than 17 million clients in Canada, the U.S. and 27 other countries. Learn more at rbc.com. We are proud to support a broad range of community initiatives through donations, community investments and employee volunteer activities. See how at www.rbc.com/community-social-impact. http://rbc.com/legalstuff. La Banque Royale du Canada est une institution financière mondiale définie par sa raison d'être, guidée par des principes et orientée vers l'excellence en matière de rendement. Notre succès est attribuable aux quelque 94 000+ employés qui mettent à profit leur créativité et leur savoir faire pour concrétiser notre vision, nos valeurs et notre stratégie afin que nous puissions contribuer à la prospérité de nos clients et au dynamisme des collectivités. Selon la capitalisation boursière, nous sommes la plus importante banque du Canada et l'une des plus grandes banques du monde. Nous avons adopté un modèle d'affaires diversifié axé sur l'innovation et l'offre d'expériences exceptionnelles à nos plus de 17 millions de clients au Canada, aux États Unis et dans 27 autres pays. Pour en savoir plus, visitez le site rbc.com/francais Nous sommes fiers d'appuyer une grande diversité d'initiatives communautaires par des dons, des investissements dans la collectivité et le travail bénévole de nos employés. Pour de plus amples renseignements, visitez le site www.rbc.com/collectivite-impact-social. https://www.rbc.com/conditions-dutilisation/
Company Details
rbc
96,639
871,247
52211
rbc.com
0
RBC_1412822
In-progress
Between 800 and 849

RBC Global Score (TPRM)XXXX

Description: A junior RBC employee, Ibrahim El-Hakim, exploited his legitimate access to breach client records, including those of then-Prime Minister Mark Carney. Recruited via Telegram by a contact linked to organized crime ('AI WORLD'), El-Hakim allegedly opened fraudulent accounts, trafficked client identification numbers, and participated in a $68,500 credit line fraud scheme. While RBC detected the breach and terminated the employee, the incident escalated into a national security concern due to the high-profile target. Surveillance logs captured El-Hakim’s actions—accessing accounts, creating credit lines, and viewing sensitive data—but RBC’s *partial monitoring* failed to prevent or immediately flag the misuse. The case highlights systemic gaps in *least-privilege access controls* and real-time oversight, compounded by the overlap between organized crime and potential state-sponsored threats. Charges include fraud, unauthorized computer use, and trafficking personal data for fraudulent purposes. The RCMP’s national security unit took over due to the prime minister’s involvement, though no direct physical threat was confirmed.


RBC has 14.94% more incidents than the average of same-industry companies with at least one recorded incident.
RBC has 29.87% more incidents than the average of all companies with at least one recorded incident.
RBC reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
RBC cyber incidents detection timeline including parent company and subsidiaries

Royal Bank of Canada is a global financial institution with a purpose-driven, principles-led approach to delivering leading performance. Our success comes from the 94,000+ employees who leverage their imaginations and insights to bring our vision, values and strategy to life so we can help our clients thrive and communities prosper. As Canada's biggest bank and one of the largest in the world, based on market capitalization, we have a diversified business model with a focus on innovation and providing exceptional experiences to our more than 17 million clients in Canada, the U.S. and 27 other countries. Learn more at rbc.com. We are proud to support a broad range of community initiatives through donations, community investments and employee volunteer activities. See how at www.rbc.com/community-social-impact. http://rbc.com/legalstuff. La Banque Royale du Canada est une institution financière mondiale définie par sa raison d'être, guidée par des principes et orientée vers l'excellence en matière de rendement. Notre succès est attribuable aux quelque 94 000+ employés qui mettent à profit leur créativité et leur savoir faire pour concrétiser notre vision, nos valeurs et notre stratégie afin que nous puissions contribuer à la prospérité de nos clients et au dynamisme des collectivités. Selon la capitalisation boursière, nous sommes la plus importante banque du Canada et l'une des plus grandes banques du monde. Nous avons adopté un modèle d'affaires diversifié axé sur l'innovation et l'offre d'expériences exceptionnelles à nos plus de 17 millions de clients au Canada, aux États Unis et dans 27 autres pays. Pour en savoir plus, visitez le site rbc.com/francais Nous sommes fiers d'appuyer une grande diversité d'initiatives communautaires par des dons, des investissements dans la collectivité et le travail bénévole de nos employés. Pour de plus amples renseignements, visitez le site www.rbc.com/collectivite-impact-social. https://www.rbc.com/conditions-dutilisation/


Since its establishment in 1946, BNI has been part of the dynamic of national development in Indonesia. Now BNI has grown and developed into a solid national bank with a sustainable financial performance. ‘Serving the Country, Pride of the Nation”, BNI continues to increase its contribution for the
Founded in 1908 by Maharaja Sir Sayaji Rao Gaekwad III, Bank of Baroda is a top notch Public Sector Bank with a business of around Rs.10 trillion and network of 8100+ branches of which 105 overseas branches / offices are located in 17 countries excluding India spanning across Europe, US, Africa, As
Bank of China, include BOC Hong Kong, BOC International, BOCG Insurance and other financial institutions, providing a comprehensive range of high-quality financial services to individual and corporate customers as well as financial institutions worldwide. Over the past century, Bank of China pla

We’re here to do Right By You. At UOB, we aspire to build a better future for the people and businesses in the region. Through our extensive network and suite of capabilities, we offer financial solutions to the people and businesses within, and connecting with ASEAN. We create solutions tail

At National Bank, we believe in the potential of each individual, and that even the smallest gestures can make a big difference. When we help others accomplish their projects, we help empower them and the community at large. We try to make a difference through innovation, but above all, by puttin

Porque el mundo que nos rodea se actualiza constantemente, porque tu decides hacer tu vida más simple: para entretenerte, para compartir con tu familia o para moverte por la ciudad. En Bci evolucionamos junto a ti, en este mundo donde todo se transforma una y otra vez, con soluciones que harán tu vi

RBL Bank is one of India’s fastest growing private sector banks with an expanding presence across the country. The Bank offers specialized services under six business verticals namely: Corporate & Institutional Banking, Commercial Banking, Branch & Business Banking, Retail Assets and Treasury and Fi

Utkarsh Small Finance Bank Limited (USFBL), incorporated on April 30, 2016, is engaged in providing banking and financial services with a focus on the underserved and unserved sections of the country. The Bank’s lending activities are primarily focussed in rural and semi-urban locations of the count

From rescue helicopters and signing the Equator Principles, to paying super during parental leave and initiatives like Westpac SaferPay and SafeCall to protect customers from scams... we have a proud history of stepping up to be first for our customers, communities and people. We are Australia’s old
.png)
Sausalito, Calif. – Nov. 5, 2025. – Read the full story from Royal Bank of Canada. According to Cybersecurity Ventures, cybercrime damage...
Learn how to safeguard your business against increasingly sophisticated cyber threats and take proactive steps to prevent data breaches and...
Students from across the Faculty of Applied Science & Engineering and the Faculty of Arts & Science are acquiring industry-ready skills and...
The Dutch government has allocated €10 million to Ukraine to strengthen the country's digital resilience and cyber defense.
The Netherlands is strengthening its support for Ukraine by allocating additional funds to bolster the country's digital security.
CNW/ - Today, Rogers Cybersecure Catalyst at Toronto Metropolitan University ("the Catalyst"), with support from RBC, launched its newest...
Ukraine and Lithuania have signed a memorandum on strengthening cooperation in the field of critical infrastructure protection.
How to reduce your risk · Secure your home Wi-Fi with a strong password. Change those default passwords right away! · Check privacy settings on...
If fraudulent activity has been detected, it's important to contact the local authorities to report the incident, and your financial institution...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of RBC is http://www.rbc.com.
According to Rankiteo, RBC’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, RBC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, RBC is not certified under SOC 2 Type 1.
According to Rankiteo, RBC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, RBC is not listed as GDPR compliant.
According to Rankiteo, RBC does not currently maintain PCI DSS compliance.
According to Rankiteo, RBC is not compliant with HIPAA regulations.
According to Rankiteo,RBC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
RBC operates primarily in the Banking industry.
RBC employs approximately 96,639 people worldwide.
RBC presently has no subsidiaries across any sectors.
RBC’s official LinkedIn profile has approximately 871,247 followers.
RBC is classified under the NAICS code 52211, which corresponds to Commercial Banking.
Yes, RBC has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/royal-bank-of-canada-fb33.
Yes, RBC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rbc.
As of December 11, 2025, Rankiteo reports that RBC has experienced 1 cybersecurity incidents.
RBC has an estimated 6,988 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with law enforcement (rcmp integrated national security enforcement team), and and containment measures with employee termination, containment measures with account access revocation, and communication strategy with limited public disclosure, communication strategy with media statements, and enhanced monitoring with review of access controls (planned)..
Title: Insider Threat at Royal Bank of Canada (RBC) Involving Prime Minister's Data
Description: Ibrahim El-Hakim, a 23-year-old junior employee at the Royal Bank of Canada (RBC) in Ottawa, allegedly used his legitimate work credentials to access client records, including those of then-Prime Minister Mark Carney. He was recruited via Telegram by a contact named 'AI WORLD,' suspected of ties to organized crime, and instructed to open fraudulent accounts and exfiltrate sensitive information. The breach escalated into a national security concern due to the involvement of high-profile data. RBC detected the breach, terminated El-Hakim, and cooperated with law enforcement. The case highlights systemic vulnerabilities in insider threat detection, access controls, and real-time monitoring within financial institutions.
Date Publicly Disclosed: 2024-06
Type: Insider Threat
Attack Vector: Legitimate Credential AbuseSocial Engineering (Recruitment via Telegram)Insider Access Misuse
Vulnerability Exploited: Excessive Access PrivilegesInsufficient Real-Time MonitoringPartial Logging of Data AccessLack of Behavioral Anomaly Detection
Threat Actor: Primary: {'name': 'Ibrahim El-Hakim', 'role': 'RBC Junior Employee (Insider)', 'affiliation': None, 'motivation': ['Financial Gain', 'Coercion by External Actor']}Secondary: {'alias': 'AI WORLD', 'affiliation': ['Suspected Organized Crime', 'Possible State-Actor Ties'], 'role': 'Recruiter/Handler', 'communication_channel': 'Telegram (Encrypted)'}
Motivation: Financial FraudData Theft for ResalePotential Espionage (National Security Risk)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Legitimate Employee Credentials (No Malware or Phishing).

Systems Affected: Client Account Management SystemCredit Line Approval System
Operational Impact: Internal InvestigationEmployee TerminationLaw Enforcement CoordinationReputation Damage
Brand Reputation Impact: High (National Media Coverage)Erosion of Trust in Financial Security
Legal Liabilities: Criminal Charges Against EmployeePotential Regulatory Scrutiny
Identity Theft Risk: ['High (PII of Prime Minister and Other Clients Exposed)']
Payment Information Risk: ['High (Fraudulent Accounts Opened)']
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Client Identification Numbers, Financial Records, Credit Line Details and .

Entity Name: Royal Bank of Canada (RBC)
Entity Type: Financial Institution
Industry: Banking
Location: Canada (Headquarters: Toronto, Incident: Ottawa Branch)
Size: Large (Over 80,000 Employees)
Customers Affected: Prime Minister Mark Carney, Undisclosed Number of Clients

Entity Name: Government of Canada
Entity Type: Government
Industry: Public Sector
Location: Canada

Incident Response Plan Activated: True
Third Party Assistance: Law Enforcement (Rcmp Integrated National Security Enforcement Team).
Containment Measures: Employee TerminationAccount Access Revocation
Communication Strategy: Limited Public DisclosureMedia Statements
Enhanced Monitoring: Review of Access Controls (Planned)
Third-Party Assistance: The company involves third-party assistance in incident response through Law Enforcement (RCMP Integrated National Security Enforcement Team), .

Type of Data Compromised: Personally identifiable information (pii), Client identification numbers, Financial records, Credit line details
Sensitivity of Data: High (Includes Data of Prime Minister and Financial Records)
Personally Identifiable Information: NamesAccount NumbersIdentification NumbersAddress/Contact Details
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by employee termination, account access revocation and .

Regulations Violated: Potential Violations of Canadian Privacy Laws (PIPEDA), OSFI Cybersecurity Standards,
Legal Actions: Criminal Charges Against Ibrahim El-Hakim (Fraud, Unauthorized Computer Use, Trafficking in Identification Information),
Regulatory Notifications: Office of the Superintendent of Financial Institutions (OSFI) Likely Notified
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Criminal Charges Against Ibrahim El-Hakim (Fraud, Unauthorized Computer Use, Trafficking in Identification Information), .

Lessons Learned: Insider threats are among the hardest breaches to detect and require proactive mitigation strategies., Principle of 'least privilege' must be strictly enforced, especially for roles with access to high-profile or sensitive data., Real-time monitoring and behavioral analytics are critical to detect anomalous access patterns, even with legitimate credentials., Logging systems must capture not just access metadata (e.g., timestamps) but also the specific data viewed or modified., Third-party communication platforms (e.g., Telegram) can be exploited for recruiting insiders and must be monitored where feasible., National security risks can emerge from consumer-facing institutions, necessitating cross-sector collaboration between private entities and law enforcement.

Recommendations: Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g., via encrypted apps)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications.
Key Lessons Learned: The key lessons learned from past incidents are Insider threats are among the hardest breaches to detect and require proactive mitigation strategies.,Principle of 'least privilege' must be strictly enforced, especially for roles with access to high-profile or sensitive data.,Real-time monitoring and behavioral analytics are critical to detect anomalous access patterns, even with legitimate credentials.,Logging systems must capture not just access metadata (e.g., timestamps) but also the specific data viewed or modified.,Third-party communication platforms (e.g., Telegram) can be exploited for recruiting insiders and must be monitored where feasible.,National security risks can emerge from consumer-facing institutions, necessitating cross-sector collaboration between private entities and law enforcement.

Source: National Post

Source: RCMP Affidavit (Montreal Courthouse, June 2024)

Source: Interviews with Benjamin Fung (McGill University), Paige Backman (Privacy Lawyer), Neil Desai (CIGI)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: National Post, and Source: RCMP Affidavit (Montreal Courthouse, June 2024), and Source: Interviews with Benjamin Fung (McGill University), Paige Backman (Privacy Lawyer), Neil Desai (CIGI).

Investigation Status: Ongoing (Next court date: 2024-11-05)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Limited Public Disclosure and Media Statements.

Stakeholder Advisories: Limited Disclosure To Affected High-Profile Individuals (E.G., Prime Minister'S Office).
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Limited Disclosure To Affected High-Profile Individuals (E.G. and Prime Minister'S Office).

Entry Point: Legitimate Employee Credentials (No Malware or Phishing)
High Value Targets: Prime Minister Mark Carney'S Account, Other High-Net-Worth Clients,
Data Sold on Dark Web: Prime Minister Mark Carney'S Account, Other High-Net-Worth Clients,

Root Causes: Overprivileged Access For Junior Employee With No Business Need To Access High-Profile Accounts., Inadequate Real-Time Monitoring To Detect Anomalous Behavior (E.G., Creating Fraudulent Accounts)., Partial Logging That Failed To Capture The Specific Data Accessed Or Exfiltrated., Lack Of Behavioral Safeguards To Prevent Insider Recruitment Via Encrypted Channels., Cultural Or Procedural Gaps In Enforcing The Principle Of Least Privilege.,
Corrective Actions: Rbc Likely Reviewing Access Controls And Monitoring Systems (Details Undisclosed)., Potential Regulatory Recommendations From Osfi Pending Investigation Outcomes., Broader Industry Discussions On Insider Threat Mitigation In Financial Sectors.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Law Enforcement (Rcmp Integrated National Security Enforcement Team), , Review Of Access Controls (Planned), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Rbc Likely Reviewing Access Controls And Monitoring Systems (Details Undisclosed)., Potential Regulatory Recommendations From Osfi Pending Investigation Outcomes., Broader Industry Discussions On Insider Threat Mitigation In Financial Sectors., .
Last Attacking Group: The attacking group in the last incident were an Primary: {'name': 'Ibrahim El-Hakim', 'role': 'RBC Junior Employee (Insider)', 'affiliation': None, 'motivation': ['Financial Gain', 'Coercion by External Actor']}Secondary: {'alias': 'AI WORLD', 'affiliation': ['Suspected Organized Crime', 'Possible State-Actor Ties'], 'role': 'Recruiter/Handler' and 'communication_channel': 'Telegram (Encrypted)'}.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-06.
Highest Financial Loss: The highest financial loss from an incident was {'fraudulent_credit_line': 'CAD 68,500', 'total_estimated': None}.
Most Significant System Affected: The most significant system affected in an incident was Client Account Management SystemCredit Line Approval System.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was law enforcement (rcmp integrated national security enforcement team), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Employee TerminationAccount Access Revocation.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Criminal Charges Against Ibrahim El-Hakim (Fraud, Unauthorized Computer Use, Trafficking in Identification Information), .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was National security risks can emerge from consumer-facing institutions, necessitating cross-sector collaboration between private entities and law enforcement.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Expand **logging capabilities** to record the actual data viewed or modified during access sessions, not just metadata., Enhance **real-time monitoring** with behavioral analytics to flag unusual activities (e.g., accessing unrelated client accounts, creating fraudulent credit lines)., Foster a **culture of accountability** where employees are encouraged to report suspicious behavior without fear of retaliation., Implement **strict access controls** based on job roles and the principle of least privilege, with additional safeguards for high-profile accounts (e.g., multi-person approval for sensitive data access)., Collaborate with **regulators and law enforcement** to share threat intelligence on emerging insider threat tactics, especially those blending organized crime and state-sponsored activities., Assess **third-party application risks**, including unauthorized use of encrypted messaging platforms for work-related communications., Conduct **regular audits** of access logs and privileges, particularly for employees in sensitive roles., Strengthen **insider threat programs** with training to recognize coercion or recruitment attempts (e.g. and via encrypted apps)..
Most Recent Source: The most recent source of information about an incident are Interviews with Benjamin Fung (McGill University), Paige Backman (Privacy Lawyer), Neil Desai (CIGI), RCMP Affidavit (Montreal Courthouse, June 2024) and National Post.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Next court date: 2024-11-05).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Limited disclosure to affected high-profile individuals (e.g., Prime Minister's office), .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Legitimate Employee Credentials (No Malware or Phishing).
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
