Company Details
world-health-organization
30,615
6,094,439
92812
who.int
0
WOR_7701737
In-progress

World Health Organization Company CyberSecurity Posture
who.intThe World Health Organization's mission: to promote health, keep the world safe, and serve the vulnerable. Working through offices in more than 150 countries, WHO staff work side by side with governments and other partners to ensure the highest attainable level of health for all people. Stay connected with WHO: Facebook https://www.facebook.com/WHO Twitter http://www.twitter.com/who Instagram: @who Google+ https://www.google.com/+who YouTube http://www.youtube.com/who
Company Details
world-health-organization
30,615
6,094,439
92812
who.int
0
WOR_7701737
In-progress
Between 800 and 849

WHO Global Score (TPRM)XXXX

Description: The login credentials of some staff members of the World Health Organization were accessed by hackers in March 2020. The compromised passwords contained access to a lot of sensitive information about the pandemic. The attack was the result of a successful phishing attempt that forced the organization to switch the infrastructure as a future precautionary step.
Description: The Ryuk ransomware gang, active between 2018 and mid-2020, targeted organizations across various sectors, including healthcare during the Covid pandemic. The gang was responsible for numerous attacks, causing significant disruptions and financial losses. The recent extradition of a 33-year-old member of the Ryuk operation to the United States highlights the continued efforts to bring cybercriminals to justice. The gang's rebranding to Conti and subsequent splintering into smaller groups underscores the evolving threat landscape.


No incidents recorded for World Health Organization in 2025.
No incidents recorded for World Health Organization in 2025.
No incidents recorded for World Health Organization in 2025.
WHO cyber incidents detection timeline including parent company and subsidiaries

The World Health Organization's mission: to promote health, keep the world safe, and serve the vulnerable. Working through offices in more than 150 countries, WHO staff work side by side with governments and other partners to ensure the highest attainable level of health for all people. Stay connected with WHO: Facebook https://www.facebook.com/WHO Twitter http://www.twitter.com/who Instagram: @who Google+ https://www.google.com/+who YouTube http://www.youtube.com/who


Welcome, exchange program alumni! We are Alumni Affairs, an office in the Bureau of Educational and Cultural Affairs (ECA) at the U.S. Department of State. We welcome alumni of all U.S. government exchange programs, from Fulbright to Gilman, IVLP, YALI, YSEALI, YLAI, and many more! We offer grant c
Established in 1951, the International Organization for Migration is the leading intergovernmental organization in the field of migration and is committed to the principle that humane and orderly migration benefits migrants and society. IOM works with its partners in the international community to

THE RIGHT WAY TO ITALY. Italian Agency based in Venice-Italy performing general affairs by Public and Private Boards seeks international Partners to develop SMART TOURISM NETWORK. Multilingual staff. Contact us as above

The United Nations Development Programme works in nearly 170 countries and territories, helping to achieve the eradication of poverty, and the reduction of inequalities and exclusion. We help countries to develop policies, leadership skills, partnering abilities, institutional capabilities and build

UNHCR, the UN Refugee Agency, is a global organisation dedicated to saving lives, protecting rights and building a better future for people forced to flee their homes because of conflict and persecution. We lead international action to protect refugees, forcibly displaced communities and stateless
USAID is the lead U.S. Government agency that works to end extreme global poverty and enable resilient, democratic societies to realize their potential. U.S. foreign assistance has always had the twofold purpose of furthering America's interests while improving lives in the developing world. USAI

Founded at the end of the Second World War, the United Nations is an international organization made up of 193 Member States committed to maintaining international peace and security. Every day the UN works to tackle global challenges and deliver results for those most in need. Giving life-sav
.png)
The HIPAA Journal has compiled healthcare data breach statistics from October 2009, when the Department of Health and Human Services (HHS)...
Countries that integrate cybersecurity into their national security strategies and institutional governance will be best positioned to...
The World Health Organization (WHO) and the European Union (EU) announced today a new agreement to support the digital transformation of...
On 25 September 2025, Heads of States and Government will meet at the UN General Assembly to set a new vision for the prevention and control...
Port-of-Spain, 18 September 2025 (PAHO): In a decisive step toward fortifying the digital defenses of the national health system,...
The global healthcare cybersecurity market will grow by 15 percent year-over-year over the next five years, and reach $125 billion cumulatively over a five-...
Sept. 2nd, 2025, Nassau, The Bahamas - The Pan American Health Organization/World Health Organization (PAHO/WHO), in collaboration with The...
The 2025 Global Conference on Climate and Health will take place in Brasília, Brazil, hosted by the Government of Brazil, the WHO,...
During health emergencies, strong cybersecurity protects systems from rising cyber threats that exploit urgent situations.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of World Health Organization is http://www.who.int.
According to Rankiteo, World Health Organization’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, World Health Organization currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, World Health Organization is not certified under SOC 2 Type 1.
According to Rankiteo, World Health Organization does not hold a SOC 2 Type 2 certification.
According to Rankiteo, World Health Organization is not listed as GDPR compliant.
According to Rankiteo, World Health Organization does not currently maintain PCI DSS compliance.
According to Rankiteo, World Health Organization is not compliant with HIPAA regulations.
According to Rankiteo,World Health Organization is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
World Health Organization operates primarily in the International Affairs industry.
World Health Organization employs approximately 30,615 people worldwide.
World Health Organization presently has no subsidiaries across any sectors.
World Health Organization’s official LinkedIn profile has approximately 6,094,439 followers.
World Health Organization is classified under the NAICS code 92812, which corresponds to International Affairs.
No, World Health Organization does not have a profile on Crunchbase.
Yes, World Health Organization maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/world-health-organization.
As of December 11, 2025, Rankiteo reports that World Health Organization has experienced 2 cybersecurity incidents.
World Health Organization has an estimated 959 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $150 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with switch the infrastructure, and .
Title: World Health Organization Credential Breach
Description: The login credentials of some staff members of the World Health Organization were accessed by hackers in March 2020. The compromised passwords contained access to a lot of sensitive information about the pandemic. The attack was the result of a successful phishing attempt that forced the organization to switch the infrastructure as a future precautionary step.
Date Detected: March 2020
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Human
Title: Extradition of Ryuk Ransomware Operator
Description: A member of the Ryuk ransomware operation, specializing in gaining initial access to corporate networks, has been extradited to the United States.
Date Publicly Disclosed: 2025-06-18
Type: Ransomware
Attack Vector: Initial Access
Threat Actor: Ryuk Ransomware Operation
Motivation: Financial GainData Theft
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing email.

Data Compromised: Sensitive information about the pandemic

Financial Loss: $150 million
Average Financial Loss: The average financial loss per incident is $75.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Login credentials.

Entity Name: World Health Organization
Entity Type: Organization
Industry: Health

Location: FranceNorwayGermanythe NetherlandsCanadaUSA

Remediation Measures: Switch the infrastructure


Type of Data Compromised: Login credentials
Sensitivity of Data: High

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Switch the infrastructure, .

Ransom Paid: $150 million
Ransomware Strain: Ryuk
Data Encryption: True
Data Exfiltration: True


Source: BleepingComputer
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer.

Investigation Status: Ongoing

Entry Point: Phishing email

Root Causes: Phishing email
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident was an Ryuk Ransomware Operation.
Most Recent Incident Detected: The most recent incident detected was on March 2020.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-06-18.
Highest Financial Loss: The highest financial loss from an incident was $150 million.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive information about the pandemic.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive information about the pandemic.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was $150 million.
Most Recent Source: The most recent source of information about an incident is BleepingComputer.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing email.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.