Information technology solutions provider SHI International is struggling to fully restore systems and operations after being hit with a crippling cyberattack over the 4th of July weekend.
Based in New Jersey, the IT reseller and services company has over 5,000 employees worldwide and works with numerous government and commercial enterprise organizations.
The incident, which SHI describes as a “coordinated and professional malware attack,” forced the company to shut down many of its systems, some of which are still offline.
As of July 8, SHI’s website is still down, displaying a cyber incident notification that provides scarce details on the attack. The same announcement was published on the company’s blog.
“Thanks to the quick reactions of the security and IT teams at SHI, the incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations,” the notification reads.
“These preventative measures included taking some systems, including SHI’s public websites and email, offline while the attack was investigated and the integrity of those systems was assessed,” the note continues.
Per the announcement, the company was able to restore employee access to email shortly after the attack, allowing customers to contact their “account teams and specialists via both email and phone.”
“IT teams at SHI continue to work on bringing other systems back to full availability in a secure and reliable manner,” the notification reads.
According to SHI, there was no evidence of customer data being exfiltrated during the attack. “No third-party systems in the SHI supply chain were affected,” the company also said.
SHI did not provide further details on the attack, but the fact that systems were taken offline and that restoration efforts are still ongoing suggests that ransomware might have been involved.
The attack on SHI occured one year after software maker Kaseya was hit by the REvil ransomware gang, which resulted in between 800 and 1,500 organizations being infected. The attackers demanded tens of millions of dollars in exchange for decryption keys.
Related: The Vulnerable Maritime Supply Chain – a Threat to the Global Economy
Related: Software Supply Chain Attacks Tripled in 2021: Study
Related: North Korean Hackers Targeting IT Supply Chain: Kaspersky

More from Ionut Arghire
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- Latitude Financial Services Data Breach Impacts 300,000 Customers
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
