Information technology solutions provider SHI International is struggling to fully restore systems and operations after being hit with a crippling cyberattack over the 4th of July weekend.
Based in New Jersey, the IT reseller and services company has over 5,000 employees worldwide and works with numerous government and commercial enterprise organizations.
The incident, which SHI describes as a “coordinated and professional malware attack,” forced the company to shut down many of its systems, some of which are still offline.
As of July 8, SHI’s website is still down, displaying a cyber incident notification that provides scarce details on the attack. The same announcement was published on the company’s blog.
“Thanks to the quick reactions of the security and IT teams at SHI, the incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations,” the notification reads.
“These preventative measures included taking some systems, including SHI’s public websites and email, offline while the attack was investigated and the integrity of those systems was assessed,” the note continues.
Per the announcement, the company was able to restore employee access to email shortly after the attack, allowing customers to contact their “account teams and specialists via both email and phone.”
“IT teams at SHI continue to work on bringing other systems back to full availability in a secure and reliable manner,” the notification reads.
According to SHI, there was no evidence of customer data being exfiltrated during the attack. “No third-party systems in the SHI supply chain were affected,” the company also said.
SHI did not provide further details on the attack, but the fact that systems were taken offline and that restoration efforts are still ongoing suggests that ransomware might have been involved.
The attack on SHI occured one year after software maker Kaseya was hit by the REvil ransomware gang, which resulted in between 800 and 1,500 organizations being infected. The attackers demanded tens of millions of dollars in exchange for decryption keys.
Related: The Vulnerable Maritime Supply Chain – a Threat to the Global Economy
Related: Software Supply Chain Attacks Tripled in 2021: Study
Related: North Korean Hackers Targeting IT Supply Chain: Kaspersky

More from Ionut Arghire
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
- Boxx Insurance Raises $14.4 Million in Series B Funding
Latest News
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
