Information technology solutions provider SHI International is struggling to fully restore systems and operations after being hit with a crippling cyberattack over the 4th of July weekend.
Based in New Jersey, the IT reseller and services company has over 5,000 employees worldwide and works with numerous government and commercial enterprise organizations.
The incident, which SHI describes as a “coordinated and professional malware attack,” forced the company to shut down many of its systems, some of which are still offline.
As of July 8, SHI’s website is still down, displaying a cyber incident notification that provides scarce details on the attack. The same announcement was published on the company’s blog.
“Thanks to the quick reactions of the security and IT teams at SHI, the incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations,” the notification reads.
“These preventative measures included taking some systems, including SHI’s public websites and email, offline while the attack was investigated and the integrity of those systems was assessed,” the note continues.
Per the announcement, the company was able to restore employee access to email shortly after the attack, allowing customers to contact their “account teams and specialists via both email and phone.”
“IT teams at SHI continue to work on bringing other systems back to full availability in a secure and reliable manner,” the notification reads.
According to SHI, there was no evidence of customer data being exfiltrated during the attack. “No third-party systems in the SHI supply chain were affected,” the company also said.
SHI did not provide further details on the attack, but the fact that systems were taken offline and that restoration efforts are still ongoing suggests that ransomware might have been involved.
The attack on SHI occured one year after software maker Kaseya was hit by the REvil ransomware gang, which resulted in between 800 and 1,500 organizations being infected. The attackers demanded tens of millions of dollars in exchange for decryption keys.