Shell Global Hacked using Flaw in the MOVEit File Transfer System

Shell corporation has published a report indicating that they have faced a security incident that involved Accelion’s File Transfer appliance in 2021. 

This is the second time the company has faced a security incident after 2021. Shell is one of the major Oil and gas giants, which has a turnover of around $381 Billion (as of 2022) and has employees of more than 80,000 worldwide.

Earlier this month, the MOVEit File transfer application was reported to be vulnerable to potential privilege escalation and SQL injection attacks. Clop ransomware group has been identified to be exploiting MOVEit file transfer used by many organizations.

The recent security incident states that an unauthorized third party has infiltrated Shell corporation for a short period of time within which they could extract some personal data and other stakeholder information.

“We are aware of a cyber security incident that has impacted a third party tool from Progress called MOVEit Transfer which is used by a small number of Shell employees and customers,” said a spokesperson from Shell corporation.

In addition to this, the Clop ransomware group has published a report on the dark web that showed a number of companies hacked by them showcased several UK-based organizations, including Shell Inc and many US-based financial organizations.

It is still unclear how many organizations were attacked and infiltrated by this. However, Clop ransomware group hasn’t published the complete report yet.

Though this is confirmed, Shell stated, “There is no evidence of any impact to Shell’s core IT systems as the file transfer service is isolated from the rest of Shell’s digital infrastructure.”

The company also mentioned that they have been working with the cyber security team and authorities to investigate this incident further. They are also in contact with the affected individuals to address the possible risk of this incident.

Looking For an All-in-One Multi-OS Patch Management Platform – 

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago