Friday, March 29, 2024

SHI Hacked – IT Service Giant Breached Via Professional Malware Attack

SHI International Corp., formerly called Software House International, is a privately-owned provider of technology products and services, headquartered in Somerset, New Jersey. On July 4th, SHI was hit by a professional malware attack that indeed caused various disruptions.

SHI has been counted among North America’s top 15 largest providers of IT solutions. It has 5,000 employees across more than 35 offices in the United States, Canada, France, Hong Kong, Singapore, and the United Kingdom.

SHI said, “Over the Fourth of July holiday weekend, SHI was the target of a coordinated and professional malware attack. Thanks to the quick reactions of the security and IT teams at SHI, the incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations”.

Following the attack, as a precautionary, SHI’s public websites and email were taken offline and the attack was investigated and the integrity of those systems was assessed.

SHI maintenance message

According to SHI, “The IT teams at SHI continue to work on bringing other systems back to full availability in a secure and reliable manner.”

They also ensured that their customers will have full access to their account teams and specialists via both email and phone. SHI mentioned that the investigation is still ongoing – and SHI is liaising with federal bodies including the FBI and CISA.

They also said that there is no evidence to suggest that customer data was exfiltrated during the attack.  No third-party systems in the SHI supply chain were affected. The company ensured that they will keep customers informed as they return to business as normal.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles