Categories: Data Breach

SHI Hacked – IT Service Giant Breached Via Professional Malware Attack

SHI International Corp., formerly called Software House International, is a privately-owned provider of technology products and services, headquartered in Somerset, New Jersey. On July 4th, SHI was hit by a professional malware attack that indeed caused various disruptions.

SHI has been counted among North America’s top 15 largest providers of IT solutions. It has 5,000 employees across more than 35 offices in the United States, Canada, France, Hong Kong, Singapore, and the United Kingdom.

SHI said, “Over the Fourth of July holiday weekend, SHI was the target of a coordinated and professional malware attack. Thanks to the quick reactions of the security and IT teams at SHI, the incident was swiftly identified and measures were enacted to minimize the impact on SHI’s systems and operations”.

Following the attack, as a precautionary, SHI’s public websites and email were taken offline and the attack was investigated and the integrity of those systems was assessed.

SHI maintenance message

According to SHI, “The IT teams at SHI continue to work on bringing other systems back to full availability in a secure and reliable manner.”

They also ensured that their customers will have full access to their account teams and specialists via both email and phone. SHI mentioned that the investigation is still ongoing – and SHI is liaising with federal bodies including the FBI and CISA.

They also said that there is no evidence to suggest that customer data was exfiltrated during the attack.  No third-party systems in the SHI supply chain were affected. The company ensured that they will keep customers informed as they return to business as normal.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies.…

16 minutes ago

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors…

25 minutes ago

How CISOs Can Strengthen Supply Chain Security in 2025

The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and…

1 hour ago

The CISO’s Guide to Effective Cloud Security Strategies

As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift…

1 hour ago

Mitigating Insider Threats – A CISO’s Practical Approach

Insider threats represent one of the most challenging cybersecurity risks facing organizations today, with incidents…

1 hour ago

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a fundamental…

1 hour ago