Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Shell is a global group of energy and petrochemical companies, employing 96,000 people across 70+ countries. We serve around 1 million commercial and industrial customers, and around 33 million customers daily at our Shell-branded retail service stations. Our purpose is to power progress together by working with each other, our customers and our partners. #PoweringProgress

Shell A.I CyberSecurity Scoring

Shell

Company Details

Linkedin ID:

shell

Employees number:

185,291

Number of followers:

7,479,637

NAICS:

211

Industry Type:

Oil and Gas

Homepage:

shell.com

IP Addresses:

57

Company ID:

SHE_4993840

Scan Status:

Completed

AI scoreShell Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/shell.jpeg
Shell Oil and Gas
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreShell Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/shell.jpeg
Shell Oil and Gas
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Shell Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
ShellVulnerability8543/2026NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Companies House Security Flaw Exposes Private Data of UK Business Directors A critical vulnerability in the UK’s Companies House WebFiling system exposed sensitive details of directors at millions of registered businesses, including AstraZeneca, Shell, and Tesco. The flaw, discovered last Friday, forced the agency to temporarily shut down its online filing service before restoring it on Monday morning. The bug allowed logged-in users to access confidential data such as dates of birth and residential addresses of key personnel from the 5 million companies on the register. More alarmingly, it permitted unauthorized changes to directors’ contact details, including addresses and emails, without consent. Security researcher John Hewitt of Ghost Mail identified the issue, which could be triggered by pressing the back button four times while viewing a company’s profile. An internal investigation traced the vulnerability to a system update implemented in October 2023. Companies House CEO Andy King confirmed that no evidence of unauthorized data access or alterations has been found, though the review remains ongoing. The agency has urged businesses to verify their registered details for accuracy. The incident is now under scrutiny by the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC). Companies House has advised affected businesses to file complaints if they suspect any misuse of their data.

Tesco, AstraZeneca and Shell: Millions of UK businesses exposed by Companies House security flaw
Vulnerability
Severity: 85
Impact: 4
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Companies House Security Flaw Exposes Private Data of UK Business Directors A critical vulnerability in the UK’s Companies House WebFiling system exposed sensitive details of directors at millions of registered businesses, including AstraZeneca, Shell, and Tesco. The flaw, discovered last Friday, forced the agency to temporarily shut down its online filing service before restoring it on Monday morning. The bug allowed logged-in users to access confidential data such as dates of birth and residential addresses of key personnel from the 5 million companies on the register. More alarmingly, it permitted unauthorized changes to directors’ contact details, including addresses and emails, without consent. Security researcher John Hewitt of Ghost Mail identified the issue, which could be triggered by pressing the back button four times while viewing a company’s profile. An internal investigation traced the vulnerability to a system update implemented in October 2023. Companies House CEO Andy King confirmed that no evidence of unauthorized data access or alterations has been found, though the review remains ongoing. The agency has urged businesses to verify their registered details for accuracy. The incident is now under scrutiny by the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC). Companies House has advised affected businesses to file complaints if they suspect any misuse of their data.

Ailogo

Shell Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Shell

Incidents vs Oil and Gas Industry Average (This Year)

Shell has 56.33% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Shell has 13.79% fewer incidents than the average of all companies with at least one recorded incident.

Incident Types Shell vs Oil and Gas Industry Avg (This Year)

Shell reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Shell (X = Date, Y = Severity)

Shell cyber incidents detection timeline including parent company and subsidiaries

Shell Company Subsidiaries

SubsidiaryImage

Shell is a global group of energy and petrochemical companies, employing 96,000 people across 70+ countries. We serve around 1 million commercial and industrial customers, and around 33 million customers daily at our Shell-branded retail service stations. Our purpose is to power progress together by working with each other, our customers and our partners. #PoweringProgress

Loading...
similarCompanies

Shell Similar Companies

ConocoPhillips

We are a global oil and gas company tasked with an important job—to safely find and deliver energy for the world. We’re experts in what we do—from the well site to the office. Across our operations and activities in 13 countries, we never forget our responsibility to be a great neighbor, and a gre

Valero

Valero is an international manufacturer and marketer of transportation fuels and petrochemical products. We are a Fortune 500 company based in San Antonio, Texas, fueled by nearly 10,000 employees and 15 petroleum refineries with a combined throughput capacity of approximately 3.2 million barrels pe

aramco

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemi

Oil and Natural Gas Corporation Ltd

Maharatna ONGC is the largest producer of crude oil and natural gas in India, contributing around 70 per cent of Indian domestic production. The crude oil is the raw material used by downstream companies like IOC, BPCL, HPCL to produce petroleum products like Petrol, Diesel, Kerosene, Naphtha, Cooki

Oxy is an international energy company with assets primarily in the United States, the Middle East and North Africa. We are one of the largest oil producers in the U.S., including a leading producer in the Permian and DJ basins, and offshore Gulf of Mexico. Our midstream and marketing segment provid

Chevron

Our greatest resource is our people. Their ingenuity, creativity and collaboration have met the complex challenges of energy’s past. Together, we’ll take on the future. We support the LinkedIn Terms of Use (User Agreement), and we expect visitors to our page to do the same. We encourage open, liv

Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de

Ecopetrol (NYSE: EC) es la compañía más grande en Colombia y uno de los principales grupos de energía de Latinoamérica. Cuenta con más de 18.000 empleados y es responsable del 60% de la producción de hidrocarburos en Colombia. Es propietaria de las dos refinerías del Colombia y de la gran parte de l

Koch Engineered Solutions

Koch Engineered Solutions (KES) provides uniquely engineered solutions in construction; mass and heat transfer; combustion and emissions controls; filtration; separation; materials applications; automation and actuation. KES is located in Wichita, Kansas, and is a subsidiary of Koch Industries, one

newsone

Shell CyberSecurity News

March 12, 2026 07:00 AM
Splunk RCE Vulnerability Allows Attackers to Execute Arbitrary Shell Commands

Splunk warned of a high-severity flaw in Splunk Enterprise and Splunk Cloud Platform that could enable remote command execution.

February 27, 2026 08:00 AM
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks...

February 20, 2026 08:00 AM
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

CVE-2026-1731 in BeyondTrust RS and PRA is exploited for ransomware, web shells, C2, and data theft across multiple sectors.

February 11, 2026 08:00 AM
Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication

Microsoft released Microsoft Patch Tuesday updates to address a critical zero-day vulnerability in Windows Shell that is currently being...

January 30, 2026 08:00 AM
UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS

BadIIS malware targets unpatched IIS servers in Thailand and Vietnam, using web shells and PowerShell in a WEBJACK-linked campaign.

December 30, 2025 08:00 AM
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Mustang Panda deployed TONESHELL via a signed kernel-mode rootkit, targeting Asian government networks and evading security tools.

December 30, 2025 08:00 AM
HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks

In a major discovery, cybersecurity researchers at Kaspersky Securelist have found a new espionage activity targeting government offices...

December 30, 2025 08:00 AM
Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity

Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity ... A Chinese-linked threat group tied to the HoneyMyte, also known as Mustang...

December 15, 2025 08:00 AM
Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

A severe security vulnerability has been uncovered in pgAdmin 4, the popular open-source PostgreSQL database management tool.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Shell CyberSecurity History Information

Official Website of Shell

The official website of Shell is http://www.shell.com.

Shell’s AI-Generated Cybersecurity Score

According to Rankiteo, Shell’s AI-generated cybersecurity score is 835, reflecting their Good security posture.

How many security badges does Shell’ have ?

According to Rankiteo, Shell currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Shell been affected by any supply chain cyber incidents ?

According to Rankiteo, Shell has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Shell have SOC 2 Type 1 certification ?

According to Rankiteo, Shell is not certified under SOC 2 Type 1.

Does Shell have SOC 2 Type 2 certification ?

According to Rankiteo, Shell does not hold a SOC 2 Type 2 certification.

Does Shell comply with GDPR ?

According to Rankiteo, Shell is not listed as GDPR compliant.

Does Shell have PCI DSS certification ?

According to Rankiteo, Shell does not currently maintain PCI DSS compliance.

Does Shell comply with HIPAA ?

According to Rankiteo, Shell is not compliant with HIPAA regulations.

Does Shell have ISO 27001 certification ?

According to Rankiteo,Shell is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Shell

Shell operates primarily in the Oil and Gas industry.

Number of Employees at Shell

Shell employs approximately 185,291 people worldwide.

Subsidiaries Owned by Shell

Shell presently has no subsidiaries across any sectors.

Shell’s LinkedIn Followers

Shell’s official LinkedIn profile has approximately 7,479,637 followers.

NAICS Classification of Shell

Shell is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.

Shell’s Presence on Crunchbase

Yes, Shell has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/royal-dutch-shell.

Shell’s Presence on LinkedIn

Yes, Shell maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/shell.

Cybersecurity Incidents Involving Shell

As of April 04, 2026, Rankiteo reports that Shell has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Shell has an estimated 10,824 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Shell ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Shell detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with temporary shutdown of webfiling system, and remediation measures with system review and restoration, and recovery measures with service restored on monday morning, and communication strategy with advisory to businesses to verify registered details..

Incident Details

Can you provide details on each incident ?

Incident : Data Exposure

Title: Companies House Security Flaw Exposes Private Data of UK Business Directors

Description: A critical vulnerability in the UK’s Companies House WebFiling system exposed sensitive details of directors at millions of registered businesses, including AstraZeneca, Shell, and Tesco. The flaw allowed logged-in users to access confidential data such as dates of birth and residential addresses, and permitted unauthorized changes to directors’ contact details without consent.

Date Detected: 2024-06-07

Date Resolved: 2024-06-10

Type: Data Exposure

Attack Vector: Web Application Vulnerability

Vulnerability Exploited: System update flaw (October 2023)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Exposure AST-TESHE1773679185

Data Compromised: Dates of birth, residential addresses, contact details (emails, addresses)

Systems Affected: Companies House WebFiling system

Downtime: Temporary shutdown (Friday to Monday morning)

Operational Impact: Service disruption, manual verification of registered details required

Brand Reputation Impact: Potential reputational damage to Companies House and affected businesses

Identity Theft Risk: High (exposure of personally identifiable information)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (PII).

Which entities were affected by each incident ?

Incident : Data Exposure AST-TESHE1773679185

Entity Name: Companies House

Entity Type: Government Agency

Industry: Government/Regulatory

Location: United Kingdom

Size: Large

Customers Affected: 5 million registered companies

Incident : Data Exposure AST-TESHE1773679185

Entity Name: AstraZeneca

Entity Type: Corporation

Industry: Pharmaceutical

Location: United Kingdom

Size: Large

Incident : Data Exposure AST-TESHE1773679185

Entity Name: Shell

Entity Type: Corporation

Industry: Energy

Location: United Kingdom

Size: Large

Incident : Data Exposure AST-TESHE1773679185

Entity Name: Tesco

Entity Type: Corporation

Industry: Retail

Location: United Kingdom

Size: Large

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Exposure AST-TESHE1773679185

Containment Measures: Temporary shutdown of WebFiling system

Remediation Measures: System review and restoration

Recovery Measures: Service restored on Monday morning

Communication Strategy: Advisory to businesses to verify registered details

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Exposure AST-TESHE1773679185

Type of Data Compromised: Personally Identifiable Information (PII)

Sensitivity of Data: High (dates of birth, residential addresses, contact details)

Personally Identifiable Information: Dates of birth, residential addresses, emails, physical addresses

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: System review and restoration.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by temporary shutdown of webfiling system.

Ransomware Information

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Service restored on Monday morning.

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Exposure AST-TESHE1773679185

Regulations Violated: Potential GDPR violations

Regulatory Notifications: Information Commissioner’s Office (ICO), National Cyber Security Centre (NCSC)

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Data Exposure AST-TESHE1773679185

Recommendations: Businesses urged to verify registered details; enhanced security reviews for system updates

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Businesses urged to verify registered details; enhanced security reviews for system updates.

References

Where can I find more information about each incident ?

Incident : Data Exposure AST-TESHE1773679185

Source: Ghost Mail (Security Researcher John Hewitt)

Incident : Data Exposure AST-TESHE1773679185

Source: Companies House

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Ghost Mail (Security Researcher John Hewitt), and Source: Companies House.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Exposure AST-TESHE1773679185

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Advisory to businesses to verify registered details.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Exposure AST-TESHE1773679185

Stakeholder Advisories: Businesses advised to verify registered details and file complaints if misuse is suspected

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Businesses advised to verify registered details and file complaints if misuse is suspected.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Exposure AST-TESHE1773679185

Root Causes: System update flaw implemented in October 2023

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-06-07.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2024-06-10.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Dates of birth, residential addresses, contact details (emails and addresses).

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Temporary shutdown of WebFiling system.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Dates of birth, residential addresses, contact details (emails and addresses).

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Businesses urged to verify registered details; enhanced security reviews for system updates.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Ghost Mail (Security Researcher John Hewitt) and Companies House.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Businesses advised to verify registered details and file complaints if misuse is suspected, .

cve

Latest Global CVEs (Not Company-Specific)

Description

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.

Risk Information
cvss3
Base: 8.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.

Risk Information
cvss3
Base: 9.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=shell' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge