Company Details
shell
185,291
7,479,637
211
shell.com
57
SHE_4993840
Completed


Shell Vendor Cyber Rating & Cyber Score
shell.comShell is a global group of energy and petrochemical companies, employing 96,000 people across 70+ countries. We serve around 1 million commercial and industrial customers, and around 33 million customers daily at our Shell-branded retail service stations. Our purpose is to power progress together by working with each other, our customers and our partners. #PoweringProgress
Company Details
shell
185,291
7,479,637
211
shell.com
57
SHE_4993840
Completed
Between 800 and 849

Shell Global Score (TPRM)XXXX

Description: Companies House Security Flaw Exposes Private Data of UK Business Directors A critical vulnerability in the UK’s Companies House WebFiling system exposed sensitive details of directors at millions of registered businesses, including AstraZeneca, Shell, and Tesco. The flaw, discovered last Friday, forced the agency to temporarily shut down its online filing service before restoring it on Monday morning. The bug allowed logged-in users to access confidential data such as dates of birth and residential addresses of key personnel from the 5 million companies on the register. More alarmingly, it permitted unauthorized changes to directors’ contact details, including addresses and emails, without consent. Security researcher John Hewitt of Ghost Mail identified the issue, which could be triggered by pressing the back button four times while viewing a company’s profile. An internal investigation traced the vulnerability to a system update implemented in October 2023. Companies House CEO Andy King confirmed that no evidence of unauthorized data access or alterations has been found, though the review remains ongoing. The agency has urged businesses to verify their registered details for accuracy. The incident is now under scrutiny by the Information Commissioner’s Office (ICO) and the National Cyber Security Centre (NCSC). Companies House has advised affected businesses to file complaints if they suspect any misuse of their data.


Shell has 56.33% fewer incidents than the average of same-industry companies with at least one recorded incident.
Shell has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
Shell reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Shell cyber incidents detection timeline including parent company and subsidiaries

Shell is a global group of energy and petrochemical companies, employing 96,000 people across 70+ countries. We serve around 1 million commercial and industrial customers, and around 33 million customers daily at our Shell-branded retail service stations. Our purpose is to power progress together by working with each other, our customers and our partners. #PoweringProgress

We are a global oil and gas company tasked with an important job—to safely find and deliver energy for the world. We’re experts in what we do—from the well site to the office. Across our operations and activities in 13 countries, we never forget our responsibility to be a great neighbor, and a gre

Valero is an international manufacturer and marketer of transportation fuels and petrochemical products. We are a Fortune 500 company based in San Antonio, Texas, fueled by nearly 10,000 employees and 15 petroleum refineries with a combined throughput capacity of approximately 3.2 million barrels pe

We’re a leading producer of the energy and chemicals that drive global commerce and enhance the daily lives of people around the globe by continuing delivering an uninterrupted supply of energy to the world. Our resilience and agility has built one of the world’s largest integrated energy and chemi

Maharatna ONGC is the largest producer of crude oil and natural gas in India, contributing around 70 per cent of Indian domestic production. The crude oil is the raw material used by downstream companies like IOC, BPCL, HPCL to produce petroleum products like Petrol, Diesel, Kerosene, Naphtha, Cooki
Oxy is an international energy company with assets primarily in the United States, the Middle East and North Africa. We are one of the largest oil producers in the U.S., including a leading producer in the Permian and DJ basins, and offshore Gulf of Mexico. Our midstream and marketing segment provid

Our greatest resource is our people. Their ingenuity, creativity and collaboration have met the complex challenges of energy’s past. Together, we’ll take on the future. We support the LinkedIn Terms of Use (User Agreement), and we expect visitors to our page to do the same. We encourage open, liv
Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de

Ecopetrol (NYSE: EC) es la compañía más grande en Colombia y uno de los principales grupos de energía de Latinoamérica. Cuenta con más de 18.000 empleados y es responsable del 60% de la producción de hidrocarburos en Colombia. Es propietaria de las dos refinerías del Colombia y de la gran parte de l

Koch Engineered Solutions (KES) provides uniquely engineered solutions in construction; mass and heat transfer; combustion and emissions controls; filtration; separation; materials applications; automation and actuation. KES is located in Wichita, Kansas, and is a subsidiary of Koch Industries, one
.png)
Splunk warned of a high-severity flaw in Splunk Enterprise and Splunk Cloud Platform that could enable remote command execution.
The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks...
CVE-2026-1731 in BeyondTrust RS and PRA is exploited for ransomware, web shells, C2, and data theft across multiple sectors.
Microsoft released Microsoft Patch Tuesday updates to address a critical zero-day vulnerability in Windows Shell that is currently being...
BadIIS malware targets unpatched IIS servers in Thailand and Vietnam, using web shells and PowerShell in a WEBJACK-linked campaign.
Mustang Panda deployed TONESHELL via a signed kernel-mode rootkit, targeting Asian government networks and evading security tools.
In a major discovery, cybersecurity researchers at Kaspersky Securelist have found a new espionage activity targeting government offices...
Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity ... A Chinese-linked threat group tied to the HoneyMyte, also known as Mustang...
A severe security vulnerability has been uncovered in pgAdmin 4, the popular open-source PostgreSQL database management tool.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Shell is http://www.shell.com.
According to Rankiteo, Shell’s AI-generated cybersecurity score is 835, reflecting their Good security posture.
According to Rankiteo, Shell currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Shell has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Shell is not certified under SOC 2 Type 1.
According to Rankiteo, Shell does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Shell is not listed as GDPR compliant.
According to Rankiteo, Shell does not currently maintain PCI DSS compliance.
According to Rankiteo, Shell is not compliant with HIPAA regulations.
According to Rankiteo,Shell is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Shell operates primarily in the Oil and Gas industry.
Shell employs approximately 185,291 people worldwide.
Shell presently has no subsidiaries across any sectors.
Shell’s official LinkedIn profile has approximately 7,479,637 followers.
Shell is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
Yes, Shell has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/royal-dutch-shell.
Yes, Shell maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/shell.
As of April 04, 2026, Rankiteo reports that Shell has experienced 1 cybersecurity incidents.
Shell has an estimated 10,824 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with temporary shutdown of webfiling system, and remediation measures with system review and restoration, and recovery measures with service restored on monday morning, and communication strategy with advisory to businesses to verify registered details..
Title: Companies House Security Flaw Exposes Private Data of UK Business Directors
Description: A critical vulnerability in the UK’s Companies House WebFiling system exposed sensitive details of directors at millions of registered businesses, including AstraZeneca, Shell, and Tesco. The flaw allowed logged-in users to access confidential data such as dates of birth and residential addresses, and permitted unauthorized changes to directors’ contact details without consent.
Date Detected: 2024-06-07
Date Resolved: 2024-06-10
Type: Data Exposure
Attack Vector: Web Application Vulnerability
Vulnerability Exploited: System update flaw (October 2023)
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Dates of birth, residential addresses, contact details (emails, addresses)
Systems Affected: Companies House WebFiling system
Downtime: Temporary shutdown (Friday to Monday morning)
Operational Impact: Service disruption, manual verification of registered details required
Brand Reputation Impact: Potential reputational damage to Companies House and affected businesses
Identity Theft Risk: High (exposure of personally identifiable information)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (PII).

Entity Name: Companies House
Entity Type: Government Agency
Industry: Government/Regulatory
Location: United Kingdom
Size: Large
Customers Affected: 5 million registered companies

Entity Name: AstraZeneca
Entity Type: Corporation
Industry: Pharmaceutical
Location: United Kingdom
Size: Large

Entity Name: Shell
Entity Type: Corporation
Industry: Energy
Location: United Kingdom
Size: Large

Entity Name: Tesco
Entity Type: Corporation
Industry: Retail
Location: United Kingdom
Size: Large

Containment Measures: Temporary shutdown of WebFiling system
Remediation Measures: System review and restoration
Recovery Measures: Service restored on Monday morning
Communication Strategy: Advisory to businesses to verify registered details

Type of Data Compromised: Personally Identifiable Information (PII)
Sensitivity of Data: High (dates of birth, residential addresses, contact details)
Personally Identifiable Information: Dates of birth, residential addresses, emails, physical addresses
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: System review and restoration.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by temporary shutdown of webfiling system.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Service restored on Monday morning.

Regulations Violated: Potential GDPR violations
Regulatory Notifications: Information Commissioner’s Office (ICO), National Cyber Security Centre (NCSC)

Recommendations: Businesses urged to verify registered details; enhanced security reviews for system updates
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Businesses urged to verify registered details; enhanced security reviews for system updates.

Source: Ghost Mail (Security Researcher John Hewitt)

Source: Companies House
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Ghost Mail (Security Researcher John Hewitt), and Source: Companies House.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Advisory to businesses to verify registered details.

Stakeholder Advisories: Businesses advised to verify registered details and file complaints if misuse is suspected
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Businesses advised to verify registered details and file complaints if misuse is suspected.

Root Causes: System update flaw implemented in October 2023
Most Recent Incident Detected: The most recent incident detected was on 2024-06-07.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-06-10.
Most Significant Data Compromised: The most significant data compromised in an incident were Dates of birth, residential addresses, contact details (emails and addresses).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Temporary shutdown of WebFiling system.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Dates of birth, residential addresses, contact details (emails and addresses).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Businesses urged to verify registered details; enhanced security reviews for system updates.
Most Recent Source: The most recent source of information about an incident are Ghost Mail (Security Researcher John Hewitt) and Companies House.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Businesses advised to verify registered details and file complaints if misuse is suspected, .
.png)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.