Kaseya Was Fixing Zero-Day When REvil Ransomware Attacked

Share post:

The zero-day vulnerability that was used to crack the Kaseya VSA servers on site was being fixed, just as the REvil ransomware gang used it for a massive attack on Friday, which has since spread all over the world.

The zero-day Kaseya vulnerability was discovered by DIVD researcher Wietse Boonstra and identified as CVE-2021-30116.

Access to the Kaseya VSA servers has been removed as quickly as possible to prevent the further spread of the vulnerability.

A new update of Kaseya recommends that all VSA on-premise servers remain offline until a patch is released.

Kaseya is also in the process of putting its SaaS server farms online and developing a plan for hosted VSA servers.

For more information, read the orignal story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways