Kaseya Was Fixing Zero-Day When REvil Ransomware Attacked

Share post:

The zero-day vulnerability that was used to crack the Kaseya VSA servers on site was being fixed, just as the REvil ransomware gang used it for a massive attack on Friday, which has since spread all over the world.

The zero-day Kaseya vulnerability was discovered by DIVD researcher Wietse Boonstra and identified as CVE-2021-30116.

Access to the Kaseya VSA servers has been removed as quickly as possible to prevent the further spread of the vulnerability.

A new update of Kaseya recommends that all VSA on-premise servers remain offline until a patch is released.

Kaseya is also in the process of putting its SaaS server farms online and developing a plan for hosted VSA servers.

For more information, read the orignal story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways