Kaseya Was Fixing Zero-Day When REvil Ransomware Attacked

Share post:

The zero-day vulnerability that was used to crack the Kaseya VSA servers on site was being fixed, just as the REvil ransomware gang used it for a massive attack on Friday, which has since spread all over the world.

The zero-day Kaseya vulnerability was discovered by DIVD researcher Wietse Boonstra and identified as CVE-2021-30116.

Access to the Kaseya VSA servers has been removed as quickly as possible to prevent the further spread of the vulnerability.

A new update of Kaseya recommends that all VSA on-premise servers remain offline until a patch is released.

Kaseya is also in the process of putting its SaaS server farms online and developing a plan for hosted VSA servers.

For more information, read the orignal story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Employee errors still predominant cause of data breaches: Verizon Report

In the latest 2024 Verizon Data Breach Report (DBIR), it has been revealed that employee errors remain the...

Black Basta has compromised over 500 organizations globally:CISA

The Cybersecurity and Infrastructure Security Agency (CISA) along with the FBI reported that the Black Basta ransomware group...

Cyber Security Today, May 10, 2024 – Patches for F5’s Next Central Manager released, Dell discovers data theft covering millions, and more

Patches for F5's Next Central Manager are released, Dell discovers data theft covering millions of buyers, and more Welcome...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways