What You Should Know About The Kaseya Ransomware Attack

Share post:

On July 2 at 2:00 pm EDT, Kaseya, a developer of IT solutions for MSPs and corporate customers, announced that it was hit by a ransomware attack that exploited a vulnerability in its VSA software against several MSP (managed service providers) and their customers.

Since more than 40,000 organizations use at least one Kaseya software, the company has notified its customers of the breach, while urging them to immediately shut down their VSA servers.

While Kaseya also shut down its SaaS servers and pulled its data centers offline as the company’s incident response team investigated the crisis, the company called itself the “victim of a sophisticated cyberattack” by July 4 after investigating the severity of the attack.

While the FBI described the incident as a “supply chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple MSPs and their customers,” Huntress Labs, a security firm, tracked 30 MSPs involved in the breach, explaining that the attack was triggered by a vulnerability to bypass authentication in the Kaseya VSA web interface.

For more information, read the original story in ZDNet

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 29, 2024 – A new North Korean ransomware gang spotted, and more

A new North Korean ransomware gang spotted, and more Welcome to Cyber Security Today. It's Wednesday, May 29th, 2024....

Microsoft tries to regain trust of government cybersecurity leadership

Microsoft has embarked on an aggressive campaign to restore and enhance its cybersecurity image and regain trust within...

London Drugs refuses to pay ransom – corporate data is leaked

London Drugs, a prominent Canadian retailer, has confirmed a data breach involving sensitive corporate head office files, following...

Cyber Security Today, May 27, 2024 – Security controversy over a new Microsoft tool, a new open source threat intelligence service, and more

Security controversy over a new Microsoft tool, a new open-source threat intelligence service, and more. Welcome to Cyber Security...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways