Kaseya Patches VSA Vulnerabilities Used in REvil Attack

Share post:

The IT management software provider Kaseya has recently closed the seven zero-day vulnerabilities that the Ransomware gang REvil uses to attack MSPs and their customers.

While the Dutch Institute for Vulnerability Disclosure (DIVD) announced the seven vulnerabilities in April, Kaseya implemented patches for most vulnerabilities in the VSA SaaS service.

The operation was only completed when the Ransomware gang REvil ended it and used it to launch a massive attack on 60 MSPs on July 2.

Kaseya urged customers to follow the “On-Premises VSA Startup Readiness Guide” steps before installing the update to prevent further breaches and ensure the devices are not compromised before installation.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways