Kaseya Patches VSA Vulnerabilities Used in REvil Attack

Share post:

The IT management software provider Kaseya has recently closed the seven zero-day vulnerabilities that the Ransomware gang REvil uses to attack MSPs and their customers.

While the Dutch Institute for Vulnerability Disclosure (DIVD) announced the seven vulnerabilities in April, Kaseya implemented patches for most vulnerabilities in the VSA SaaS service.

The operation was only completed when the Ransomware gang REvil ended it and used it to launch a massive attack on 60 MSPs on July 2.

Kaseya urged customers to follow the “On-Premises VSA Startup Readiness Guide” steps before installing the update to prevent further breaches and ensure the devices are not compromised before installation.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cisco Duo’s Multifactor Authentication service compromised by social engineering attack

Cisco Duo, a prominent provider of multifactor authentication (MFA) services, has fallen victim to a cyberattack targeting one...

Cyber Security Today, April 17, 2024 – More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner,...

This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoo

The US government and Its Microsoft dependency: A cybersecurity dilemma

Microsoft's series of high-profile cybersecurity failures has once again spotlighted the complex relationship between the tech giant and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways