Kaseya Was Fixing Zero-Day When REvil Ransomware Attacked

Share post:

The zero-day vulnerability that was used to crack the Kaseya VSA servers on site was being fixed, just as the REvil ransomware gang used it for a massive attack on Friday, which has since spread all over the world.

The zero-day Kaseya vulnerability was discovered by DIVD researcher Wietse Boonstra and identified as CVE-2021-30116.

Access to the Kaseya VSA servers has been removed as quickly as possible to prevent the further spread of the vulnerability.

A new update of Kaseya recommends that all VSA on-premise servers remain offline until a patch is released.

Kaseya is also in the process of putting its SaaS server farms online and developing a plan for hosted VSA servers.

For more information, read the orignal story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Chrome update essential for Windows users

The latest Chrome update has just been rolled out, bringing the version up to 124.0.6367.78/.79. This update is...

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways