Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
No Result
View All Result
No Result
View All Result
Home Supply Chain Updates

Kaseya wrestles with service restoration following supply chain attack

usscmc by usscmc
July 6, 2021
Kaseya wrestles with service restoration following supply chain attack
Share on FacebookShare on Twitter

Dive Brief:

  • Federal officials, security researchers, private companies and other organizations worldwide scrambled Tuesday to get a clearer picture of the Friday ransomware attack on IT monitoring firm Kaseya. The REvil group, the threat actor behind the JBS meat distributor attack in June, claimed credit for the attack that was already publicly attributed to them and demanded a $70 million bitcoin payment for a universal decryptor. Some researchers, however, are questioning the validity of the posted claim, saying the ask has dropped to $50 million. 
  • Kaseya is aware of about 50 customers directly compromised by the attack, all of which used the on-premises version of VSA, the company said Tuesday. Many of Kaseya’s customers provide IT services to other firms, and less than 1,500 downstream businesses were impacted, the company said. VSA was the only product impacted by the attack and Kaseya did not had not receive any additional reports of direct customers being impacted since Saturday. 
  • Kaseya has developed a patch for the on-premises offering, which is going through testing and validation, the company said. The firm expects to make the patch available within 24 hours of its SaaS servers coming back online. Those servers are expected to be brought back Tuesday afternoon, but a final decision on the timeline is expected before noon. The company plans to release VSA in stages.

Dive Insight:

The attack has directly impacted managed service providers, who provide IT management services to thousands of end customers. Miami-based Kaseya provided IT monitoring and other services to more than 36,000 customers worldwide. 

Analysts said the attack on Kaseya is impacting companies, schools, retailers and other organizations worldwide in ways that have yet to be fully understood. 

“It’s going to be very difficult to evaluate the actual scale of impacts, other than to say the attack was architected for maximum reach and impact,” Katell Thielemann, VP analyst, security & risk management at Gartner. “The Kaseya tool in question is used by many IT service providers globally and the IT service market is very large.” 

Thielemann said the global IT services market is expected to grow to $1.2 trillion by 2023. Thielemann expressed concerns this attack will have real-world impacts on people; the attack already shut down payment services at hundreds of stores at Sweden’s Coop Stores and Supermarkets chain. 

The Sweden-based grocer expected to open a few hundred stores Tuesday and hundreds of stores will allow payment with the company’s Scan and Pay app; it is working to also replace checkout systems at closed stores. Coop is aware of other companies in Sweden and internationally that were impacted by the Kaseya attack.

Synnex Corp., a Fremont, California-based provider of IT distribution services, confirmed outside actors have attempted to access its customers through the Microsoft cloud environment. The company said the attempt may be related to the MSP attacks, but did not name Kaseya or use the word ransomware. Synnex is working with Microsoft and a third-party cybersecurity firm to investigate the attack. 

Security firm Huntress is tracking more than 30 MSPs across the U.S., Australia, Europe and Latin America, and Kaseya VSA was used to encrypt more than 1,000 businesses, it said. Huntress confirmed the attackers exploited an arbitrary file upload and code injection vulnerability in order to attack the IT services provider. The attack also involved using an authentication bypass to gain access to the servers.

Kaseya met with officials from the FBI and Cybersecurity and Infrastructure Security Agency Monday to help make sure customers harden systems before attempting to bring back up the system for both on-premises and SaaS customers. 

More than 2,000 downloads have taken place since it released a Compromise Detection Tool that was developed after the attack, Kaseya said.

The FBI on Sunday asked companies to follow the guidance from Kaseya and CISA to shut down VSA servers and to report any compromises to the FBI at ic3.gov. 

The FBI and CISA recommended MSPs affected by the attack:  

  • Enable and enforce multifactor authentication on all accounts controlled by the organization, and whenever possible do the same for customer-facing services. 
  • Implement allowlisting to limit communications with remote monitoring and management capabilities to known IP address pairs or put RMM administrative interfaces behind a VPN or firewall of a dedicated administrative network.
usscmc

usscmc

No Result
View All Result

Recent Posts

  • How Hapag Lloyd captured a major market share in the Container Shipping Industry in USA
  • Why USA’s East Coast is the Favorite Destination for Manufacturing Companies
  • How Trade Relations Between the USA and UK Improved After Keir Starmer Became Prime Minister
  • Tips and Tricks for Procurement Managers to Handle Their Supplier Woes
  • The Crazy Supply Chain of Walmart Spanning Across the Globe

Recent Comments

  • Top 5 Supply Chain Certifications that are in high demand | Top 5 Certifications on Top 5 Globally Recognized Supply Chain Certifications
  • 3 Best Procurement Certifications that are most valuable | Procurement Newz on Top 5 Globally Recognized Supply Chain Certifications

Archives

  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • September 2019

Categories

  • Global News
  • Supply Chain Updates

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Antispam
  • Contact Us
  • Disclaimer
  • Home
  • Privacy Policy
  • Terms of Use

© 2025 www.usscmc.com

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us

© 2025 www.usscmc.com