[NEW] Kaseya rules out a supply-chain attack, claiming attackers exploited an undisclosed 0-day #vulnerability in on-premises VSA #software to infect its customers with #ransomware.
Read details: thehackernews.com/2021/07/kaseya
#infosec #cybersecurity #hacking #malware
Conversation
Replying to
According to the company, about 60 MSPs and 1,500 downstream businesses around the world have been paralyzed by the #ransomware attack.
1
3
4
It's, however, unclear as to how the hackers learned of the vulnerabilities. The details of those flaws have not yet been publicly released.
2
6
21
Hackers behind this attack, REvil #ransomware-as-a-service (RaaS) group, swiftly lowered the asking price to $50 million, suggesting a willingness to negotiate their demands in return for a lesser amount.
6
9
20
Replying to
This allowed the attackers to leverage the standard VSA product functionality to deploy ransomware to endpoints.
#cybersecurity #dataprotection #ransomware
Replying to
Does this mean all affected companied had their on-prem VSA application exposed to internet?
Replying to
OK, my cherished geeks.....lots of gray hair on the mountain top here. So, tell me please, if we have the best geeks in the USA, and we know where these ransomware attacks come from, can we not hack the hackers? Or are the best geeks OUTSIDE the USA?? 🤔
1
1




