Reporting by Joseph Menn; editing by Grant McCool, Insignia Ventures raises $516 mln, bets on Southeast Asian tech firms, Bitcoin rises 3.4% to $24,584; up 39.7% from year low in June, United States, Japan to launch new semiconductor research hub, U.S. launches new 5G mid-band wireless spectrum auction, Elon musk files under seal answer and counterclaims to Twitter lawsuit over deal, See here for a complete list of exchanges and delays. Ransomware can only work if you only have one copy of your data. Kaseya said that "an issue was discovered that has blocked the release" of the VSA SaaS rollout. Kaseya has also warned that scammers are trying to take advantage of the situation. Less than two weeks after the July 2 Kaseya attack, CISA issued guidelines for best practices on both sides of the equation. So now they are looking for a new route of attack, Amazon's PC game sale: Save up to 75% on hit titles, Drone deal: Save $40 on the Vantop Snaptain SP650. Researchers of the Dutch Institute for Vulnerability Disclosure identified the first vulnerabilities in the software on April 1. Once that has begun, we will publish the schedule for distributing the patch for on-premises customers. The company explained: Kaseya has now published an updated timeline for its restoration efforts, starting with the relaunch of SaaS servers, now set for July 6, 4:00 PM EDT and 7:00 PM EDT. [15][16], On 13 July 2021, REvil websites and other infrastructure vanished from the internet. Back to school: Must-have tech for students, How to answer "tell me about yourself" in interviews, Apple explains why iPhone cases are a waste, What is ransomware? Its not in our interests. ALL RIGHTS RESERVED. But MSPs also make an efficient vehicle for ransomware because they have wide access inside many of their customers' networks. In closing, ransomware attacks arent going away. In what has become one of the most severe and serious security problems modern businesses now face, ransomware is used by threat actors worldwide to hijack systems and disrupt operations. Bugcrowd Inc, one of several platforms where researchers can report vulnerabilities, has also seen security flaws as bad as Kaseya's, said Bugcrowd Chief Executive Ashish Gupta, perhaps because MSPs have been growing so fast. In the case of Kaseya, they infected victims via an automatic software update that delivered the REvil ransomware. According to Kaseya CEO Fred Voccola, less than 0.1% of the company's customers were embroiled in the breach -- but as their clientele includes MSPs, this means that smaller businesses have also been caught up in the incident. Kaseya will release patches as quickly as it can, but in the meantime, customers simply have to wait until Sunday. It develops software for managing networks, systems, and information technology infrastructure. "Targeting [an] MSP platform (that is managing many customers at once) was very well thought and planned," Amit Bareket, CEO of Perimeter 81, told ZDNet. In 2020, ransomware groups earned a total of $350 million worth of cryptocurrency, most of which went to the big players, as just 25 addresses received around 50% of the profits. See here for a complete list of exchanges and delays. REvil has offered a decryption key, allegedly universal and, therefore, able to unlock all encrypted systems, for the 'bargain' price of $70 million in the bitcoin (BTC) cryptocurrency. The firm's software is designed with enterprises and managed service providers (MSPs) in mind, and Kaseya says that over 40,000 organizations worldwide use at least one Kaseya software solution. Kevin Beaumont says that, unfortunately, he has observed victims "sadly negotiating" with the ransomware's operators. The company is working with Emsisoft to reach customers still suffering due to locked systems and in need of a decryption key. There will be new security measures implemented including enhanced security monitoring of our SaaS servers by FireEye and enablement of enhanced WAF capabilities. A specific list of the functionality and its impact on VSA capabilities will be outlined in the release notes. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers. According to the firm, zero-day vulnerabilities were exploited by the attackers to trigger a bypass authentication and for code execution, allowing them to infect endpoints with ransomware. The Department worked with the National Police of Ukraine for the charges, and also announced the seizure of $6.1 million tied to ransomware payments. With REvil extortionists asking for a record $70 million to reverse all the Kaseya damage, he said, "their aspirations are clearly bigger now, and their approach is more measured." ", The FBI described the incident succinctly: a "supply chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple MSPs and their customers.". How To Avoid Falling Victim To Ransomware. "What's unique is that hackers are becoming more strategic and targeting platforms that will filtrate down to many companies with one shot. The self-assessment scripts should be used in offline mode. In a July 5 update, Kaseya said that a fix has been developed and would first be deployed to SaaS environments, once testing and validation checks are complete. Wietse Boonstra, a Dutch Institute for Vulnerability Disclosure (DIVD) researcher, previously identified a number of vulnerabilities, tracked as CVE-2021-30116, which were used in the ransomware attacks. CISA is trying to get the word out both to MSPs and their customers of the risks and what to do about them, said Eric Goldstein, executive assistant director for cybersecurity. Everything you need to know about one of the biggest menaces on the web, The cyberattack has been attributed to the REvil/Sodinikibi ransomware group, which has claimed responsibility on its Dark Web leak site, "Happy Blog.". July 12: Kaseya has now released a patch and is working with on-prem customers to deploy the security fix. "We are developing the new patch for on-premises clients in parallel with the SaaS Data Center restoration," the company said. On 2 July 2021, a number of managed service providers (MSPs) and their customers became victims of a ransomware attack perpetrated by the REvil group,[1] causing widespread downtime for over 1,000 companies.[2][3][4]. "It's critical that you do this immediately because one of the first things the attacker does is shut off administrative access to the VSA," the executive said. Less than 0.1% of the company's customers experienced a breach. With the emergence of crypto laundering services, hackers can easily extract their earnings, incentivizing even more attacks into the future. On July 22, Kaseya said that the company has managed to secure a decryption key. "At this time, our evidence shows that more than 70 managed service providers were impacted, resulting in more than 350 further impacted organizations. As of July 4, Kaseya says the company has now moved on from a root cause analysis of the attack to recovery and patch plans, consisting of: Data centers starting with the EU will be restored, followed by the UK, APAC, and then North American systems. By July 4, the company had revised its thoughts on the severity of the incident, calling itself the "victim of a sophisticated cyberattack.". In fact, Russian intelligence agencies are strongly linked to cybercrime against the U.S. and other nations, even though the head of the country consistently denies such claims. "We remain committed to ensuring the highest levels of safety for our customers and will continue to update here as more details become available," Kaseya said. We absolutely do not care about you and your deals, except getting benefits. However, we are yet to find out just how widespread Kaseya's ransomware incident will prove to be. That will continue to be the trend into the future. SAN FRANCISCO, Aug 3 (Reuters) - A ransomware attack in July that paralyzed as many as 1,500 organizations by compromising tech-management software from a company called Kaseya has set off a race among criminals looking for similar vulnerabilities, cyber security experts said. If convicted on all charges, Vasinskyi faces a maximum penalty of 115 years in prison, and Polyanin 145 years in prison. [12] On July 5, Kaseya said that between 800 and 1,500 downstream businesses were impacted in the attack. REvil has been previously linked to ransomware attacks against companies,including JBS, Travelex, and Acer. "We are deploying in SaaS first as we control every aspect of that environment. Back up your data. There are two PowerShell scripts for use: one on a VSA server, and the other has been designed for endpoint scanning. John Hammond, senior security researcher at Huntress, told ZDNet that the company has already seen ransom demands of up to $5 million. Kyle Hanslovan, CEO and co-founder of Huntress, told attendees of a webinar discussing the technical aspects of the attack on July 6 that the threat actors responsible were "crazy efficient. Kaseya hopes to resolve the SaaS systems rollout no later than the evening of Thursday, July 8. With the high number of attacks, ransomware groups are wealthier than ever before, which ensures that they will continue to operate and carry out new attacks into the future. With the use of crypto laundering, hackers are now able to secure their earnings at a much larger scale than in the past, which will incentivize even more ransomware attacks in the future. Now that criminals see how powerful MSP attacks can be, "they are already busy, they have already moved on and we dont know where," said Victor Gevers, head of the non-profit Dutch Institute for Vulnerability Disclosure, which warned Kaseya of the weaknesses before the attack. Today's ransomware operators may be part of Ransomware-as-a-Service (RaaS), when they 'subscribe' to access and use a particular type of ransomware. Kaseya has denied paying for the decryption key. 4. I let my company down, our company let you down. Operators are demanding payment in return for a decryption key and one 'freebie' file decryption is also on the table to prove the decryption key works. This trend will surely continue in future ransomware attacks. I feel like I've let this community down. Kaseya has released a tool, including Indicators of Compromise (IoC), which can be downloaded via Box. Only have a few administrators who can access important data, and have them use long credentials paired with multifactor authentication. An increase in ransomware attacks led U.S. President Joe Biden to warn Russian President Vladimir Putin that the United States would act on its own against the worst hacking gangs operating on Russian soil unless the authorities reined them in. RMMs [remote monitoring and management] are basically keys to many many companies, which amount to the kingdom for bad actors. If youre running on an outdated system, you are a step behind the game and are more vulnerable to breaches from malicious actors. In practice - time is much more valuable than money.". "This is one of the farthest-reaching criminal ransomware attacks that Sophos has ever seen," commented Ross McKerchar, Sophos VP. They warned Kaseya and worked together with company experts to solve four of the seven reported vulnerabilities. The number of vulnerable Kaseya servers online, visible, and open to attackers dropped by 96% from roughly 1,500 on July 2 to 60 on July 8, according to Palo Alto Networks. This allowed them to conduct a widespread attack targeting several Kaseya MSP clients. Crypto laundering services are on the rise, which means great business margins for hackers in the near future. "We are in the process of resetting the timelines for VSA SaaS and VSA On-Premises deployment," the company says. Schedule backups consistently so that your data stays up to date. ZDNet's editorial team writes on behalf of you, our reader. Chained exploits are going to be used, such as CVE 2021-30116, which is more in the style of nation-states and the military. "REvil absolutely has the capability of decrypting only a single victim without these purchased decryption tools being applicable for other victims hit by the same campaign public key," the security expert noted. CVE 2021-30116 was a software vulnerability with the Kaseya VSA servers that the hackers were able to exploit. The first release will prevent access to functionality used by a very small fraction of our user base, including: Classic Remote Control (not LiveConnect). Reuters provides business, financial, national and international news to professionals via desktop terminals, the world's media organizations, industry events and directly to consumers. ZDNet's recommendations are based on many hours of testing, research, and comparison shopping. "We apologize for the delay and changes to the plans as we work through this fluid situation.". A smartphone with the words "Ransomware attack" and binary code is seen in front of the Kaseya logo in this illustration taken, July 6, 2021. Now, 100% of all SaaS customers are live, according to the company. An increasing number of former military cyber experts from Eastern Europe are joining ransomware groups to fight against the West. "We apologize for the delay and R&D and operations are continuing to work around the clock to resolve this issue and restore service," Kaseya commented. In an update over the weekend, the operators, believed to have ties to Russia, claimed that more than "a million" systems have been infected. ". The ransomware then encrypted the systems content on that network, causing operational disruption across many different organizations. Whether youre an individual or a company, there are steps you can take to protect yourself from ransomware attacks: Always update your OS. If we do not do our work and liabilities - nobody will not cooperate with us. It's unclear how much ransom was ultimately paid or how many businesses were affected. Cybersecurity Professional - Digital Forensics Lead, CEO and Founder,LIFARS LLC- PhD, CEI, CEH, EnCe, CISSP, Court expert witness. Managed service providers include companies such as IBM (IBM.N) and Accenture (ACN.N) offering cloud versions of popular software and specialist firms devoted to specific industries. Gevers said his researchers had discovered similar vulnerabilities in more MSPs. "Doesn't make it okay. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. ZDNet independently tests and researches products to bring you our best recommendations and advice. Do not click on any links or download any attachments claiming to be a Kaseya advisory.". With a tip from RiskIQ, Huntress is also investigating an AWS IP address that may have been used as a launch point for the attack. Read on: What is ransomware? If they refuse to pay up, they may then face the prospect of their data being sold or published online. PwC Cloud and Digital Transformation BrandVoice, How To Earn Cash Rewards For Everyday Spending. They did not pay ransom, but rebuilt their systems from scratch after waiting for an update from Kaseya. These updates contain fixes for bugs and vulnerabilities that hackers can exploit to carry out attacks. 6. But you will lose your time and data, cause just we have the private key. Reuters, the news and media division of Thomson Reuters, is the worlds largest multimedia news provider, reaching billions of people worldwide every day. Is It Better To Lease Or Buy A Car In Summer 2022? A side effect of the takedown is that the removal of negotiation and the possibility of purchasing a decryption key have left victims with unrecoverable systems. The FBI and CISA have released a joint statement on the security incident and are urging customers to run a tool provided by Kaseya to determine the risk of exploit, and to both enable and enforce multi-factor authentication (MFA) on enterprise accounts, wherever possible. Recovery, however, is taking longer than initially expected. "This management agent update is actually REvil ransomware. Ransomware groups target victims with large cyber insurance coverages because they know they are prime extortion targets. The White House is asking organizations to inform the Internet Crime Complaint Center (IC3) if they suspect they have been compromised. If you will not cooperate with our service --for us, its does not matter. "Our security, support, R&D, communications, and customer teams continue to work around the clock in all geographies to resolve the issue and restore our customers to service," Kaseya said, adding that more time is needed before its data centers are brought back online. Configuration changes to improve security will follow, including an on-premise patch, expected to land in 24 hours, or less, from the time SaaS servers come back online. Educate your employees about the importance of being security-aware. He declined to name the firms because they have not yet fixed all the problems. Kaseya CEO Fred Voccola said that the attack, "for the very small number of people who have been breached, it totally sucks. To be clear, this means organizations that are not Kaseya's customers were still encrypted.". Also: Kaseya issues patch for on-premise customers, SaaS rollout underway. New groups continually form seemingly every month, since even when groups fall apart, members dont take too long to join or form a new one to continue their operations. These are phishing emails that may contain malicious links and/or attachments. The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs. 2022 Forbes Media LLC. However, Kaseya emphasizes that there is no evidence of the VSA codebase being "maliciously modified". They typically serve small and medium-sized firms that lack in-house technology capabilities and often boost security. It appears that attackers have carried out a supply chain ransomware attack by leveraging a vulnerability in Kaseya's VSA software against multiple managed service providers (MSP) -- and their customers. Ransomware groups will continue to be well funded from previous ransomware activities, as well as by former group members such as Maze. Kaseya will be publishing a summary of the attack and what we have done to mitigate it. By late evening on July 5, Kaseya said a patch has been developed and it is the firm's intention to bring back VSA with "staged functionality" to hasten the process.