iTnews

Kaseya supply-chain ransomware attack hits MSP customers

By Juha Saarinen on Jul 3, 2021 8:14AM
Kaseya supply-chain ransomware attack hits MSP customers

Malicious auto-update drops malware ahead of July 4 US holiday.

A supply-chain attack on Kaseya, which provides management, monitoring and automation software for managed service providers (MSPs), has led to ransomware infections among the company's customers around the world.

An unknown number of the company's over 40,000 customers have been hit by REvil ransomware, sparking fears that the attack could be as serious as the one that hit network monitoring firm SolarWinds.

The malware appears to have been delivered through an automatic update of the Kaseya VSA client management and monitoring software, researchers say.

Downstream customers of MSPs using Kaseya VSA have then had their systems infected by REvil ransomware with files being encrypted.

Kaseya VSA runs with high administrator system privileges, and the attackers are using a malicious dynamic link library that is executed by a signed copy of the legitimate Windows Defender anti-malware utility to encrypt victim data.

We are monitoring a REvil 'supply chain' attack outbreak, which seems to stem from a malicious Kaseya update. REvil binary C:\Windows\mpsvc.dll is side-loaded into a legit Microsoft Defender copy, copied into C:\Windows\MsMpEng.exe to run the encryption from a legit process.

— Mark Loman @�� (@markloman) July 2, 2021

As part of the attack chain, the malware executes code to disable Microsoft Defender for Endpoint's real-time monitoring, script scanning, controlled folder access, intrusion protection system, cloud loookups and sample submission, and network protection features via a PowerShell script.

REvil is asking for different amounts of ransom, ranging from approximately US$45,000 to US$5 million, payable in the Monero cryptocurrency.

The company has confirmed only a "potential attack" but said it has shut down its software-as-a-service servers.

"We are investigating a potential attack against the VSA that indicates to have been limited to a small number of our on-premises customers only," the company said.

"We have proactively shut down our SaaS servers out of an abundance of caution.

"We have been further notified by a few security firms of the issue and we are working closely with them as well.

"While we continue to investigate the incident, we will update our customers (and interested parties) as we have more information."

Since the malware removes administrative access to Kaseya VSA, users are advised to immediately switch off their instances of the software as well.

The attack was ongoing at the time of writing, and the United States government computer emergency response team is also urging users to immediately shut down their Kaseya VSA servers.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
defenderkaseyamicrosoftmspransomwarerevilsecurity

Partner Content

Operationalising net zero to be centre stage at IoT Impact conference
Partner Content Operationalising net zero to be centre stage at IoT Impact conference
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Matt Tett to lead essential primer session on security by design
Partner Content Matt Tett to lead essential primer session on security by design
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
Jul 3 2021
8:14AM
0 Comments

Related Articles

  • US Feds sat on REvil decryption key for three weeks: report
  • Kaseya has working REvil decryption key
  • REvil ransomware criminals demand US$70m for 'universal decryptor'
  • Kaseya ransomware attacker's trial begins
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.