Zum Inhalt springen

Opportunists seen targeting Kaseya REvil victims

Möchten Sie diesen Beitrag weiterempfehlen? Dies kann über:

Malwarebytes researchers highlight new spam campaign targeting businesses impacted by the ongoing Kaseya REvil ransomware incident
Opportunistic cyber criminal operations appear to have started taking advantage of the 1,000-plus victims of the $70m REvil ransomware attack on managed service provider (MSP) customers of Kaseya, as evidence emerges of a new malware spam campaign.First spotted by researchers at Malwarebytes, the campaign, which has targeted some UK organisations, purports to be a patch for the impacted Kaseya VSA product originating from Microsoft. It includes an attachment named SecurityUpdates.exe and a link that, if clicked, drops Cobalt Strike, to be used by the attackers to gain access to their victim’s network and systems and conduct further attacks of their own, possibly even dropping other ransomwares.

As the ongoing Kaseya attack enters its fifth day, the emergence of parallel campaigns by threat actors probably not associated with the REvil gang and its affiliates is not a huge surprise to see: the downstream SME customers of the affected MSPs are considerably less likely to have appropriate security technology or trained staff in place to protect themselves, so represent an easy target in some respects.

Meanwhile, Kaseya began the process of bringing its software-as-a-service (SaaS) VSA servers online late on 6 July, configured with an additional layer of security services, but suspended the switch-on at 3am UK time on 7 July after identifying an undisclosed technical issue. The firm hopes to be able to provide a patch for on-premise VSA servers within 24 hours of the full restoration of the SaaS operation, but clearly this timeline has now slipped.

An example of the new malware spam campaign

The new security measures it is adding include: the provision of a 24/7 independent security operations centre (SOC) for every VSA server; a complementary content delivery network (CDN) with web application firewall (WAF) for every VSA server, including for on-premise users who want to opt in; and new requirements around whitelisting IPs for customers who do so. Kaseya said this would greatly reduce the overall attack service to which VSA is exposed.

In a newly recorded video, Kaseya CEO Fred Voccola said the firm was being “incredibly conservative” about the timeline for service restoration.

He again revised the number of impacted MSPs to about 50, around 10 fewer than previously stated. He said the attack was handed “very well” by the modular nature of Kaseya’s security architecture, which prevented it from spreading beyond VSA, and by the firm’s rapid response team and the support of external law enforcement, the US government and cyber investigators.

Voccola also thanked some of the firm’s competitors for offers of help, and pledged that Kaseya’s staffers, some of whom he said have had about four hours’ sleep since 3 July, will remain at their posts until “everything is as perfect as can be”.

“When something happens, it’s how prepared the organisation was, how quickly the organisation is to admit something happened and not try to hide it, seek help from people, and try to get focus on the customers and get information out of them,” he said.

“We’re doing it as best as we can, we’re doing it with the advice of the best people in the world, and our commitment is that we’ll continue to do that.”

Voccola has previously refused to comment on whether Kaseya has entered into any negotiations with REvil, or whether he plans to pay a ransom to the gang, which, as previously reported, are often willing to negotiate substantially lower payments.

Lesen Sie auch:

Subpostmaster campaigning forces government to set up compensation scheme and make interim payments

Subpostmaster campaign group is a step closer to achieving what it was originally set up to do as government launches compensation scheme for its members who did not receive fair payouts

UK tech has 2.8% gender ‘wage gap’, says Hired

The wage offered to women for tech jobs in the UK is 2.8% less than offered to male counterparts – a larger gap than in the US and Canada, says Hired

Government won’t regulate on professional cyber standards

The government has elected not to proceed with regulatory intervention to embed standards and pathways across the cyber profession

Two-thirds of UK organisations defrauded since start of pandemic

Nearly two out of three UK companies say they have experienced some form of fraud or economic crime in the past two years, according to a report

Hydrogen’s promise: How fuel cells might power lower-carbon datacentres

Could UK datacentre operators soon adopt emerging hydrogen technologies to reach expanding energy and emissions requirements?

Google Cloud expands European presence with opening of Madrid region

Public cloud giant Google is continuing to build out its datacentre footprint across Europe with the opening of its latest region in Madrid, Spain

Möchten Sie diesen Beitrag weiterempfehlen? Dies kann über:

Klaar voor de beste oplossing voor uw IT & ICT-situatie?

Ik heb mijn wachtwoord gewijzigd in “onjuist.” Dus wanneer ik vergeet wat het is, zal de computer zeggen: “Uw wachtwoord is onjuist.”