Kaseya Update: Hundreds to Thousands of Businesses Affected

To expand on my previous entry regarding the initial disclosure and understanding of the Kaseya supply-chain attack by REvil ransomware operators, I wanted to provide some of the available information we have on affected businesses.

Kaseya reported to the public that the attack resulted in the breach of roughly 60 direct customers systems using the VSA on-premises product. Further downstream, Kaseya adds another 1,500 victims whose networks were being managed by those direct MSP customers. As of their press release yesterday, Kaseya has asserted that the attack "had limited impact" and that "only approximately 50 of the more than 35,000" customers were affected. Kaseya stated that of the approximately 800,000 to 1,000,000 small businesses that are being managed by Kaseya customers, roughly 800 to 1,500 have been compromised.

While this number seems low in comparison to the whole customer base, it's still a staggering number of potential compromises, ransoms, and increased positions by threat actors.

Kaseya is working on restoring normality and are readying the deployment of a fix for the VSA zero-day.

"All on-premises VSA Servers should continue to remain offline until further instructions from Kaseya about when it is safe to restore operations.  A patch will be required to be installed prior to restarting the VSA and a set of recommendations on how to increase your security posture". - Kaseya



The Zero-Days

Kaseya confirmed on July 5th that multiple zero-day vulnerabilities were exploited to target vulnerable VSA server instances. These vulnerabilities included an authentication bypass and arbitrary command execution vulnerability. At the moment, no additional details about these vulnerabilities have been shared and no additional vulnerabilities have been referenced.

Huntress Labs and TrueSec researchers have identified potentially three zero-days in their investigations into attacks against clients. These zero-days include a code injection vulnerability to the two mentioned above. Huntress Labs believes that the threat actors were able to obtain access to VSA servers through the authentication bypass flaw. New evidence has suggested that SQL injection may have been only a portion of the full attack vector leading to code execution and perhaps another injection attack as part of the attack chain.

Currently, CVE-2021-30116 is believed to related to the authentication bypass vulnerability but we do not have any additional information just yet.

As of the creation of this blog entry, there have not been any proof of concepts posted for the above-mentioned vulnerabilities.

Relevant Articles

https://www.tenable.com/blog/cve-2021-30116-multiple-zero-day-vulnerabilities-in-kaseya-vsa-exploited-to-distribute-ransomware

https://github.com/cado-security/DFIR_Resources_REvil_Kaseya/tree/main/IOCs

https://www.bleepingcomputer.com/news/security/kaseya-roughly-1-500-businesses-hit-by-revil-ransomware-attack/


Comments

Popular posts from this blog

Russian GRU Unit 29155 recent operations