{"id":20525,"date":"2021-07-03T02:16:42","date_gmt":"2021-07-03T00:16:42","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20525"},"modified":"2021-07-03T02:29:02","modified_gmt":"2021-07-03T00:29:02","slug":"revil-ransomware-befall-bei-200-firmen-ber-kaseya-vsa-und-management-service-provider-msp","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/07\/03\/revil-ransomware-befall-bei-200-firmen-ber-kaseya-vsa-und-management-service-provider-msp\/","title":{"rendered":"REvil Ransomware attack at 200 Companies via Kaseya VSA and Management Service Provider (MSP)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/07\/03\/revil-ransomware-befall-bei-200-firmen-ber-kaseya-vsa-und-management-service-provider-msp\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]It is once again a nightmare come true for the IT landscape. The REvil ransomware group has succeeded in an attack via management service providers (MSPs). As a result, the servers of 200 companies were encrypted by the ransomware. It looks like the Kaseya IT management platform has been compromised. The whole thing is something like the SolarWinds supply chain attack, only this time it was ransomware.<\/p>\n<p><!--more--><\/p>\n<h2>What is Kaseya VSA?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/33260b57773840c0bca44fa018d023f4\" alt=\"\" width=\"1\" height=\"1\" \/>Kaseya VSA is a cloud-based MSP platform that allows vendors to perform patch management and client monitoring for their customers.\u00a0 The vendor <a href=\"https:\/\/www.kaseya.com\/de\/produkte\/vsa\/\" target=\"_blank\" rel=\"noopener\">describes<\/a> VSA as remote access and endpoint management applications. The software, Kaseya VSA, is popular with so-called managed service providers (MSPs), which provide IT infrastructure to companies that prefer to outsource these things rather than run them themselves. Hacking the MSP via compromised software like Kaseya VSA means having access to its customers.<\/p>\n<h2>Kaseya VSA likely compromised<\/h2>\n<p><a href=\"https:\/\/twitter.com\/BrettCallow\" target=\"_blank\" rel=\"noopener\">Brett Callow<\/a>, security analyst at Emsisoft, pointed on <a href=\"https:\/\/twitter.com\/BrettCallow\/status\/1411046654724116482\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> to the message from the Kaseya help desk indicating a hack and recommends customers using Kaseya VSA directly shut down their servers. This is because there is a risk of losing administrative access in the event of an attack.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BrettCallow\/status\/1411046654724116482\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Kaseya VSA compromised\" src=\"https:\/\/i.imgur.com\/2ZhMoZp.png\" alt=\"Kaseya VSA compromised\" \/><\/a><\/p>\n<p>An attack is confirmed on the helpdesk pages of the provider Kaseya, where it says July 2, 2021:<\/p>\n<blockquote>\n<h4>Important Notice July 2nd, 2021<\/h4>\n<p>We are experiencing a potential attack against the VSA that has been limited to a small<br \/>\nnumber of on-premise customers only as of 2:00 PM EDT today.<\/p>\n<p>We are in the process of investigating the root cause of the incident with an abundance<br \/>\nof caution <strong><u>but we recommend that you IMMEDIATELY shutdown your VSA server until<br \/>\nyou receive further notice from us<\/u><\/strong>.<\/p>\n<p><strong><u>Its critical that you do this immediately, because one of the first things the attacker does<br \/>\nis shutoff administrative access to the VSA.<\/u><\/strong><\/p><\/blockquote>\n<p><img decoding=\"async\" title=\"Kaseya notice\" src=\"https:\/\/i.imgur.com\/Z3NSTzy.png\" alt=\"Kaseya notice\" \/><\/p>\n<p>The vendor confirms an attack on its VSA product that affected a small number of on-premises customers. It all sounds very harmless up to this point.<\/p>\n<h2>REvil infects at least 200 companies<\/h2>\n<p>On reddit.com, there has been <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/ocggbv\/crticial_ransomware_incident_in_progress\/\" target=\"_blank\" rel=\"noopener\">this thread<\/a> for a few hours now, informing about a major ransomware attack. It says here:<\/p>\n<blockquote><p>Update 1 &#8211; 07\/02\/2021 &#8211; 1417 ET<\/p>\n<p>We are tracking four MSPs where this has happened and working in close collaboration with two of them. Although all four are running Kaseya VSA, we have not validated that VSA is being exploited (not fair at this time to say \"Kaseya has been hacked\" without evidence). Here's validated indicators of compromise:<\/p>\n<ul>\n<li>Ransomware encryptor is dropped to <code>c:\\kworking\\agent.exe<\/code><\/li>\n<li>The VSA procedure is named \"Kaseya VSA Agent Hot-fix\"<\/li>\n<\/ul>\n<\/blockquote>\n<p>Andy Greenberg addressed the incident within the following <a href=\"https:\/\/twitter.com\/a_greenberg\/status\/1411089984703152128\" target=\"_blank\" rel=\"noopener\">tweet<\/a>, and speaks of a monomental cyber-attack and a nightmare scenario, something that came like a tsunami before the 4th of July (US Independence Day).<\/p>\n<p><a href=\"https:\/\/twitter.com\/a_greenberg\/status\/1411089984703152128\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Revil infects 200 Kaysea customers\" src=\"https:\/\/i.imgur.com\/8SzG6db.png\" alt=\"Revil infects 200 Kaysea customers\" \/><\/a><\/p>\n<p>Currently, the whole thing is still developing, but Greenberg sums it up on <a href=\"https:\/\/www.wired.com\/story\/kaseya-supply-chain-ransomware-attack-msps\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a>. Apparently, the REvil Group managed to hack the Kaseya VSA product. Subsequently, the compromised VSA software was used to take over the managed service providers (MSPs) that use the product. Shortly after the attack, administrators lose administrative access to the VSA servers. And subsequently, customers' server instances are encrypted with the REvil ransomware.<\/p>\n<p>Bleeping Computer colleagues were provided with information by security researcher <a href=\"https:\/\/twitter.com\/_johnhammond\" target=\"_blank\" rel=\"noopener\">John Hammond<\/a> (Huntress) and <a href=\"https:\/\/twitter.com\/markloman\" target=\"_blank\" rel=\"noopener\">Mark Loman<\/a>(Sophos). Both confirm that there was probably a supply chain attack on Kaseya VSA.<\/p>\n<ul>\n<li>According to Hammond, Kaseya VSA drops an <em>agent.crt<\/em> file in the <em>c:\\kworkin<\/em>g folder used for updates to VSA.<\/li>\n<li>A PowerShell command is then run to decrypt the <em>agent.crt<\/em> file using the Windows <em>certutil.exe<\/em> command and extract an <em>agent.exe <\/em>file to the same folder.<\/li>\n<li>The <em>agent.exe<\/em> is signed with a certificate from \"PB03 TRANSPORT LTD\" and contains an embedded 'MsMpEng.exe' and 'mpsvc.dll', where the DLL is the REvil encryptor.<\/li>\n<li>The <em>MsMPEng.exe<\/em> is used as <a href=\"https:\/\/www.cynet.com\/attack-techniques-hands-on\/what-are-lolbins-and-how-do-attackers-use-them-in-fileless-attacks\/\" target=\"_blank\" rel=\"noopener\">LOLBin<\/a> to launch the DLL, whereupon the system is encrypted.<\/li>\n<\/ul>\n<p>Bleeping Computer has gathered more details in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-hits-200-companies-in-msp-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener\">its post<\/a>.\u00a0 They have an extortion letter from the REvil ransomware gang demanding $5 million ransom for decryption. Whether the demand is that high for all victims is unknown.<\/p>\n<p>Anyway, the damage that could be successfully done with the supply chain attack is quite high now. I think this matter will stir up a lot of dust in the USA, so that the people behind the REvil group will be hunted down intensively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]It is once again a nightmare come true for the IT landscape. The REvil ransomware group has succeeded in an attack via management service providers (MSPs). As a result, the servers of 200 companies were encrypted by the ransomware. It &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/revil-ransomware-befall-bei-200-firmen-ber-kaseya-vsa-und-management-service-provider-msp\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[243,69],"class_list":["post-20525","post","type-post","status-publish","format-standard","hentry","category-security","tag-ransomware","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20525"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20525\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}