{"id":21009,"date":"2021-08-14T00:14:00","date_gmt":"2021-08-13T22:14:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21009"},"modified":"2022-11-04T11:46:56","modified_gmt":"2022-11-04T10:46:56","slug":"kaseya-decryption-key-aufgetaucht-backup-update-schliet-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/14\/kaseya-decryption-key-aufgetaucht-backup-update-schliet-schwachstellen\/","title":{"rendered":"Kaseya: Decryption key revealed, backup update closes vulnerabilities"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/13\/kaseya-decryption-key-aufgetaucht-backup-update-schliet-schwachstellen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Small article at the end of the week, concerning the US vendor Kaseya. After the supply chain attack on Kaseya RMI software and encryption of numerous customer systems, a decryption key has surfaced in an underground forum. In addition, a blog reader alerted me to an update that closes various security holes in a Kaseya product.<\/p>\n<p><!--more--><\/p>\n<h2>Backstory to the supply chain attack<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/c1430e0d3efa4258bb858005b436f7ea\" width=\"1\" height=\"1\">In early July 2021, there was a successful supply chain attack on Kaseya VSA. This is remote management and monitoring (RMM) software used by many managed service providers (MSPs). The supply chain attack delivered malware to all customer systems where VSA was in use. I had reported here on the blog (see links at the end of the article).<\/p>\n<p>The Swedish Coop Group even had to close all 800 stores because a payment processor was affected by the ransomware attack on its servers through the Kaseya vulnerability. There was hope for affected people that the encrypted files could be saved because the vendor had received a decryption tool (see <a href=\"https:\/\/borncity.com\/win\/2021\/07\/23\/kaseya-hat-nach-ransomware-angriff-entschlsselungstool-erhalten\/\">Kaseya received universal decryption tool after ransomware attack<\/a>). However, the REvil group responsible for the attack had stopped its operation and shut down the infrastructure (see <a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/server-und-infrastruktur-der-revil-ransomware-gruppe-ist-abgeschaltet\/\">REvil Ransomware Group server and infrastructure is shut down<\/a>).&nbsp; <\/p>\n<h2>Decryption key in hacker forum<\/h2>\n<p>My last information on the Kaseya supply chain attack was that customers had to sign a non-disclosure agreement to get the decryption key (see <a href=\"https:\/\/borncity.com\/win\/2021\/07\/26\/kaseya-fordert-angeblich-geheimhaltungsverpflichtung-gegen-entschlsselungstool\/\">Kaseya allegedly demands NDA against decryption tool<\/a>). <\/p>\n<p><a href=\"https:\/\/twitter.com\/pancak3lullz\/status\/1425226693967495169\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Kaseya Entschl&uuml;sselungs-Key\" alt=\"Kaseya Entschl&uuml;sselungs-Key\" src=\"https:\/\/i.imgur.com\/0WLIsPB.png\"><\/a><\/p>\n<p>Now Bleeping Computer colleagues report that the universal decryption key for the REvil attack on Kaseya customers has surfaced on a hacker forum. The article refers to above <a href=\"https:\/\/twitter.com\/pancak3lullz\/status\/1425226693967495169\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from a security researcher who contacted Bleeping Computer. This key probably only works for victims of the Kaseya hack, and is not a universal decryptor key for other REvil ransomware cases. Bleeping Computer was able to use the key to decrypt a VM encrypted with the Kaseya malware. Details can be found in <a href=\"https:\/\/web.archive.org\/web\/20221028203017\/https:\/\/www.bleepingcomputer.com\/news\/security\/kaseyas-universal-revil-decryption-key-leaked-on-a-hacking-forum\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>.<\/p>\n<h2>Unitrends Backup Software Update 10.5.5 <\/h2>\n<p>Blog reader Stefan A. emailed me to let me know that update 10.5.5 is available for Kaseya's Unitrends Backup Software. The <a href=\"https:\/\/support.unitrends.com\/hc\/en-us\/articles\/4405444379281\" target=\"_blank\" rel=\"noopener\">release notes<\/a> state that some vulnerabilities (e.g. SQL injection, privilege escalation etc.) have been fixed, which were discovered by the Dutch Institute for Vulnerability Disclosure (DIVD).&nbsp; <\/p>\n<p>Similar to what Stefan mentioned in his email, I also stumbled across an article on Bleeping Computer in late July 2021. There, security researchers warned about unpatched Kaseya Unitrends backup vulnerabilities. Stefan writes about this:<\/p>\n<blockquote>\n<p>I stumbled across <a href=\"https:\/\/web.archive.org\/web\/20220610224004\/https:\/\/www.bleepingcomputer.com\/news\/security\/researchers-warn-of-unpatched-kaseya-unitrends-backup-vulnerabilities\/amp\/\" target=\"_blank\" rel=\"noopener\">this article on Bleeping Computer<\/a> some time ago. However, I never really understood the warning. The warning says that versions lower than 10.5.2 are affected. But at the time, version 10.5.4 was already out. At the same time it was said that there is no update for this yet (<a href=\"https:\/\/csirt.divd.nl\/cases\/DIVD-2021-00014\/\" target=\"_blank\" rel=\"noopener\">see<\/a>). <\/p>\n<p>Anyway, now something has happened. Maybe one or the other reader has the software in use and they could just point it out.<\/p>\n<\/blockquote>\n<p>At this point my thanks to Stefan for the information. If someone of you has the Kaseya software in use, check whether it is available in current form.  <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/revil-ransomware-befall-bei-200-firmen-ber-kaseya-vsa-und-management-service-provider-msp\/\">REvil Ransomware attack at 200 Companies via Kaseya VSA and Management Service Provider (MSP)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/coop-schweden-schliet-800-geschfte-nach-kaseya-vsa-lieferkettenangriff-durch-revil-gang\/\">Coop-Sweden closes 800 stores after Kaseya VSA supply chain attack by REvil gang<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/10\/nachbereitung-zum-kaseya-lieferkettenangriff\/\">Follow-up to the Kaseya supply chain attack<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/23\/kaseya-hat-nach-ransomware-angriff-entschlsselungstool-erhalten\/\">Kaseya received universal decryption tool after ransomware attack<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/26\/kaseya-fordert-angeblich-geheimhaltungsverpflichtung-gegen-entschlsselungstool\/\">Kaseya allegedly demands NDA against decryption tool<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Small article at the end of the week, concerning the US vendor Kaseya. After the supply chain attack on Kaseya RMI software and encryption of numerous customer systems, a decryption key has surfaced in an underground forum. In addition, a &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/08\/14\/kaseya-decryption-key-aufgetaucht-backup-update-schliet-schwachstellen\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544,195],"class_list":["post-21009","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21009"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21009\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}