Approximately three weeks later a Florida-based software vendor Kaseya which was hit by a widespread ransomware attack, the company now able manage to gets decryption key for REvil ransomware. One of the most hazardous attack in ransomware history world has seen.
The attacks, which exploited now-patched zero-days in the Kaseya Virtual Server Administrator (VSA) platform, affected Kaseya customers in 22 countries using the on-premises version of the platform. Many of which are managed service providers (MSPs) who use VSA to manage the networks of other businesses.
Around 60 direct customers and 1,500 downstream customers of those MSPs were also affected.
The VSA software is used by Kaseya customers to remotely monitor and manage software and network infrastructure.
It’s unclear if Kaseya paid any ransom amount or not. REvil members had demanded a ransom of $70 million an amount that was again negotiated to $50 million later. Or the abrupt appearance of decryption key suggest that it is possible this ransom may have been paid would have been negotiate to a lower price. but soon after, the ransomware gang mysteriously went off the grid, shutting down their payment sites and data leak portals.
Kaseya is working with Emsisoft to support their customer in recovery of systems and data. And Emsisoft has confirm that its decryption key is working and unlocking victims.
The lesson from the attack was Whenever an organization trusts third parties or vendors with the keys to their business, they are undertaking a serious risk. Its MSP/third party work when access has been given then they should protect their customers aggressively.
Found this article interesting? Follow HackersIdentity on Facebook, Twitter and LinkedIn to read more exclusive content we post.