What You Should Know About The Kaseya Ransomware Attack

July 6, 2021

On July 2 at 2:00 pm EDT, Kaseya, a developer of IT solutions for MSPs and corporate customers, announced that it was hit by a ransomware attack that exploited a vulnerability in its VSA software against several MSP (managed service providers) and their customers.

Since more than 40,000 organizations use at least one Kaseya software, the company has notified its customers of the breach, while urging them to immediately shut down their VSA servers.

While Kaseya also shut down its SaaS servers and pulled its data centers offline as the company’s incident response team investigated the crisis, the company called itself the “victim of a sophisticated cyberattack” by July 4 after investigating the severity of the attack.

While the FBI described the incident as a “supply chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple MSPs and their customers,” Huntress Labs, a security firm, tracked 30 MSPs involved in the breach, explaining that the attack was triggered by a vulnerability to bypass authentication in the Kaseya VSA web interface.

For more information, read the original story in ZDNet

Top Stories

Related Articles

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

February 20, 2026 ATM jackpotting attacks are accelerating from rare security demonstrations into a growing criminal enterprise, according to a more...

February 20, 2026 Bitdefender Labs says it is tracking an ongoing scam campaign on Meta platforms targeting users in the more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn