{"id":7923,"date":"2021-07-06T09:09:57","date_gmt":"2021-07-06T13:09:57","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=7923"},"modified":"2021-07-23T13:51:17","modified_gmt":"2021-07-23T17:51:17","slug":"what-you-should-know-about-the-kaseya-ransomware-attack","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/what-you-should-know-about-the-kaseya-ransomware-attack\/","title":{"rendered":"What You Should Know About The Kaseya Ransomware Attack"},"content":{"rendered":"\n<p>On July 2 at 2:00 pm EDT, Kaseya, a developer of IT solutions for MSPs and corporate customers, announced that it was hit by a ransomware attack that exploited a vulnerability in its VSA software against several MSP (managed service providers) and their customers.<\/p>\n\n\n\n<p>Since more than 40,000 organizations use at least one Kaseya software, the company has notified its customers of the breach, while urging them to immediately shut down their VSA servers.<\/p>\n\n\n\n<p>While Kaseya also shut down its SaaS servers and pulled its data centers offline as the company&#8217;s incident response team investigated the crisis, the company called itself the &#8220;victim of a sophisticated cyberattack&#8221; by July 4 after investigating the severity of the attack.<\/p>\n\n\n\n<p>While the FBI described the incident as a &#8220;supply chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple MSPs and their customers,&#8221; Huntress Labs, a security firm, tracked 30 MSPs involved in the breach, explaining that the attack was triggered by a vulnerability to bypass authentication in the Kaseya VSA web interface.<\/p>\n\n\n<p>For more information, read the <a href=\"https:\/\/www.zdnet.com\/article\/kaseya-ransomware-supply-chain-attack-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in ZDNet<\/p>","protected":false},"excerpt":{"rendered":"<p>On July 2 at 2:00 pm EDT, Kaseya, a developer of IT solutions for MSPs and corporate customers, announced that it was hit by a ransomware attack.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-7923","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=7923"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7923\/revisions"}],"predecessor-version":[{"id":7953,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/7923\/revisions\/7953"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=7923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=7923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=7923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}