Kaseya Case Update
03 Jul 2021 - Lennaert Oudshoorn
On the night of 7-3 (CET), the DIVD CSIRT did a mass scan for online exposed Kaseya VSA instances due to an alarming statement from Kaseya. Kaseya turned off their SaaS services and advised all on-premise customers to turn off Kaseya VSA because it was being used to spread ransomware to various MSPs.
We were able to react very swiftly because we were already running a broad investigation into backup and system administration tooling and their vulnerabilities. One of the products we have been investigating is Kaseya VSA. We discovered severe vulnerabilities in Kaseya VSA and reported them to Kaseya, with whom we have been in regular contact since then. Additionally, we have, in confidence, also reported these vulnerabilities to our trusted partners.
Last night we reported all Kaseya VSA instances to the abuse addresses of the networks they are located in and provided the lists to the Dutch National Certs and partners. We are working with Kaseya as well to identify these customers and contact them directly. Over the past few days, we have seen a drastic drop in the number of online instances, which indicates that Kaseya’s customers are responding positively to Kaseya’s advice and contact.
Last modified: 20 Jun 2022 07:35