Trustwave SpiderLabs has provided an additional technical analysis of the Kaseya VSA attack. Read the blog here.
Update: This blog was updated July 6 to clarify that this was a zero-day vulnerability attack, not a supply-chain attack.
On the afternoon of Friday, July 2, reports indicated that the REvil ransomware gang was actively targeting managed service providers (MSPs) who use Kaseya Virtual System/Server Administrator (VSA) to manage the networks of other businesses with a zero-day attack.
The attacks result in system lockups due to ransomware.
Kaseya VSA is a cloud-based MSP platform that allows providers to perform patch management and client monitoring for their customers.
According to the July 2nd security advisory from Kaseya, the company recommends that Kaseya VSA users immediately shut down any VSA server until further instructions are given by the vendor. "It's critical that you do this immediately because one of the first things the attacker does is shut off administrative access to the VSA."
Please reference this advisory for more updates.
Trustwave does not use the Kaseya VSA platform. At this time, there is no evidence or reason to believe that the Kaseya supply-chain attack has impacted Trustwave itself.
Trustwave is diligently working with its customers and partners to further determine any impact. Be sure to check your environments for the known indicators of compromise (IoCs) listed below.
If you believe you may have been compromised, please get in touch with the Trustwave Digital Forensics and Incident Response (DFIR) team or your Trustwave support point of contact.
Trustwave will be updating this post with additional pertinent information as it becomes available.
CISA and FBI recommend affected MSPs:
CISA and FBI recommend MSP customers affected by this attack take immediate action to implement the following cybersecurity best practices. Note: these actions are especially important for MSP customer who do not currently have their RMM service running due to the Kaseya attack.
CISA and FBI recommend affected MSP customers: