Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Nevilledog

(51,023 posts)
Mon Jul 5, 2021, 06:36 PM Jul 2021

The Kesaya Ransomware Attack is a Really Big Deal




https://www.lawfareblog.com/kesaya-ransomware-attack-really-big-deal

If you’re not already paying attention to the Kaseya ransomware incident, you should be. It’s likely the most important cybersecurity event of the year. Bigger than the Exchange hacks by China in January. Bigger than the Colonial pipeline ransomware incident. And, yes, more important than the SolarWinds intrusions last year.

First, some background. Kaseya is a managed service provider; its customers use Kaseya to manage their company IT infrastructure. As part of this task, Kaseya can deploy software to the systems under management, in a way that is broadly equivalent to a software provider deploying an automatic update to those machines. For those interested in more, Nick Weaver wrote a piece for Lawfare that walks through the background in depth.

Under normal circumstances, automatic software deployment, especially in the context of software updates, are a good thing. But here this feature was turned on its head. Russian-based criminal gang REvil hacked into Kaseya’s management system, and pushed REvil software to all of the systems under Kaseya’s management. From there, the ransomware promptly disabled those computers and demanded a cryptocurrency payment of about $45k per system to set the machines free. As of writing, REvil claims that about a million total computers were affected, and is offering a “bulk discount” of $70m to unlock all affected systems in a single payment.

Although the direct impact is already enormous, to me, the direct impact is, in some sense, far less important than the issue of how the incident occurred, namely by subverting software delivery mechanisms as a means to install ransomware.

*snip*


8 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
The Kesaya Ransomware Attack is a Really Big Deal (Original Post) Nevilledog Jul 2021 OP
And can't the hackers hide malware in the system and do it again after the ransom is paid? Beakybird Jul 2021 #1
Once data is unencrypted, extract the data, then reformat the drives. Klaralven Jul 2021 #2
I worked for an MSP that uses Kaseya. milestogo Jul 2021 #3
"Easy" is the enemy of "security" Klaralven Jul 2021 #4
k&r for visibility alwaysinasnit Jul 2021 #5
to me this seems quite similar to SolarWinds stopdiggin Jul 2021 #6
Cyber crime offense punishment should include the death penalty gulliver Jul 2021 #7
KnR Hekate Jul 2021 #8
 

Klaralven

(7,510 posts)
2. Once data is unencrypted, extract the data, then reformat the drives.
Mon Jul 5, 2021, 06:55 PM
Jul 2021

Totally rebuild the operating system and applications from known good sources.

In software security configuration management is critical. Using a sketchy third party to do it is inexcusable.

https://www.kaseya.com/company/

Look like a bunch of suits. Located in Miami?

Or Dublin?

Kaseya's international headquarters is in Dublin, Ireland, and the company has a US headquarters in Miami, Florida. The vendor maintains a presence in 10 countries.


https://www.zdnet.com/article/kaseya-ransomware-supply-chain-attack-what-you-need-to-know/

At least for tax purposes ....

milestogo

(16,829 posts)
3. I worked for an MSP that uses Kaseya.
Mon Jul 5, 2021, 06:59 PM
Jul 2021

So easy to just hop on to any of our customer's computers. So easy to run tasks and installs in the background. I would say that yes, this is a freaking nightware for any company which has Kaseya installed on their computers - and that includes a lot of companies that rely on MSPs for support.

stopdiggin

(11,248 posts)
6. to me this seems quite similar to SolarWinds
Mon Jul 5, 2021, 11:55 PM
Jul 2021

where a 'service provider' is hacked - and then delivers the malware from a 'trusted source.'

i.e. can't blame some mid-level boob in the marketing department here for mindlessly opening an attachment, or providing a password over email.

gulliver

(13,168 posts)
7. Cyber crime offense punishment should include the death penalty
Tue Jul 6, 2021, 02:54 AM
Jul 2021

These scumbags are playing with fire. They can cause catastrophic damage. It's like a war against us or terrorism more than a crime and should be treated as such. Cyber criminals should face the death penalty for high damage crimes or conspiracy. If in foreign countries, they should get the same treatment we gave bin Laden under Obama, imo.

Latest Discussions»General Discussion»The Kesaya Ransomware Att...