Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

Shutterstock
Ransomware

Hundreds of US businesses hit by 'colossal and devastating' cyber attack

Kaseya said yesterday evening that it had limited the attack to “a very small percentage of our customers”.

A US IT company has urged customers to shut down their servers after cyber attackers smuggled ransomware onto its network platform.

Kaseya said yesterday evening that it had limited the attack to “a very small percentage of our customers” who use its signature VSA software, “currently estimated at fewer than 40 worldwide”.

Kaseya lists a US headquarters in Florida and an international headquarters in Ireland.

Cybersecurity firm Huntress Labs had earlier said in a Reddit forum that it was working with partners targeted in the attack, and that some 200 businesses “have been encrypted”.

The BBC reports that Huntress Labs’ senior security researcher John Hammond said in an email to Reuters news agency that this is “a colossal and devastating supply chain attack”. 

Ransomware attacks typically involve locking away data in systems using encryption, making companies pay to regain access.

Kaseya describes itself as a leading provider of IT and security management services to small and medium-sized businesses.

VSA, the company’s flagship offering, is designed to let companies manage networks of computers and printers from a single point.

The company became aware of a possible incident with VSA at midday on the US east coast and “immediately shut down” its servers as a “precautionary measure,” it said.

Kaseya also “immediately notified our on-premises customers via email, in-product notes, and phone to shut down their VSA servers to prevent them from being compromised.”

“We believe that we have identified the source of the vulnerability and are preparing a patch to mitigate it,” the company said in a statement.

According to the New Zealand government’s Computer Emergency Response Team, the attackers were from a hacking group known as REvil.

REvil was also, according to the FBI, behind last month’s attack on JBS, one of the world’s biggest meat processors, which ended with the Brazil-based company paying bitcoin worth $11 million to the hackers.

The US Cybersecurity and Infrastructure Security Agency (CISA) put out word that it was “taking action to understand and address the recent supply-chain ransomware attack” against Kaseya VSA and the service providers using its software.

CISA called on businesses to follow Kaseya’s guidance and quickly shut down VSA servers to avoid having systems compromised.

The UN Security Council this week held its first formal public meeting on cybersecurity, addressing the growing threat of hacks to countries’ key infrastructure – an issue US President Joe Biden recently raised with Russian counterpart Vladimir Putin.

Several Security Council members acknowledged the grave dangers posed by cybercrime, notably ransomware attacks on key installations and companies.

Multiple US companies, including the computer group SolarWinds and the Colonial oil pipeline, have also recently been targeted by ransomware attacks.

The FBI has blamed those attacks on hackers based in Russian territory.

© – AFP, 2021

Your Voice
Readers Comments
7
This is YOUR comments community. Stay civil, stay constructive, stay on topic. Please familiarise yourself with our comments policy here before taking part.
Leave a Comment
    Submit a report
    Please help us understand how this comment violates our community guidelines.
    Thank you for the feedback
    Your feedback has been sent to our team for review.

    Leave a commentcancel