• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Ransomware  /  Advisory on Kaseya VSA Supply-Chain Ransomware Attack
Advisory on Kaseya VSA Supply-Chain Ransomware Attack
03 July 2021

Advisory on Kaseya VSA Supply-Chain Ransomware Attack

Written by Seqrite
Seqrite
Ransomware

We are aware of an ongoing Supply Chain Attack affecting Kaseya VSA users. As per the recent update from Kaseya, the attackers were able to exploit zero-day vulnerabilities in the VSA product to bypass authentication and run arbitrary command execution.  This allowed the attackers to leverage the standard VSA product functionality to deploy ransomware protection to endpoints. There is no evidence that Kaseya’s VSA codebase has been maliciously modified.     

Kaseya has issued an advisory on this:

What is Kaseya VSA, and how severe is this Supply Chain Attack?

KASEYA VSA is a Unified Remote Monitoring & Management software used for centralized Endpoint Management and Network Monitoring. Many MSPs (Managed Service Providers) use this software for remote patch management and client monitoring of their customer’s IT infrastructure. This software runs with higher privileges on such systems and, if exploited, can spread laterally very quickly. To that end, the damage could be devastating!

If you are using Kaseya VSA software, we request you to follow the advisory issued by Kaseya and immediately shut down your VSA server(s) until further communication from Kaseya.

Additionally, keep your Seqrite EPS products updated with the latest virus definitions. We at Seqrite are continuously monitoring all the developments around this Supply Chain Attack and will update our detections as necessary. As of now, we already have detection for REvil Ransomware, and the IoCs found during this supply chain attack.

IoCs:

  • d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
  • e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2
  • 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd

 Previous PostSecure Your Digital Transformation Journey With Seqrite’s Centr...
Next Post  Seqrite uncovers second wave of Operation SideCopy targeting Indi...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
  • How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

    March 11, 2025
  • Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

    January 31, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies