HomeCyber BalkansMSP Shares Details of Kaseya VSA Ransomware Attack and Recovery

MSP Shares Details of Kaseya VSA Ransomware Attack and Recovery

Published on

spot_img

On July 2, 2021, Progressive Computing Inc., an MSP in Yonkers, N.Y., experienced a devastating supply chain ransomware attack. The attack, carried out by REvil threat actors, targeted a zero-day vulnerability in the company’s remote monitoring and management tool, Kaseya VSA. The attack impacted all 80 of Progressive’s customers and over 2,000 endpoints. This attack was one of many that affected Kaseya MSP customers.

Robert Cioffi, the co-founder and CTO of Progressive Computing, recently reflected on the attack and the recovery process. He emphasized the crucial role that the community played in helping the MSP get back on its feet. As an MSP, Progressive was not designed to support all of its customers 100% of the time. However, in this situation, all of their customers needed them at full capacity. Cioffi expressed his gratitude for the support and assistance provided by peers and vendors during this challenging time.

Cioffi described the attack as a “smash and grab” operation, with the aim of spreading ransomware to as many endpoints as possible in a short period of time. There was no targeted data exfiltration or attack on backup systems. Progressive became aware of the attack when their phones started ringing off the hook. The attackers had gained administrative control of the Kaseya system and used it to push ransomware to every endpoint managed by Progressive.

The speed of the attack was staggering. The attackers didn’t bother to lock Progressive out of their systems; instead, they set up an admin account and swiftly executed their ransomware plan. Fortunately, the backups were not compromised, which allowed Progressive to focus on restoring servers to safe recovery points. The recovery process involved using local appliances and the Axcient cloud to restore data.

When asked about the benefit of having a local copy of data, Cioffi explained that it significantly speeds up the recovery process. If data needs to be pulled down from the cloud, it can cause delays. Progressive reached out to Axcient on the day of the attack and received technical support to aid in their recovery efforts. While Axcient didn’t directly handle the recovery process, they provided necessary resources, including senior sales engineers who flew out to New York to assist with recoveries.

During the recovery process, Progressive encountered some obstacles such as hardware failures and storage space limitations. A production server they were trying to restore to failed right at the beginning, causing additional stress. However, overall, the recovery process went relatively smoothly. It took 17 calendar days to restore all 80 customers.

Cioffi admitted that no one truly prepares for the scale of attack that Progressive experienced. While companies may claim to have plans in place, the reality is that such attacks are unimaginable until they happen. Cioffi emphasized the importance of openly discussing and sharing experiences of cyberattacks, as it helps the community learn from each other and be better prepared for future events.

In conclusion, Progressive Computing Inc. faced a supply chain ransomware attack that affected all of its customers. Thanks to the support of the community and vendors like Axcient, the MSP was able to recover from the attack and restore its customers’ data. The incident highlighted the need for open discussion and collaboration within the cybersecurity community to strengthen defenses against such attacks in the future.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...