The single biggest global ransomware attack on record occurred just last week. This attack affected financial services, travel and leisure and public sector computer systems located across 17 countries. Federal authorities put the number of affected companies in the thousands.
Who is the victim of this massive cyberattack? Kaseya Limited, a managed service provider. The REvil cybergang admitted to being the criminals behind the attack, claiming it infected 1 million systems tied to Kaseya services and are demanding $70 million in bitcoin in exchange for a decryption key. The attackers attacked systems by first deploying a malicious dropper via a PowerShell script which was executed through Kaseya’s software.
On Sunday, the prolific cybergang (REvil) posted a message to a hacker forum taking credit for the attack. The message stated:
“On Friday (2/7/2021) we launched an attack on MSP providers. More than a million systems were infected. If anyone wants to negotiate about universal decryptor – our price is 70 000 000$ in BTC and we will publish publicly decryptor that decrypts files of all victims, so everyone will be able to recover from attack in less than an hour. If you are interested in such deal – contact us using victims “readme” file instructions.” – REvil.
CISA and FBI Offer Guidance
In a statement released by the FBI on Saturday, the agency announced a coordinated investigation of the attack with CISA.
“We encourage all who might be affected to employ the recommended mitigations and for users to follow Kaseya’s guidance to shut down VSA servers immediately. As always, we stand ready to assist any impacted entities,” according to a security alert.
The following day the FBI updated its guidance, encouraging impacted companies to follow newly developed mitigations and report the attack to the agency.
“If you feel your systems have been compromised as a result of the Kaseya ransomware incident, we encourage you to employ all recommended mitigations, follow guidance from Kaseya and the Cybersecurity and Infrastructure Security Agency (CISA) to shut down your VSA servers immediately, and report your compromise to the FBI at ic3.gov.
CISA-FBI Guidance for MSPs and Kaseya Victims
Mitigation recommendations posted by CISA include:
- Download the Kaseya VSA Detection Tool. This tool analyzes a system (either VSA server or managed endpoint) and determines whether any indicators of compromise (IoC) are present.
- Enable and enforce multi-factor authentication (MFA) on every single account that is under the control of the organization, and—to the maximum extent possible—enable and enforce MFA for customer-facing services.
- Implement allow listing to limit communication with remote monitoring and management (RMM) capabilities to known IP address pairs, and/or
- Place administrative interfaces of RMM behind a virtual private network (VPN) or a firewall on a dedicated administrative network.
On Sunday, President Joe Biden ordered U.S. intelligence agencies to investigate the ransomware attack.
Resource: https://threatpost.com/kaseya-attack-fallout/167541/