The ransomware attack on Kaseya hit 1,500 businesses using MSP’s as the delivery mechanism. How can you better prepare your company and clients infrastructure from similar attacks?
As a result of the recent Kaseya ransomware attack, and the mistakes leading up to their breach, all MSPs, Solution Providers and Channel Partners are likely to face far-reaching consequences and implications going forward. Are clients beginning to scrutinize their relationships with their service providers?
You may be asking, what did Kaseya do wrong? How can you, as a Solutions Provider or MSP, ensure you’re effectively minimizing the risk of future cyberattacks? And how can you effectively demonstrate your cybersecurity efforts to your clients? How can you assist your customers in reducing their risk of a cyberattack?
Read the full article on what happened with Kaseya, the impact of the attack and how you can take precautions to reduce exposure and ensure their clients are protected.
Earlier this month, a Russian-based group unleashed one of the most widespread ransomware attacks affecting upwards of 1,500 organizations in more than a dozen countries, demanding $70 million in cryptocurrency in exchange for a key to decrypt clients’ data.
Kaseya provides IT solutions for MSPs including VSA, a unified remote-monitoring and management tool for handling networks and endpoints. Hackers took advantage of a zero-day vulnerability in the Kaseya VSA web interface, allowing them to circumvent authentication controls, gain an authenticated session, and load the malicious code. They were then able to use the MSP’s Remote Monitoring and Management (RMM) tools to push across their software delivery and patching supply chain ultimately to the end clients.
Because the VSA Server automates IT tasks, it has a “high level of trust” on customer devices and any attached clients will perform whatever task the VSA Server requests without question, giving attackers privileged access to MSP’s customers. Security experts suggest that between 50 and 60 MSPs were impacted, with between 800-1500 businesses down the chain.
What is the best way to avoid having a cyberattack turn into a full breach? With increased threats by ransomware groups, organizations of all sizes are directly in the path of attack. It is essential for everyone in IT and information security to ensure they have an effective incident response/disaster recovery plan so that if and when an incident occurs they are prepared to recover, resume business operations, and minimize damage.
For the end customer, there are a number of things you can do as a Service Provider to help reduce the risk and/or impact of an attack on your clients’ IT infrastructure.
In addition to all of the ways you would help a client prepare, additional precautions can be taken to ensure that the tools you are using to assist your customers are not compromised – to avoid a Kaseya-type situation from happening.
Whether you or one of your clients is actively dealing with a potential breach or assessing their overall vulnerability – Coquina can help. Building on years of security engineering, operations, and pen testing experience, we have developed numerous automation’s, integrations, and processes that keep a security program streamlined, accurate, and cost-effective. We pride ourselves on our highly technical competencies, which span across all facets of cybersecurity. Our experts can help protect you and your client’s hardware, software and networks from cybercriminals. Our most requested security services include:
Need additional help? Download our Security and Cyber Risk Services Brief or contact a Coquina representative to discuss your security needs.