IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Researchers spot opportunistic phishing attacks in wake of Kaseya VSA ransomware

Phishing campaign claims to offer emergency patches to fix vulnerable software

Hackers have been discovered launching opportunistic phishing attacks against victims that pretend to be security updates for the Kaseya VSA product, vulnerable software recently exposed to a ransomware attack.

The phishing emails warn victims that they should “install the update from Microsoft to protect against ransomware as soon as possible. This is fixing a vulnerability in Kaseya", according to a blog post by Malwarebytes.

This appears to be a classic example of an opportunistic attack likely conducted by another hacking group off the back of a high-profile cyber attack, the researchers claim.

“With Kaseya being a big name in the MSP world and the company attempting to take their VSA SaaS platform off the ground, post-attack, it’s the perfect time and opportunity to also capitalize on organizations who are eagerly waiting for the hotfix that REvil exploited in the first place so they can get back to business as quickly as possible,” said the researchers.

The emails appear to be using SecurityUpdates.exe and ploader.exe as attachments, both of which use the Cobalt Strike payload.

Researchers also noted that the location where the payload is hosted appears to be the same IP address used in another malspam campaign that was pushing Dridex, a known information stealer. They added that hackers behind Dridex campaigns were also observed using Cobalt Strike.

Related Resource

X-Force Threat Intelligence Index

Top security threats and recommendations for resilience

Transparent cube against a black background - whitepaper from IBMFree download

Cobalt Strike itself is legitimate software used as “adversary simulation software”, however, ransomware actors have abused such software to target organizations.

Last month, researchers at Proofpoint said that the use of legitimate tools, such as Cobalt Strike, had increased 161% from 2019 to 2020 and remains a high-volume threat in 2021.

Researchers warned organizations affected by the Kaseya ransomware attack should only get patches straight from their vendor.

“Links and/or attachments sent over your way, even from a trusted colleague, should be suspect until you have confirmed with your vendor of the availability of a patch and where or how to get it,” they added.

“Opportunists will show no mercy in targeting cyber attack victims multiple times as long as they get something out of it.”

Researchers added that with the use of Cobalt Strike, hackers intend to also gain access to already-compromised systems, possibly for further reconnaissance or to conduct a local, follow-up attack.

Featured Resources

AI for customer service

IBM Watson Assistant solves customer problems the first time

View now

Solve cyber resilience challenges with storage solutions

Fundamental capabilities of cyber-resilient IT infrastructure

Free Download

IBM FlashSystem 5000 and 5200 for mid-market enterprises

Manage rapid data growth within limited IT budgets

Free download

Leverage automated APM to accelerate CI/CD and boost application performance

Constant change to meet fast-evolving application functionality

Free Download

Recommended

Ransomware now strikes one in 40 organisations per week, Check Point finds
ransomware

Ransomware now strikes one in 40 organisations per week, Check Point finds

27 Jul 2022
Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
Windows users now able to run Linux apps and distros natively
Microsoft Windows

Windows users now able to run Linux apps and distros natively

24 Nov 2022