Researchers spot opportunistic phishing attacks in wake of Kaseya VSA ransomware
Phishing campaign claims to offer emergency patches to fix vulnerable software


Hackers have been discovered launching opportunistic phishing attacks against victims that pretend to be security updates for the Kaseya VSA product, vulnerable software recently exposed to a ransomware attack.
The phishing emails warn victims that they should “install the update from Microsoft to protect against ransomware as soon as possible. This is fixing a vulnerability in Kaseya", according to a blog post by Malwarebytes.
This appears to be a classic example of an opportunistic attack likely conducted by another hacking group off the back of a high-profile cyber attack, the researchers claim.
“With Kaseya being a big name in the MSP world and the company attempting to take their VSA SaaS platform off the ground, post-attack, it’s the perfect time and opportunity to also capitalize on organizations who are eagerly waiting for the hotfix that REvil exploited in the first place so they can get back to business as quickly as possible,” said the researchers.
The emails appear to be using SecurityUpdates.exe and ploader.exe as attachments, both of which use the Cobalt Strike payload.
Researchers also noted that the location where the payload is hosted appears to be the same IP address used in another malspam campaign that was pushing Dridex, a known information stealer. They added that hackers behind Dridex campaigns were also observed using Cobalt Strike.
RELATED RESOURCE
X-Force Threat Intelligence Index
Top security threats and recommendations for resilience
Cobalt Strike itself is legitimate software used as “adversary simulation software”, however, ransomware actors have abused such software to target organizations.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Last month, researchers at Proofpoint said that the use of legitimate tools, such as Cobalt Strike, had increased 161% from 2019 to 2020 and remains a high-volume threat in 2021.
Researchers warned organizations affected by the Kaseya ransomware attack should only get patches straight from their vendor.
“Links and/or attachments sent over your way, even from a trusted colleague, should be suspect until you have confirmed with your vendor of the availability of a patch and where or how to get it,” they added.
“Opportunists will show no mercy in targeting cyber attack victims multiple times as long as they get something out of it.”
Researchers added that with the use of Cobalt Strike, hackers intend to also gain access to already-compromised systems, possibly for further reconnaissance or to conduct a local, follow-up attack.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
How to implement a four-day week in tech
In-depth More companies are switching to a four-day week as they look to balance employee well-being with productivity
-
Intelligence sharing: The boost for businesses
In-depth Intelligence sharing with peers is essential if critical sectors are to be protected
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year
-
Everything we know about the Ingram Micro cyber attack so far
News A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group.
-
A prolific ransomware group says it’s shutting down and giving out free decryption keys to victims – but cyber experts warn it's not exactly a 'gesture of goodwill'
News The Hunters International ransomware group is rebranding and switching tactics
-
Swiss government data published following supply chain attack – here’s what we know about the culprits
News Radix, a non-profit organization in the health promotion sector, supplies a number of federal offices, whose data has apparently been accessed.
-
Ransomware victims are getting better at haggling with hackers
News While nearly half of companies paid a ransom to get their data back last year, victims are taking an increasingly hard line with hackers to strike fair deals.
-
LockBit data dump reveals a treasure trove of intel on the notorious hacker group
News An analysis of May's SQL database dump shows how much LockBit was really making
-
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
News An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs