Up to 1,500 organizations compromised in Kaseya ransomware attack
The White House has urged potential victims of the attack to report their security concerns to the Internet Crime Complaint Center
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Around 1,500 businesses have been affected by the recent ransomware attack on customers of Kaseya’s VSA software, according to the firm.
In a statement, Kaseya said that approximately 50 of its 35,000 customers had been affected by the supply-chain attack on 2 July.
The company said that once the attack was established, law enforcement and government cybersecurity agencies, including the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA), were notified and immediately engaged.
“Soon after the attack, with the assistance from the FBI and CISA, the root cause of the attack was identified,” the company said.
Kaseya added that while the attack affected only 50 of its customers, many of those are managed service providers, using Kaseya’s technology to manage IT infrastructure for local and small businesses with less than 30 employees, such as dentists’ offices, small accounting offices, and local restaurants.
Of the approximately 800,000 to 1,000,000 local and small businesses that are managed by Kaseya’s customers, only about 800 to 1,500 have been compromised.
“Our global teams are working around the clock to get our customers back up and running,” said Fred Voccola, CEO of Kaseya. “We understand that every second they are shut down, it impacts their livelihood, which is why we’re working feverishly to get this resolved.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
The secure cloud configuration imperative
The central role of cloud security posture management
The White House has urged potential victims of the attack to report their security concerns to the Internet Crime Complaint Center.
"Since Friday, the United States Government has been working across the interagency to assess the Kaseya ransomware incident and assist in the response," said Anne Neuberger, deputy national security advisor for cyber and emerging technology in a statement.
"The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have been working with Kaseya and coordinating to conduct outreach to impacted victims.
Busra Demir, a senior solutions architect at HackerOne, told IT Pro that the news that Kaseya was working with researchers on the 0-day fix shows how much it came down to a race against the clock.
“Coordinated vulnerability disclosure helps organizations understand what weaknesses they have but it all hinges on how fast those vulnerabilities can be fixed. It’s no surprise that so many organizations measure the success of their security testing programs on how fast they can fix the vulnerabilities that surfaced,” she said.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Organizations hit by 90 zero-day vulnerabilities last yearNews Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points
-
Major data leak forum taken downNews LeakBase enabled the sale and purchase of a huge amount of personal data and had more than 142,000 members
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
