On Friday, July 2, in the evening, the world was shaken by a massive ransomware attack targeting a remote server management application called the Kaseya Virtual Server Administrator, used for remote management of end user stations .
It is not uncommon that the major attack took place just before the Fourth of July holiday with a shorter workday, as ransomware attacks usually take advantage of the fact that late at night or just before the weekend there is fewer staff monitoring the security of information systems, and moreover, a malicious programme itself needs enough time to encrypt the files.
Currently, we know that about 50 companies in 17 countries around the world have been paralysed; they are direct users of Kaseya VSA, whereas many of them deal with the management of end user IT services. For this reason, the end users were also affected by the attack. 1,500 end users were attacked, and according to Kaseya CEO Fred Voccola, they mostly included small end users such as doctors’ surgeries, libraries, IT companies or various construction companies .
Among those affected were also larger end users such as Coop, one of Sweden’s largest supermarket store chains that had to shut down nearly 800 stores across the country after the attack crippled the cash register software supplier .
According to President Joe Biden, large American companies have not been much affected. In Europe, several large end user IT management companies have been attacked. In terms of end user victims, Germany reports more than 1,000 end users affected, and the Netherlands two major IT companies VelzArt and Hoppenbrouwer Techniek .
It is the largest single ransomware attack in history ever, as the REvil gang responsible for the crime demanded on its blog, shortly after the attack, a $70 million ransom in Bitcoin from Kaseya for providing a universal decryption key. From individual end users being attacked, the gang demanded ransoms of varying amounts of up to $5 million .
Later on July 5, a security researcher Jack Cable reported on Twitter that the attackers had lowered the price and the final amount of ransom at the time of releasing this article was $50 million .
After paying this astronomical amount the attackers promised to make a universal decryption key available for free downloading.
Due to the liquidation ransom imposed on Kaseya, some of the affected companies focused on individual negotiations with the attackers, while they do not disclose whether an agreement has been made and the ransom has been paid.
REvil gang aka Sodinokibi, who is behind the attack on Kaseya, is already a well-known notorious group. They are no newcomers on the underground scene, which is underlined by the fact that they have been famous for their sophisticated operations since 2018, providing “ransomware as a service”. According to Kaspersky researchers, this organized group had a net income of around 100 million dollars from their malicious operations last year .
The last known case reported by REvil were the attacks on meat-processor JBS Company, from which the gang extorted 11 million dollars .
Technical details and the course of the attack
Initial reports raised speculations that it could have been a supply chain attack similar to the one experienced in the SolarWinds Orion software case of December 2020, when the US attributed these malicious activities to the Russian intelligence service . These speculations of the supply chain attack were negated four days later , with the most likely scenario today that the attackers exploited multiple zero-day vulnerabilities directly of VSA on-premise software installations at Kaseya’s customers  .
Details of how the hackers learned of the vulnerabilities have not yet been publicly released. However, we know that the Dutch Institute for Vulnerability Disclosure (DIVD) reported vulnerabilities to Kaseya with assigned CVE-2021-30116 before the attack started. The DIVD report states that Kaseya put in the maximum effort to fix the vulnerability, nevertheless, they were beaten by the attackers .
The critical security vulnerability CVE-2021-30116 was caused by insufficient use of authentication mechanisms. According to security researchers at Huntress Labs, attackers apparently exploited SQL injection to gain access, and in combination with bypassing the authentication mechanisms and remote file uploading on the server, the systems were compromised. This was also confirmed by experts from TruSec  .
According to Kaspersky researchers, the exploit worked by deploying a malicious dropper via a PowerShell script. This script disables Microsoft Defender functions and then uses the certutil.exe utility to decode a malicious executable file (agent.exe) that downloads an older version of Microsoft Defender along with the REvil ransomware packed in a malicious library.
This library is then loaded by the legitimate tool MsMpEng.exe by utilizing the DLL side-loading technique.
The Salsa20 stream cipher, of Professor Daniel Bernstein of the University of Illinoa at Chicago, was used to encrypt the files. The security of stream ciphers depends on the method of generating encryption keys, while for the used Salsa20, the key was generated by an asymmetric algorithm based on elliptical curves .
The right way to generate the encryption key will ensure that the cipher becomes virtually indecipherable in real time, provided that the attackers have not made a mistake and have not left additional data written in the memory of the compromised system. For those interested in the issue of stream ciphers, it is recommended to see the chapter of stream ciphers in the textbook by William Stallings . For technical details of the Salsa20 cipher, it is recommended to visit the following website http://www.crypto-it.net/eng/symmetric/salsa20.html.
Current state of the investigation
Kaseya CEO Fred Voccola has not specified at which stage the negotiations with a criminal group can currently be found. Based on experience with similar cases such as the Darkside group, the payment of a ransom and subsequent attempts to track down the perpetrators cannot be excluded. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are also involved in this case .
The number of other possible victims was reduced relatively quickly, as according to Palo Alto Networks, the number of publicly available vulnerable Kaseya VSAs dropped from 1,500 to less than 60, already 6 days after the attack, indicating a good cooperation of several CSIRTs with Kaseya .
Even a few days after the attack, several other threat actors have been trying to capitalize on the chaos triggered by REvil .
Other actors involved
Malwarebytes Threat Intelligence security researchers warn against a malicious phishing campaign disguised as Microsoft, in which, by clicking on the link, the SecurityUpdates.exe file is supposed to be downloaded by the user. However, once launched, the security update will not be installed, but the Cobalt Strike payloads will be downloaded, allowing the attacker to gain a remote access to the victim’s computer.
This campaign targets VSA Detection Tools, officially released by Kaseya, used to verify the system if it contains indicators of compromise .
This free riding is a phenomenon also known from the attacks on Colonial Pipeline when in June 2021, the ransomware attack was accompanied by a phishing campaign aimed at placing the Cobalt Strike penetration tool in order to compromise the victim’s systems.
Security researchers from Cisco Talos Incident Response (CTIR) report that up to 66 % of ransomware attacks in the last quarter of 2020 were accompanied by a phishing campaign .
Kaseya VSA is provided in both cloud and on-premise versions. Immediately, after receiving reports from victims, the cloud version was shut down and the situation was treated separately with individual on-premise customers. According to Kasey, no customers of the cloud solution were among the victims.
Kaseya has taken a very uncompromising approach to incident handling, placing the Kaseya VSA cloud version under Cloudflare protection along with the FireEye software and security supervision. These steps have also been admirably taken in case of on-premise customers .
In principle, there are only three possible defensive strategies against ransomware attacks. The first one is to keep your system and software in the latest versions and regularly monitor the manufacturers’ sites. The second one is to minimize the attack surface by removing unused applications and outdated machines.
The third strategy and at the same time a necessary measure covering a wide range of risks are backups of all data in a way that will not allow their deletion from the infected workstation. The best solution for prudent users is the existence of offline backups.
Administrators and users are encouraged to use VSA Detection Tools to detect the presence of IoC available at:
It is also recommended that administrators enable two-factor authentication wherever possible.
Administrators are advised to update affected systems to version 9.5.7a  without delay.
Indicators of Compromise 
File Hashes (SHA 256)
agent.crt – 2093c195b6c1fd6ab9e1110c13096c5fe130b75a84a27748007ae52d9e951643
agent.exe – d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
mpsvc.dll – e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2
mpsvc.dll – 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd
MpsVc.dll – d8353cfc5e696d3ae402c7c70565c1e7f31e49bcf74a6e12e5ab044f306b4b20
MpsVc – d5ce6f36a06b0dc8ce8e7e2c9a53e66094c2adfc93cfac61dd09efe9ac45a75f
mpsvc.dll – cc0cdc6a3d843e22c98170713abf1d6ae06e8b5e34ed06ac3159adafe85e3bd6
MpsVc_.dll – 0496ca57e387b10dfdac809de8a4e039f68e8d66535d5d19ec76d39f7d0a4402
srnmp.exe – 1fe9b489c25bb23b04d9996e8107671edee69bd6f6def2fe7ece38a0fb35f98e
svchost.exe – 66490c59cb9630b53fa3fa7125b5c9511afde38edab4459065938c1974229ca8
Updater.exe – dc6b0e8c1e9c113f0364e1c8370060dee3fcbe25b667ddeca7623a95cd21411f
p.exe.TXT – aae6e388e774180bc3eb96dad5d5bfefd63d0eb7124d68b6991701936801f1c7
« Späť na zoznam