Kaseya Breach Underscores Vulnerability of IT Management Tools

Managed service providers (MSPs) have long relied on third-party software to manage clients’ IT infrastructure, but a massive ransomware attack launched over the weekend at customers of Kaseya will likely cause MSPs to take a harder look at the security of their IT suppliers. Kaseya revealed late Friday night that a zero-day vulnerability in its […]

Written By: Sam Ingalls
Jul 7, 2021
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Managed service providers (MSPs) have long relied on third-party software to manage clients’ IT infrastructure, but a massive ransomware attack launched over the weekend at customers of Kaseya will likely cause MSPs to take a harder look at the security of their IT suppliers.

Kaseya revealed late Friday night that a zero-day vulnerability in its VSA on-premises servers resulted in 60 clients being directly compromised, impacting a pool of 1,500 downstream businesses. After a series of highly publicized ransomware attacks this spring, the Kaseya attack most resembles the compromise of SolarWinds in late 2020.

Like SolarWinds, both companies serve large B2B audiences, where Kaseya’s products produce hundreds of end products and services. And therein lies why third-party and supply chain attacks are so daunting. Instead of targeting a single company, threat actors attacking broadly used IT tools like Kaseya or SolarWinds can infiltrate an umbrella of companies. Kaseya’s access to a network of SMB IT vendors and managed service providers (MSP) is a dangerous prospect in malicious hands.

The question now is – how can organizations trust third-party software?

As industry analysts consider the next zero-day threats and the implications of more ransomware and supply chain attacks, we look at the attacks and what organizations can do to defend themselves against advancing threats.

VSA server breached

Kaseya’s flagship product is a remote monitoring and management (RMM) solution called the Virtual Systems Administrator (VSA) and is the product at the center of the current attack. When administrators noticed suspicious behavior on Friday, Kaseya shut down VSA.

Kaseya’s on-premises VSA server is a powerful machine designed for MSPs and IT vendors serving a remote network of their clients. Through a software update to Kaseya VSA, the threat actors deployed a zero-day vulnerability and from there could access network segments connected to VSA servers.

Kaspersky researchers detailed the attack techniques and noted they had seen more than 5,000 attack attempts in 22 countries. Kaspersky recommended a number of defensive steps, among them:

  • Not exposing remote desktop services (such as RDP) to public networks unless absolutely necessary and always using strong passwords for them
  • Promptly installing available patches for commercial VPN solutions providing access for remote employees and acting as gateways in your network
  • Always keeping software updated on all the devices you use to prevent ransomware from exploiting vulnerabilities
  • Focusing your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to the outgoing traffic to detect cybercriminals’ connections. Backup data regularly. Make sure you can quickly access it in an emergency when needed.

REvil attracted media attention last month for its ransomware attack against meat-processing company JBS Foods. The Ransomware-as-a-Service (RaaS) gang infiltrated Kaseya’s server, moved to client networks, and executed ransomware encryption to lock end-client networks. Kaseya is updating clients on developments at this link.

High-profile attacks on the rise

Establishing Standards for Secure Systems

Working concepts like verified reproducible builds and software bill of materials (SBOM) are valuable additions to the conversation while the IT marketplace remains relatively unregulated. The chaotic nature of software development and build pipelines must change, but for now, that change starts with businesses demanding greater transparency before signing contract terms.

Though these are promising concepts, analysts noted having a SBOM here wouldn’t have made a difference for the Kaseya breach. A reliance on built-in trust between systems and excessive user privileges is a risk that a list of ingredients can’t fix.

Read more about reproducible builds, SBOMs, and certificate forgery in our comprehensive look at the SolarWinds hack tactics.

Preparing for Criminal Enterprise

REvil is representative of a business-oriented movement of black hatters. While other Ransomware-as-a-Service (RaaS) and zero-day threat offerings are declining, Sophos Labs reports REvil is taking the mantle. Some threat groups promote a moral code of conduct, but there’s little evidence to prove actors are held accountable for misuse like targeting critical infrastructure, nonprofit, and public organizations.

Managing supply chain risk

For the time being, managing supply chain risk means meticulous attention to detail, supply chain relationships based on trust and transparency, and having a breach mindset. Mastering software inventory details gives network administrators visibility into organization systems, applications, and traffic flows.

Read about our picks for the top breach and attack simulation (BAS) vendors of 2021.

The breach mindset

As attacks continue, the security wisdom to organizations is to visualize and imagine the subsequent breaches. If a network segment like the organization’s CRM application becomes compromised, what will the impact be? Specifically, what does access between network segments look like for internal clients?

Deploying zero trust security

A resounding security industry answer to today’s advanced threats is zero trust. As the network perimeter proves too tricky to guard, there’s no question that determined intruders can gain access.

For this quandary, network administrators need a solution that understands system relationships and prohibits anomalous behavior. For MSP clients, they expect their managed service provider to offer solutions fit for their network’s needs.

Raghu Nandakumara, Illumio’s EMEA and APAC Field CTO, told eSecurity Planet:

“When ransomware is distributed via authorized management channels, it is indeed difficult to stop it from spreading – and detection and response must focus efforts on the target endpoints. zero trust approaches to security put emphasis on visibility of all actions, and the ability to identify expected and normal actions compared to unexpected and abnormal activity. As we see a maturity in zero trust adoption, we will see both improved granularity in controls, coupled with more sophisticated detection of unauthorized actions, that will improve the ability to identify malicious behavior and limit its impact.”

The ability to understand expected movements and to respond when the unexpected occurs is the domain of security tools like zero trust and UEBA.

Interested in learning more about zero trust? Read our Guides to Implementing Zero Trust and Implementing Microsegmentation.

Kaseya provides security tools

Kaseya, meanwhile, has released a number of security tools it said will greatly reduce the attack surface of Kaseya VSA:

  • A 24/7 independent security operations center (SOC) for every VSA, with the ability to quarantine and isolate files and entire VSA servers
  • A complementary content delivery network (CDN) with web application firewall (WAF) for every VSA (including on-premises opt-in)
  • Customers who whitelist IPs will be required to whitelist additional IPs
thumbnail Sam Ingalls

Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.

Recommended for you...

SQL Injection Prevention: 6 Ways to Protect Your Stack

SQL injection is a code injection technique that can expose your data. Learn 5 proven tactics to prevent attacks and secure your applications.

Matt Gonzales
Jul 9, 2025
Microsoft Defender vs Bitdefender: Compare Antivirus Software

Compare Microsoft Defender and Bitdefender antivirus software. We rate malware detection, pricing plans, privacy features, and more.

Jenna Phipps
May 27, 2025
Bitwarden vs Dashlane: Comparing Password Managers

Password managers store and encrypt passwords, making it easy to create, manage, and auto-fill credentials across devices. Compare Bitwarden vs. Dashlane here.

Jenna Phipps
May 14, 2025
What Is Malware? Definition, Examples, and More

Learn what malware is, its various types, and how it can affect your devices. Explore real-world examples and essential tips for protection.

Davin Jackson
Feb 10, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.