Mass ransomware attack used flaw in IT management software

cybercrime hacker 2156 1120 - Mass ransomware attack used flaw in IT management softwareThe hackers behind a mass ransomware attack exploited a previously unknown vulnerability in IT management software made by Kaseya, the latest sign of the skill and aggressiveness of the Russia-linked group believed to be responsible for the incidents, cybersecurity researchers said on Sunday.

Marcus Murray, founder of Stockholm-based TrueSec, said his firm’s investigations involving multiple victims in Sweden found that the hackers targeted them opportunistically. In those cases, the hackers used a previously unknown flaw in Miami-based Kaseya’s code to push ransomware to servers that used the software and were connected to the Internet, he said.

Now read: Hackers demand R1-billion after mass extortion attack

The Dutch Institute for Vulnerability Disclosure said it had alerted Kaseya to a vulnerability in its software that was then used in the attacks, and that it was working with the company on fixes when the ransomware was deployed.

Kaseya “showed a genuine commitment to do the right thing”, the Dutch organisation wrote. “Unfortunately, we were beaten by REvil in the final sprint, as they could exploit the vulnerabilities before customers could even patch,” it added, referring to the Russia-based hacking group.

REvil was accused of being behind the 30 May ransomware attack of meatpacking giant JBS.

‘Sophisticated’

The findings differentiate the latest incident — which cybersecurity firm Huntress Labs said affected more than a thousand businesses — from other recent assaults on the software supply chain. For instance, an attack the US blamed on Russia’s foreign intelligence service, disclosed in December, involved altered software updates from another provider of IT management software, Austin, Texas-based SolarWinds. Ultimately, nine federal agencies and at least 100 companies were infiltrated via SolarWinds and other methods.

Europe’s GDPR is broken, departing privacy chief warns
🎴Also Read ▶️

A representative for Kaseya didn’t immediately respond to a request for comment on the latest findings. The company has previously said its VSA product was the victim of a “sophisticated cyberattack” and that it had notified the FBI. Kaseya said it has identified fewer than 40 customers impacted by the attack. The company added that its cloud-based services weren’t impacted.

The US Cybersecurity and Infrastructure Security Agency also said it was continuing to respond to the recent attack, which it said leveraged a “vulnerability in Kaseya VSA software against multiple managed service providers (MSPs) and their customers”.

hacker 2156 1120 - Mass ransomware attack used flaw in IT management softwareKaseya’s customers include companies that provide remote IT support and cybersecurity services for small and medium-sized businesses.

In the latest attack, the hackers had to target machines individually. That’s not complicated. Hackers and security researchers have access to many of the same basic tools for scanning the Internet looking for computers that are vulnerable to attack. But by infecting IT support organisations, the malicious software was passed to their customers as well, multiplying the impact.

One of the known victims — Swedish grocery chain Coop — said on Saturday that most of its more than 800 stores couldn’t open because the attack led to a shutdown of their payment terminals. Others include managed service providers, which provide IT services to other businesses, meaning their infections may have spread to their customers.

Murray, of Sweden’s TrueSec, declined to identify any of his firm’s clients. He said because of Kaseya’s central role in managing security and IT that victims could have longer recovery times than in typical ransomware incidents.

“The tool these organisations are using normally for patching and IT support and recovery is Kaseya,” he said. “It’s a big undertaking when someone takes away all your ability to do the maintenance.”

Pentagon scraps $10-billion Microsoft cloud contract
🎴Also Read ▶️

‘Out of the equation’

“From a criminal standpoint it’s a brilliant supply-chain target to take away the tool that’s needed to recover from the threat,” Murray added. “They’re not only encrypting the systems but they’re also taking the recovery tool out of the equation.”

Ross McKerchar, vice president and chief information security officer at the cybersecurity firm Sophos, said the hack was “one of the farthest reaching criminal ransomware attacks Sophos has ever seen”.

“At this time, our evidence shows that more than 70 managed service providers were impacted, resulting in more than 350 further impacted organisations,” he said, in a statement. “We expect the full scope of victim organisations to be higher than what’s being reported by any individual security company.”

ransomware hacker attack 2156 1120 - Mass ransomware attack used flaw in IT management softwareThere are victims in 17 countries so far, including the UK, South Africa, Canada, Argentina, Mexico and Spain, according to Aryeh Goretsky, a researcher at cybersecurity firm ESET.

US President Joe Biden said Saturday that he had ordered ordered a “deep dive” from the intelligence community about the incident, which came just weeks after Biden implored Russian President Vladimir Putin at a summit on 16 June to curb cyberattacks against the US. Biden said “we’re not sure” that Russia is behind the attack. The president said he expects to know more about the attacks on Sunday.

“The initial thinking was, it was not the Russia government, but we’re not sure yet,” he said.  — Reported by Jordan Robertson and William Turton, (c) 2021 Bloomberg LP

Now read: Hackers demand R1-billion after mass extortion attack

Comments

comments

Be the first to comment

Leave a Reply

Your email address will not be published.


*