{"id":37740,"date":"2021-07-20T14:18:42","date_gmt":"2021-07-20T06:18:42","guid":{"rendered":"https:\/\/version-2.com\/?p=37740"},"modified":"2022-03-07T12:10:45","modified_gmt":"2022-03-07T04:10:45","slug":"kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/07\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\/","title":{"rendered":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"37740\" class=\"elementor elementor-37740\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n<p>\nJust as the security community was recovering from the\u00a0SolarWinds supply-chain attack, over July 4th holiday weekend\u00a0<a href=\"https:\/\/www.wsj.com\/articles\/technology-provider-kaseya-warns-of-cyberattack-11625266350\">Kaseya IT management software,<\/a>\u00a0commonly implemented by Managed Service Providers (MSPs) fell victim to a series of supply-chain attacks.<\/p>\n<h2>Kaseya is the Focus of New Supply Chain Ransomware Attack<\/h2>\n<p>According to a report from\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-hits-200-companies-in-msp-supply-chain-attack\/\"><em>Bleeping Computer<\/em><\/a>, on July 2, 2021, the REvil ransomware gang was actively targeting managed services providers (MSPs) and its customers via a Kaseya VSA supply-chain attack to deploy ransomware on enterprise networks. Kaseya is a popular software developed for Managed Service Providers that provide remote IT support and cybersecurity services for small- to medium-sized businesses that often cannot afford to hire full-time IT employees, due to their limited size or budgets.<\/p>\n<p>Hundreds of worldwide businesses, including Coop supermarkets in Sweden,\u00a0<a href=\"https:\/\/www.bbc.com\/news\/technology-57707530\">confirmed to the BBC<\/a>\u00a0they have been impacted by the Kaseya attack, although they are not customers of Kaseya, and have shut down hundreds of stores in Sweden since yesterday evening. This is because they have lost their Point of Sale facilities, which are managed by a company that is a Kaseya customer.<\/p>\n<p align=\"center\">\n<img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/X5HSQ-93hmW20725Bnx1v9vlYGwvAHti34Sc_Mc13KQNFWYaDUjOan6QVYdi4Jx3ytPgDJHyoKCITLR6CwDoegFURWCnRtpjh-IEfYjAmMDLtI5ZsiZ4AaMItIG9OWbSSHTF1p8f\" width=\"624\" height=\"471\" \/><\/p>\n<p><em>Figure 1. What the infected systems look like<\/em><\/p>\n\n<p>The attackers initially gained access by using a zero-day vulnerability in Kaseya VSA via a malicious automatic update to the software which eventually would deliver the ransomware. Once active in the IT environments, the ransomware would encrypt the different contents of the systems on the network. This would cause widespread operational disruption to any organization that uses this software.\u00a0 Even if the latest version of Kaseya VSA was implemented at the time of the attack, the cyber criminals could remotely execute commands on the VSA appliance.<\/p>\n\n<h2>How the Ransomware is delivered<\/h2>\n<p>\nAs per the\u00a0<a href=\"https:\/\/doublepulsar.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-us-companies-76e4ec6ec64b\">DoublePulsar Blog Post<\/a>\u00a0on the Kaseya attack: \u201cDelivery of ransomware is via an automated, fake, software update using Kaseya VSA.<\/p>\n<p>The attacker immediately stops administrator access to the VSA, and then adds a task called \u201cKaseya VSA Agent Hot-fix\u201d.<\/p>\n<p>This fake update is then deployed across the estate \u2014 including on MSP client customers\u2019 systems \u2014 as it\u2019s fake management agent update.<\/p>\n<p>This management agent update is actually REvil ransomware.<\/p>\n<p>To be clear, this means organizations that are not Kaseya\u2019s customers were still encrypted.<\/p>\n<h2>The Following Command is Run:<\/h2>\n<p>powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend<\/p>\n<p><em>What this does:<\/em><\/p>\n<ul>\n\t<li>Disables Real Time Monitoring<\/li>\n\t<li>Disables IPS<\/li>\n\t<li>Disables Cloud Lookup<\/li>\n\t<li>Disables script scanning<\/li>\n\t<li>Disabled Controlled Folder Access (ransomware prevention feature)<\/li>\n\t<li>Disables Network Protection<\/li>\n\t<li>Stops cloud sample submission<\/li>\n<\/ul>\n<p>\nThroughout their attack, the cybercriminals shut off administrative access to VSA, and several protections within Microsoft Defender were disabled, including Real-Time Monitoring, Script Scanning, and Controlled Folder Access. Kaseya and the US Cybersecurity and Infrastructure Company have both\u00a0<a href=\"https:\/\/helpdesk.kaseya.com\/hc\/en-gb\/articles\/4403440684689\">advised clients functioning the VSA software<\/a>\u00a0on their servers to shut those servers down as soon as possible.<\/p>\n<p align=\"center\">\n<img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/2DpZR1YSUHm3Y0PRsIQzBOg-VS_QFdqAjlBaJfiIryWZwiw85nCPJXQ1fKMBGwt9ujUxb4wGXgh1Jp0FJtZGN8k61FzLHpCZJX3doDMlhYEs5Ayvz_wY_OPYuwYxXs2194bfSxOo\" width=\"624\" height=\"537\" \/><\/p>\n<p>\n<em>Figure 2. The Ransom Note<\/em><\/p>\n\n<h2>How MSPs Can Open The Door For Attackers<\/h2>\n<p>\nLarge organizations that often have a budget for IT and security can easily adopt a robust security strategy to prevent cyber attacks. Smaller organizations or companies that are not security-minded\u00a0will tend to turn to MSPs\u00a0to provide them with IT and security services. In order for MSPs to provide their services, they are given remote and administrator access to their client\u2019s networks and environments. The different remote access and credentials that are provided to MSPs are extremely attractive for cyber criminals.<\/p>\n<p align=\"center\">\n<img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/UQh33O-n-jUO9jtRQZOLcWFUvHNOh_fx3803xv_SV1dbalA00y3SWbfqa86oDQNZtZCGWqz6_wnLfaCix-kll6MrLBYx_uJvBwX8oXCk2Ke4MqrfQ04avIILfz7xw6nvUTkZv63L\" width=\"624\" height=\"327\" \/>\n<\/p>\n<p>\n<em>Figure 3. The Anatomy of an MSP Cyberattack\u00a0<\/em><\/p>\n<p>\n\nGiven the large number of clients that each MSP is working with, a successful cyber attack could be very profitable and attractive for a cyber criminal. Once the attacker has exploited the MSP system they could easily move laterally across MSP client\u2019s systems and environments. In short, by attacking and successfully exploiting an MSP, cyber criminals have the opportunity to quickly gain access to all their client\u2019s networks, systems and data without being noticed.<\/p>\n<p>\n\nWhile the typical MSPs is a security expert when it comes to securing their clients\u2019 networks and ensuring they are well protected, they also need to ensure their own system is secure from cyber criminals. Security patches must be applied in a timely order, vulnerabilities must be mitigated as quickly as possible and they need to adopt\u00a0security solutions\u00a0<\/a>for any kind of attack to ensure that their system is protected.\n<\/p>\n<p>\nIn general, customers should set more control limits to their MSPs. For example, endpoints that do not need remote monitoring and management, should not have an agent installed on them. This reduces the risk in such attacks, and less devices will be affected.\n<\/p>\n<h2>It\u2019s A Busy Summer Ahead<\/h2>\n<p>\nOver the past few months, there has been a major increase in the number of successful ransomware attacks. The\u00a0Colonial Pipeline attack\u00a0and the REvil attack of\u00a0meat processor JBS\u00a0resulted in millions of dollars in operational and mitigation loss. While these attacks are just two examples of successful ransomware, we expect cyber criminals to continue to exploit the different products and services that we use on a daily basis.\n<\/p>\n<p>\nWith each attack becoming more sophisticated and successfully exploiting well-known organizations, it has caught the attention of the U.S. government. On May 12th, United States President Joe Biden signed an executive order (EO) to improve the cybersecurity of the United States and the private sectors. This executive order seeks to increase its efforts in detecting and responding to different attacks and threat actors in the cyber espionage landscape.\n<\/p>\n<p>\nAdditionally, the US government plans to play a significant role when it comes to incident responding to ensure better security guidelines in the private sector. For example, in the case of the Kaseya attack, U.S. President Joe Biden has ordered federal intelligence agencies to investigate the supply chain attack.\u00a0<a href=\"https:\/\/www.reuters.com\/article\/uk-usa-cyber-kaseya-idUKKCN2E90NJ\">In a statement<\/a>\u00a0on Saturday, the U.S. Cybersecurity and Infrastructure Security Agency said it was &#8220;taking action to understand and address the recent supply-chain ransomware attack&#8221; against Kaseya&#8217;s VSA product.\n<\/p>\n<h2>Be Prepared &#8211; Not For \u201cIf\u201d But \u201cWhen\u201d<\/h2>\n<p>\nWhile the Kaseya attack so far hasn\u2019t affected OT systems, it has brought up the subject of organizations needing improved security strategies. Cyber criminals are becoming more sophisticated when targeting different organizations. As long as the security hygiene of an organization or its third-party vendors isn&#8217;t up to par, cyber criminals will increase the number of attacks to exploit organizations&#8217; vulnerabilities to truly hurt their victims.\n<\/p>\n<p>\nTo be prepared for incoming cyberattacks, organizations need to think like cyber criminals and implement a more concrete security strategy with the proper security solutions for any kind of attack. Instead of checking the box in their security checklist, organizations should test their systems and networks to see where they are vulnerable. More importantly, security teams need to change their security mindset from \u201cif we will be attacked\u201d to \u201cwhen and how we will be attacked\u201d, and prepare accordingly.\n<\/p>\n<p>\nThe huge difference between the secure and the exploited is how effectively their organization handled a potential cyber attack. By being prepared with basic security practices in place, it will allow security teams to prevent potential attacks from being successful.\n<\/p>\n<p>\nWe recommend organizations increase their visibility into their entire network as it\u2019s difficult to protect what you can not see. Additional recommended practices\u00a0are to adopt security network monitoring solutions that provide network segmentation and micro-segmentation as this will help organizations prevent similar ransomware attacks moving forward.\n<\/p>\n<p>\nIf your organization is looking into\u00a0securing its industrial networks, the experts at\u00a0SCADAfence\u00a0are seasoned veterans in this space and can show you how it\u2019s done.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5987d9c elementor-widget elementor-widget-shortcode\" data-id=\"5987d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18130\" class=\"elementor elementor-18130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About SCADAfence<\/strong><br \/>SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT\/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world\u2019s most complex OT networks, including Europe\u2019s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Just as the security community was recovering from the\u00a0 [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[417,461,61],"tags":[418,462],"class_list":["post-37740","post","type-post","status-publish","format-standard","hentry","category-scadafence","category-year2021","category-press-release","tag-scadafence","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2\" \/>\n<meta property=\"og:description\" content=\"Just as the security community was recovering from the\u00a0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T06:18:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T04:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs\",\"datePublished\":\"2021-07-20T06:18:42+00:00\",\"dateModified\":\"2022-03-07T04:10:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\\\/\"},\"wordCount\":1281,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\",\"keywords\":[\"SCADAfence\",\"2021\"],\"articleSection\":[\"SCADAfence\",\"2021\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/07\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\",\"name\":\"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\",\"datePublished\":\"2021-07-20T06:18:42+00:00\",\"dateModified\":\"2022-03-07T04:10:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\",\"contentUrl\":\"https:\\\/\\\/blog.scadafence.com\\\/hubfs\\\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps","og_locale":"zh_HK","og_type":"article","og_title":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2","og_description":"Just as the security community was recovering from the\u00a0 [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps","og_site_name":"Version 2","article_published_time":"2021-07-20T06:18:42+00:00","article_modified_time":"2022-03-07T04:10:45+00:00","og_image":[{"url":"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs","datePublished":"2021-07-20T06:18:42+00:00","dateModified":"2022-03-07T04:10:45+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/07\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\/"},"wordCount":1281,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png","keywords":["SCADAfence","2021"],"articleSection":["SCADAfence","2021","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/07\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps\/","url":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps","name":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage"},"thumbnailUrl":"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png","datePublished":"2021-07-20T06:18:42+00:00","dateModified":"2022-03-07T04:10:45+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#primaryimage","url":"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png","contentUrl":"https:\/\/blog.scadafence.com\/hubfs\/SCADAfence_Kaseya_Cyberattack_Ransomware_blog.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/kaseya-supply-chain-attack-delivers-mass-ransomware-event-to-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Kaseya Supply Chain Attack Delivers Mass Ransomware Event to MSPs"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-9OI","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=37740"}],"version-history":[{"count":12,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37740\/revisions"}],"predecessor-version":[{"id":44093,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/37740\/revisions\/44093"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=37740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=37740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=37740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}