![]() ![]() We have begun the process of remediating the code and will include regular status updates on our progress starting tomorrow morning. R&D has replicated the attack vector and is working on mitigating it. ![]() Huntress Security Researcher Caleb Stewart has successfully reproduced attack and released a POC video demonstrating the chain of exploits. All of these VSA servers are on-premises and we have confirmed that cybercriminals have exploited an authentication bypass, an arbitrary file upload and code injection vulnerabilities to gain access to these servers. We are tracking over 30 MSPs across the US, AUS, EU, and LATAM where Kaseya VSA was used to encrypt well over 1,000 businesses and are working in collaboration with many of them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |