SlideShare a Scribd company logo
1 of 5
Download to read offline
Kaseya
Ransomware
All You Need to Know About It
Kaseya Ransomware Attack
HISTORY
www.instasafe.com
Swipe to
know more
#ZEROTRUST
#ZEROTRUST
INSTASAFE
#ZEROTRUST
On 2nd July 2021, Kaseya, an US based software
provider offering IT management platform for
MSP was targeted by a Russian linked
ransomware group REvil.
They infected victims via an automatic software
update that delivered the ransomware which
encrypted the system’s content on that network
It created operational disruption for more than
2000 organizations and 50 MSPs that used its
product.
Understanding Kaseya Ransomware
Cyber Attack
#ZEROTRUST
www.instasafe.com
Kaseya Ransomware
Swipe to
know more
INSTASAFE
#ZEROTRUST
www.instasafe.com
Kaseya shut down the Virtual System
Administrator (VSA) SaaS platform to prevent
malware from being delivered to its customers.
Kaseya contacted the FBI and the CISA and
engaged 3rd party vendors including Huntress
and Sophos to help resolve this incident.
#ZEROTRUST
The attackers were able to exploit zero-day
vulnerabilities in the Kaseya VSA product to
bypass authentication and run arbitrary
command execution.
Understanding Kaseya Ransomware
Cyber Attack
Kaseya Ransomware
Swipe to
know more
#ZEROTRUST
www.instasafe.com
Back up your data regularly. Ransomware can
only work if you only have one copy of your data.
Backing up data can help to restore even if it
gets encrypted by ransomware
Implement Zero Trust solution for network
infrastructure. Zero Trust can avoid lateral
movement of attacks.
Test your vendor/ third party software for
vulnerabilities.
Simulate a ransomware attack periodically
Implement effective incident response with
clearly defined policies
#ZEROTRUST
Cybersecurity lessons to learn from
Kaseya Ransomware Cyber Attack
INSTASAFE
Kaseya Ransomware
Swipe to
know more
www.instasafe.com
blog.instasafe.com
Read More at:
#ZEROTRUST
We are InstaSafe.
InstaSafe empowers organisations in their digital transformation
journey, by enabling secure access of enterprise applications to users,
with enhanced security, seamless experience, and minimal risk.
Who are we?
As an industry pioneer in Zero Trust, human-centric solutions, we, at
InstaSafe have backed the belief that at the center of security for
businesses, lies the ability to enable workforces to unleash their
potential, irrespective of where they are. Which is why we help
organisations in fulfilling their goal of productivity on scale, by
simplifying the challenge of ACCESS.
With our hyperscalable and modular solutions, we aim to make the
cloud and remote journey for businesses and workforces, much
simpler, and much more secure
Kaseya Ransomware
Thanks for Reading

More Related Content

More from InstaSafe Technologies

Frequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust SolutionsFrequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust SolutionsInstaSafe Technologies
 
Total visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero TrustTotal visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero TrustInstaSafe Technologies
 
InstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNsInstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNsInstaSafe Technologies
 
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use casesInstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use casesInstaSafe Technologies
 
InstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutionsInstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutionsInstaSafe Technologies
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
InstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firmInstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firmInstaSafe Technologies
 
Copy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote WorkforcesCopy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote WorkforcesInstaSafe Technologies
 
Top 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber AttacksTop 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber AttacksInstaSafe Technologies
 
Zero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware MenaceZero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware MenaceInstaSafe Technologies
 
Why Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNsWhy Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNsInstaSafe Technologies
 
Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022InstaSafe Technologies
 
Top 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your CompanyTop 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your CompanyInstaSafe Technologies
 

More from InstaSafe Technologies (20)

Introduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero TrustIntroduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero Trust
 
Frequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust SolutionsFrequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust Solutions
 
Total visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero TrustTotal visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero Trust
 
InstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNsInstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNs
 
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use casesInstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
 
InstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutionsInstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutions
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Datasheet-Remote Access Use Case
Datasheet-Remote Access Use CaseDatasheet-Remote Access Use Case
Datasheet-Remote Access Use Case
 
InstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firmInstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firm
 
Copy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote WorkforcesCopy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote Workforces
 
Top 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber AttacksTop 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber Attacks
 
Kaseya Ransomware
Kaseya RansomwareKaseya Ransomware
Kaseya Ransomware
 
Cybersecurity Trends 2022
Cybersecurity Trends 2022 Cybersecurity Trends 2022
Cybersecurity Trends 2022
 
Zero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware MenaceZero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware Menace
 
Why Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNsWhy Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNs
 
Top 10 Cloud Security Risks
Top 10 Cloud Security RisksTop 10 Cloud Security Risks
Top 10 Cloud Security Risks
 
Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022
 
Top 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your CompanyTop 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your Company
 
SolarWinds Attack
SolarWinds AttackSolarWinds Attack
SolarWinds Attack
 
Key Steps in Zero Trust Journey
Key Steps in Zero Trust JourneyKey Steps in Zero Trust Journey
Key Steps in Zero Trust Journey
 

Kaseya Ransomeware Attack

  • 1. Kaseya Ransomware All You Need to Know About It Kaseya Ransomware Attack HISTORY www.instasafe.com Swipe to know more #ZEROTRUST #ZEROTRUST
  • 2. INSTASAFE #ZEROTRUST On 2nd July 2021, Kaseya, an US based software provider offering IT management platform for MSP was targeted by a Russian linked ransomware group REvil. They infected victims via an automatic software update that delivered the ransomware which encrypted the system’s content on that network It created operational disruption for more than 2000 organizations and 50 MSPs that used its product. Understanding Kaseya Ransomware Cyber Attack #ZEROTRUST www.instasafe.com Kaseya Ransomware Swipe to know more
  • 3. INSTASAFE #ZEROTRUST www.instasafe.com Kaseya shut down the Virtual System Administrator (VSA) SaaS platform to prevent malware from being delivered to its customers. Kaseya contacted the FBI and the CISA and engaged 3rd party vendors including Huntress and Sophos to help resolve this incident. #ZEROTRUST The attackers were able to exploit zero-day vulnerabilities in the Kaseya VSA product to bypass authentication and run arbitrary command execution. Understanding Kaseya Ransomware Cyber Attack Kaseya Ransomware Swipe to know more
  • 4. #ZEROTRUST www.instasafe.com Back up your data regularly. Ransomware can only work if you only have one copy of your data. Backing up data can help to restore even if it gets encrypted by ransomware Implement Zero Trust solution for network infrastructure. Zero Trust can avoid lateral movement of attacks. Test your vendor/ third party software for vulnerabilities. Simulate a ransomware attack periodically Implement effective incident response with clearly defined policies #ZEROTRUST Cybersecurity lessons to learn from Kaseya Ransomware Cyber Attack INSTASAFE Kaseya Ransomware Swipe to know more
  • 5. www.instasafe.com blog.instasafe.com Read More at: #ZEROTRUST We are InstaSafe. InstaSafe empowers organisations in their digital transformation journey, by enabling secure access of enterprise applications to users, with enhanced security, seamless experience, and minimal risk. Who are we? As an industry pioneer in Zero Trust, human-centric solutions, we, at InstaSafe have backed the belief that at the center of security for businesses, lies the ability to enable workforces to unleash their potential, irrespective of where they are. Which is why we help organisations in fulfilling their goal of productivity on scale, by simplifying the challenge of ACCESS. With our hyperscalable and modular solutions, we aim to make the cloud and remote journey for businesses and workforces, much simpler, and much more secure Kaseya Ransomware Thanks for Reading