The IGI Cybersecurity Team has been closely watching and analyzing the REvil 0-Day Attack (aka Sodinokibi) that occurred to Kaseya’s VSA software, and has some insight on how it can affect those businesses that use their products.
IT solutions developer, Kaseya, announced that it had become the victim of a cyberattack last Saturday, July 2. The notorious Russia-linked REvil cybercrime gang leveraged a SQLi vulnerability and used it to deploy and inject ransomware to those customers who subscribe to the SaaS solution.
The cloud-based IT management and remote monitoring solution for Managed Service Providers (MSPs) uses two-factor authentication, but the cybercriminals exploited an authentication bypass, allowing for an arbitrary file upload and code injection vulnerabilities to gain access to these servers. When this was first announced, one thing was immediately clear: the impact to businesses can be widespread if not contained quickly.
As an experienced security professional who has provided services for clients around the Sodinokibi ransomware, I know that the threat actors are methodical in their attack approach. They typically compromise systems remaining covert inside the environments for many months, creating back doors, navigating throughout the network doing recon work, and compromising privileged accounts to lay “sleeper cell” scripts before launching or being detected. Their focus is to control as many assets as they can, if possible to pivot to any other connected networks, so they have the greatest leverage over how long they can delay or prevent recovery for businesses and garner effortless submission from their victims for the ransom.
First, let's identify any possible indicators of compromise.
Here is what we know from Kaseya:
In Technical Detail
Additional Precautions
Cybercriminals have already started taking advantage of this opportunity to leverage the vulnerability to the next level. Phishing campaigns are launching spam emails designed to exploit new victims.
Malspam is a malicious email that contains an attached infected file or a link for users to connect systems to the infected file. It is generally disguised as an imitation link, which, in this situation, led to the Kaseya site and masked as a fix for the Microsoft patch involved in the Kaseya attacks. The link redirects users to servers at 45.15.23.24:1113 and downloads and executes the ploadex.exe where the malicious file exists.
Additionally, Kaseya is alerting its customers of an ongoing phishing campaign that seeks to breach their networks by sending spam emails containing malicious attachments with links posing as legitimate Kaseya security updates. Do not click on links to download attachments purporting to be from the company's "consultants." Fake Kaseya emails with the subject "Our Shipping Renewal" (different) prompts recipients to install updates from Microsoft.
If you think you have been compromised, you'll want to work with cybersecurity professionals like IGI on an Incident Response Plan. In addition, you'll want to take these immediate actions:
Should you have any questions about next steps, please contact the IGI Incident Response team for support.