The flurry of ramsomware attacks starting Friday, targeting on-premises Kaseya VSA applications are particularly frightening to managed service providers, because they strike at software at the center of the enterprise: the remote monitoring and management (RMM) platform.
In any other case, an RMM would be central to the recovery to an attack. They can be irreplaceable components of incident response plans.
"The thing I think a lot of people are missing here is that these MSPs are using these systems to do the remote administration. It's the one way that they have to go manage the system. They don't have a fallback. There's no contingency plan for them," said Jake Williams, chief technology officer of Rendition Infosec and the incident response firm BreachQuest.
The scope of the ransomware outbreak leveraging Kaseya VSA remains fluid, but the number of customers impacted could be significant. VSA is popular — Williams called it "the Coca-Cola" of RMM — so the potential exposure is fairly wide. They said, Kaseya quickly told on-premises customers to shut servers down, limiting some exposure. While Kayesa said Friday that it believed under 40 MSPs had been infected, a single security vendor, Huntress Labs, said it was aware of more than 20 cases of infection. Thousands of clients to those MSPs were exposed, with Huntress reporting ransom demands as high as $5 million.
Danny Jenkins, CEO of the MSP zero-trust solution ThreatLocker, said security software flagged the files associated with the attack appeared in "30 to 40 percent" of clients running Kaseya VSA on-premises.
VSA is not the first IT management software to be used in a ransomware attack, nor is it the first supply chain hack to have downstream effects. SolarWinds would be an example of both.
Read more: Kaseya VSA criminals may have ‘weaponized’ links in ransom negotiations
"it's happened over and over again," said Jenkins. "I spoke to one MSP who just three weeks ago were in contract with Kaseya, because they just left a different vendor, because they had been compromised through them."
While the recent spate of supply chain and IT management software attacks are worrying trends in and of themselves, said James Shank, chief architect of community services for Team Cymru, and the lead of the "Worst Case Scenario's" discussion group at the recent multistakeholder Ransomware Task Force, the centrality of RMM software makes VSA a unique case.
"RMM is the lifeblood of these businesses," agreed Jenkins. "So Kaseya saying turn off VSA is like them saying turn off your heart. It's gonna kill you. MSPs say when they turn it off that they're essentially turning off the lights."
Kaseya has said they have identified the vulnerability used in the attacks and will soon issue a patch. In the meantime, they continue to recommend shutting down VSA.
In the broader sense, Shank warns that RMM will continue to be a target, and MSPs and their clients should be prepared.
"Planning around critical platforms being unavailable is going to have to become part of the toolkit. Because, especially as ransomware becomes more and more common, and it's certainly quite common today, the availability of any particular system is not a guarantee," he said.