Kaseya Snags a Universal Decryption Tool After Ransomware Attack

  • By Dawna M. Roberts
  • Published: Aug 06, 2021
  • Last Updated: Mar 18, 2022

 Software vendor Kaseya recently suffered a massive ransomware strike, but they just got their hands on a universal decryption tool to help their customers.

What Happened?

On July 2, the REvil hacker gang attacked Kaseya by exploiting a vulnerability in their Virtual System Administrator (VSA) used by hundreds of managed service providers and their clients.

More than 60 MSPs and 1,500 victims were affected by this single event. Unfortunately, most small business clients don’t have backups, and they have been having a difficult time trying to restore their files.

REvil initially demanded $70 million and then reduced that figure to $50 million. Kaseya has not divulged whether or not they paid any ransom. However, they did snag a universal decryption tool (from a third party), and they will begin using it this week to help clients unlock their files and get back on track. Some people wonder if the various clients pooled their financial resources to pay the ransom for the universal key to end the nightmare.

The vulnerability in the software has since been patched, but the aftermath continues. Oddly enough, the REvil gang disappeared shortly after the attack. It is unclear if that has anything to do with the fact that Kaseya obtained a universal description tool to free victims. Although a welcome development, the disappearance of REvil on July 13 does not mean they are gone forever, and we’ve seen the last of this prolific gang.

The attack affected victims in the U.S., Sweden, Australia, and South Africa.

revil ransomware gang

The Fix

On July 23, Kaseya posted a public notice about the incident saying, “We can confirm that Kaseya obtained the tool from a third party and have teams actively helping customers affected by the ransomware to restore their environments, with no reports of any problem or issues associated with the decryptor. “Kaseya is working with Emsisoft to support our customer engagement efforts, and Emsisoft has confirmed the key is effective at unlocking victims…Customers who have been impacted by the ransomware will be contacted by Kaseya representatives.”

Experts believe that Kaseya negotiated a lower ransom price and paid it to get the key. However, that is only speculation at this point, with no confirmation from Emsisoft or Kaseya. Emsisoft is currently rolling out assistance to victims who are still stuck.

The Aftermath

Cybersecurity assessors expect a harsh aftermath of lawsuits filed against Kaseya for not having proper security measures in place or addressing and fixing the zero-day exploit that caused the issue. Dutch researchers had noticed the problem three months prior and notified Kaseya, but the company failed to do anything about it.

Some also fear that the hackers may have copies of the data breached stored on servers and may still continue to use it to extort further ransom from the many victims. However, with so many clients attacked in one event, the thought is that they had no time to steal data and instead simply locked the files. Hopefully, that is the case.

Although some of the customers were able to restore files through solid backups, many were not and are still struggling, waiting for the fix. Small businesses like dental offices and lawyers are having the most difficulty recovering.

Law enforcement has been very vocal lately about urging victims not to pay a ransom. However, as it stands now, despite rumors that it could change, victims are not being penalized for paying threat actors ransom to unlock their files. Threat experts hope that Kaseya was able to obtain the decryption key without paying any ransom. The message sent when a victim pays only encourages further ransomware attacks.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close