{"id":6469,"date":"2021-07-07T11:12:03","date_gmt":"2021-07-07T18:12:03","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6469"},"modified":"2024-04-26T13:20:35","modified_gmt":"2024-04-26T20:20:35","slug":"kaseya-revil-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/","title":{"rendered":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack"},"content":{"rendered":"<h3>Author: Nick Sundvall<\/h3>\n<h3>TLP: WHITE<\/h3>\n<h3>\u00a0\u00a0\u00a0\u00a0\u00a0 1. Executive Summary<\/h3>\n<p>On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.<sup>1<\/sup> Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.<\/p>\n<p>After the attack, the actors stated the following on their blog: \u201cOn Friday (02.07.2021) we launched an attack on MSP providers. More than a million systems were infected. If anyone wants to negotiate about universal decryptor \u2013 our price is 70,000,000$ in BTC and we will publish publicly decryptor that decrypts files of all victims, so everyone will be able to recover from attack in less than an hour.\u201d<sup>2<\/sup><\/p>\n<h3>\u00a0\u00a0\u00a0\u00a0\u00a0 2. REvil\/Sodinokibi Background<\/h3>\n<p>In June 2019, we published a report<sup>3<\/sup> on Sodinokibi\/REvil. At the time, it was a relatively new ransomware-as-a-service (RaaS), and it appeared to be one of the ransomware families filling a void left by the discontinuation of the popular ransomware Gandcrab. REvil was first identified in the wild on 17 April 2019, when threat actors exploited a vulnerability in Oracle WebLogic to install Sodinokibi on susceptible web servers.<sup>2<\/sup> Like Gandcrab, REvil uses an affiliate revenue system where threat actors sign up as affiliates, start using the ransomware for no initial fee, and share a percentage of their profits.<\/p>\n<p>As we noted in 2019, the fact that REvil is freely available means its distribution methods vary from one\u00a0 threat actor to another. Even in 2019, REvil affiliates had distributed the ransomware by compromising MSPs, distributing malicious spam emails, and hacking websites that host downloadable executables to replace the legitimate software with copies of REvil.<sup>4<\/sup><\/p>\n<h3>\u00a0\u00a0\u00a0\u00a0\u00a0 3. Kaseya Attack Analysis<\/h3>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 3.1. Malicious Software Update<\/h4>\n<p>Sophos reported that the actors delivered the ransomware to VSA servers via a malicious update, and the update employed a zero-day exploit of the server platform to deploy the ransomware to the managed Windows machines. According to Sophos, this approach gave the threat actors the advantages of 1) compromising the downstream companies by abusing the trusted VSA service, and 2) avoiding being stopped by antivirus software (AV), because VSA requires that several folders as well as the Kaseya executables be excluded from AV monitoring.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 3.2. Ransomware Deployment<\/h4>\n<p>Upon receiving the malicious update, the VSA agent wrote an encoded malicious payload into its working directory, C:\\KWORKING\\. The agent then ran several Windows shell commands, which repeatedly pinged localhost, acted as a sleep function, and delayed the upcoming commands for approximately 90 minutes.<\/p>\n<p>The agent then ran a PowerShell command that disabled Microsoft Defender\u2019s anti-malware and anti-ransomware protections. At this point, the agent made a copy of certutil.exe, the Windows certificate utility that can download and decode content, and used the executable to decode the previously downloaded payload.<\/p>\n<p>Sophos reported that the payload had a valid certificate but that it \u201cmay be stolen or fraudulently obtained\u201d and that the payload was compiled a day before the attack, on 1 July. After the agent decoded the payload, the final shell command launched the malicious payload and the ransomware began to deploy. The report noted that due to mass deployment, the attack made no effort to exfiltrate any data.<\/p>\n<h3>\u00a0\u00a0\u00a0\u00a0\u00a0 4. Prevention and Mitigation<\/h3>\n<p>Kaseya recommends taking all on-premises VSA servers offline until further notice. Also, Kaseya has stated that they are actively working on a patch and hope to deploy it by 7 July. Finally, Kaseya has released a compromise detection tool that will help determine whether any IoCs are present on a system.<sup>5<\/sup><\/p>\n<p>Infoblox recommends backing up data and systems regularly to minimize the potential impact of ransomware in general, as well as practicing restoring from backups. Ideally, backups should be stored off the network.<\/p>\n<p>Also, beware of scams looking to take advantage of this attack. Malwarebytes has already reported on a malspam phishing campaign that allegedly delivers a patch for the vulnerability exploited by the REvil threat actors.<sup>6<\/sup> In reality, the email attachment drops CobaltStrike, a legitimate penetration-testing tool that threat actors abuse to deploy a program named Beacon. Beacon enables them to perform advanced post-exploitation functions, such as command execution, key logging, file transfer, privilege escalation, port scanning, and lateral movement.<\/p>\n<h3>\u00a0\u00a0\u00a0\u00a0\u00a0 5. Indicators of Compromise<\/h3>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\"><strong>Description<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">C:\\windows\\cert.exe<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"147\">Copied certutil<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">C:\\windows\\msmpeng.exe<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"147\">Executable vulnerable to DLL sideload<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">C:\\kworking\\agent.crt<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">REvil dropper used in Kaseya exploit<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"525\">C:\\windows\\mpsvc.dll<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">REvil ransomware DLL<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"525\">33bc14d231a4afaa18f06513766d5f69d8b88f1e697cd127d24fb4b72ad44c7a<\/p>\n<p>d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1<\/p>\n<p>8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd<\/p>\n<p>e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2<\/p>\n<p>50416e50797cf88a48d086e718c003e2d10c3847b1a251669d6f10f8d3546e03<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">SHA256s<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">101gowrie[.]com<\/p>\n<p style=\"text-align: center;\">123vrachi[.]ru<\/p>\n<p style=\"text-align: center;\">12starhd[.]online<\/p>\n<p style=\"text-align: center;\">1kbk[.]com[.]ua<\/p>\n<p style=\"text-align: center;\">1team[.]es<\/p>\n<p style=\"text-align: center;\">321play[.]com[.]hk<\/p>\n<p style=\"text-align: center;\">35-40konkatsu[.]net<\/p>\n<p style=\"text-align: center;\">365questions[.]org<\/p>\n<p style=\"text-align: center;\">4net[.]guru<\/p>\n<p style=\"text-align: center;\">4youbeautysalon[.]com<\/p>\n<p style=\"text-align: center;\">8449nohate[.]org<\/p>\n<p style=\"text-align: center;\">andersongilmour[.]co[.]uk<\/p>\n<p style=\"text-align: center;\">asiluxury[.]com<\/p>\n<p style=\"text-align: center;\">bierensgebakkramen[.]nl<\/p>\n<p style=\"text-align: center;\">blgr[.]be<\/p>\n<p style=\"text-align: center;\">blossombeyond50[.]com<\/p>\n<p style=\"text-align: center;\">bxdf[.]info<\/p>\n<p style=\"text-align: center;\">c2e-poitiers[.]com<\/p>\n<p style=\"text-align: center;\">candyhouseusa[.]com<\/p>\n<p style=\"text-align: center;\">cerebralforce[.]net<\/p>\n<p style=\"text-align: center;\">cleliaekiko[.]online<\/p>\n<p style=\"text-align: center;\">conexa4papers[.]trade<\/p>\n<p style=\"text-align: center;\">copystar[.]co[.]uk<\/p>\n<p style=\"text-align: center;\">cursosgratuitosnainternet[.]com<\/p>\n<p style=\"text-align: center;\">daklesa[.]de<\/p>\n<p style=\"text-align: center;\">danielblum[.]info<\/p>\n<p style=\"text-align: center;\">dubnew[.]com<\/p>\n<p style=\"text-align: center;\">eglectonk[.]online<\/p>\n<p style=\"text-align: center;\">facettenreich27[.]de<\/p>\n<p style=\"text-align: center;\">fannmedias[.]com<\/p>\n<p style=\"text-align: center;\">faroairporttransfers[.]net<\/p>\n<p style=\"text-align: center;\">filmstreamingvfcomplet[.]be<\/p>\n<p style=\"text-align: center;\">foryourhealth[.]live<\/p>\n<p style=\"text-align: center;\">fotoscondron[.]com<\/p>\n<p style=\"text-align: center;\">gmto[.]fr<\/p>\n<p style=\"text-align: center;\">gonzalezfornes[.]es<\/p>\n<p style=\"text-align: center;\">hairstylesnow[.]site<\/p>\n<p style=\"text-align: center;\">homng[.]net<\/p>\n<p style=\"text-align: center;\">importardechina[.]info<\/p>\n<p style=\"text-align: center;\">iqbalscientific[.]com<\/p>\n<p style=\"text-align: center;\">kaotikkustomz[.]com<\/p>\n<p style=\"text-align: center;\">liliesandbeauties[.]org<\/p>\n<p style=\"text-align: center;\">milestoneshows[.]com<\/p>\n<p style=\"text-align: center;\">mindpackstudios[.]com<\/p>\n<p style=\"text-align: center;\">myhostcloud[.]com<\/p>\n<p style=\"text-align: center;\">ncuccr[.]org<\/p>\n<p style=\"text-align: center;\">pasvenska[.]se<\/p>\n<p style=\"text-align: center;\">rimborsobancario[.]net<\/p>\n<p style=\"text-align: center;\">simoneblum[.]de<\/p>\n<p style=\"text-align: center;\">smartypractice[.]com<\/p>\n<p style=\"text-align: center;\">southeasternacademyofprosthodontics[.]org<\/p>\n<p style=\"text-align: center;\">streamerzradio1[.]site<\/p>\n<p style=\"text-align: center;\">summitmarketingstrategies[.]com<\/p>\n<p style=\"text-align: center;\">sw1m[.]ru<\/p>\n<p style=\"text-align: center;\">tanzschule-kieber[.]de<\/p>\n<p style=\"text-align: center;\">thee[.]network<\/p>\n<p style=\"text-align: center;\">thomasvicino[.]com<\/p>\n<p style=\"text-align: center;\">tonelektro[.]nl<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">Domains Found In REvil Config File<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/helpdesk.kaseya.com\/hc\/en-gb\/articles\/4403440684689\">https:\/\/helpdesk.kaseya.com\/hc\/en-gb\/articles\/4403440684689<\/a><\/li>\n<li><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/07\/04\/independence-day-revil-uses-supply-chain-exploit-to-attack-hundreds-of-businesses\/\">https:\/\/news.sophos.com\/en-us\/2021\/07\/04\/independence-day-revil-uses-supply-chain-exploit-to-attack-hundreds-of-businesses\/<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--21\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;21<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-spreads-wide-via-hacked-msps-sites-and-spam\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-spreads-wide-via-hacked-msps-sites-and-spam\/<\/a><\/li>\n<li><a href=\"https:\/\/kaseya.app.box.com\/s\/p9b712dcwfsnhuq2jmx31ibsuef6xict\">https:\/\/kaseya.app.box.com\/s\/p9b712dcwfsnhuq2jmx31ibsuef6xict<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1412518446013812737\/\">https:\/\/twitter.com\/MBThreatIntel\/status\/1412518446013812737\/<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Nick Sundvall TLP: WHITE \u00a0\u00a0\u00a0\u00a0\u00a0 1. Executive Summary On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[333,525,288],"class_list":{"0":"post-6469","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cyberattack","9":"tag-kaseya","10":"tag-ransomware","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: Kaseya REvil Ransomware Attack<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-07T18:12:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack\",\"datePublished\":\"2021-07-07T18:12:03+00:00\",\"dateModified\":\"2024-04-26T20:20:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/\"},\"wordCount\":1013,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"keywords\":[\"Cyberattack\",\"Kaseya\",\"Ransomware\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/\",\"name\":\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"datePublished\":\"2021-07-07T18:12:03+00:00\",\"dateModified\":\"2024-04-26T20:20:35+00:00\",\"description\":\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-06.jpg\",\"width\":612,\"height\":333,\"caption\":\"Criminal hiding behind a mask turns up on computer screen asking the owner for money. Concept of phishing and ransomware, where the computer has all files on the harddrive encrypted and the victims need to pay a ransom in order to get their files unlocked. The computer stands on a table.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/kaseya-revil-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Advisory: Kaseya REvil Ransomware Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack","description":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack","og_description":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/","og_site_name":"Infoblox Blog","article_published_time":"2021-07-07T18:12:03+00:00","article_modified_time":"2024-04-26T20:20:35+00:00","og_image":[{"width":612,"height":333,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack","datePublished":"2021-07-07T18:12:03+00:00","dateModified":"2024-04-26T20:20:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","keywords":["Cyberattack","Kaseya","Ransomware"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/","name":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","datePublished":"2021-07-07T18:12:03+00:00","dateModified":"2024-04-26T20:20:35+00:00","description":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack. On 2 July, the threat actors behind REvil, also known as Sodinokibi, launched a massive ransomware attack targeting users of Kaseya\u2019s remote monitoring and management service, VSA. In this supply chain attack, the actors exploited a zero-day vulnerability in Kaseya\u2019s software to deploy ransomware on nearly 1500 company networks.1 Kaseya stated that the attack compromised only customers of the on-premises version of VSA and that there is no evidence that it compromised SaaS customers.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-06.jpg","width":612,"height":333,"caption":"Criminal hiding behind a mask turns up on computer screen asking the owner for money. Concept of phishing and ransomware, where the computer has all files on the harddrive encrypted and the victims need to pay a ransom in order to get their files unlocked. The computer stands on a table."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/kaseya-revil-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Advisory: Kaseya REvil Ransomware Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6469"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6469\/revisions"}],"predecessor-version":[{"id":6473,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6469\/revisions\/6473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6720"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}