WatchGuard: Kaseya VSA Attack: What You Need to Know
| On Friday, July 2, some MSPs using the on-premises version of Kaseya VSA suffered ransomware attacks that trickled down to their customers. Kaseya says around 1,500 companies (so far), many customers of MSPs, have been affected and the attackers (Revil gang) are asking $70 million in ransom. The attack exploited unpatched vulnerabilities in the Kaseya product that Kaseya is working on fixing ASAP. |
Learn More About How to Defend Against the Kaseya VSA Ransomware Attack
Read our Secplicity blog post for everything you need to know about the attack
Attend our webinar, “Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident,” taking place on July 8, 2021 at 8:00 am PDT (3:00 pm GMT). Register Here
Read our white paper, “Defeating Ransomware with Unified Security from WatchGuard” Anyone using an on-premises Kaseya VSA server (does not seem to affect the SaaS version) should turn it off or remove it from your network until Kaseya releases the fix. WatchGuard’s endpoint products like WatchGuard EPDR, Panda AD360, and others, can catch the dropped ransomware.
If you have any other questions about how WatchGuard can help defend your business and your customers from ransomware, please speak with your account manager.
To Your Success,
The WatchGuardONE Team