用户名/邮箱
登录密码
验证码
看不清?换一张
您好,欢迎访问! [ 登录 | 注册 ]
您的位置:首页 - 最新资讯
Massive scale and details emerge of worldwide Kaseya ransomware attack
2021-07-05 00:00:00.0     洛杉矶时报-商业     原网页

       

       Cybersecurity teams worked feverishly Sunday to stem the impact of the single biggest global ransomware attack on record, with some details emerging about how the Russia-linked gang responsible breached the company whose software was the conduit.

       An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said.

       REvil was demanding ransoms of up to $5 million, the researchers said. But late Sunday it offered in a posting on its dark web site a universal decryptor software key that would unscramble all affected machines in exchange for $70 million in cryptocurrency.

       Earlier, the FBI said in a statement that while it was investigating the attack, its scale “may make it so that we are unable to respond to each victim individually.” Deputy national security advisor Anne Neuberger later issued a statement saying President Biden had “directed the full resources of the government to investigate this incident” and urged all who believed they were compromised to alert the FBI.

       Advertisement

       Biden suggested Saturday that the U.S. would respond if it was determined that the Kremlin is at all involved.

       Less than a month ago, Biden pressed Russian President Vladimir Putin to stop giving safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks the U.S. deems a national security threat.

       World & Nation

       Ransomware is everywhere — even in this sleepy Texas town

       World & Nation

       Ransomware is everywhere — even in this sleepy Texas town

       When a ransomware attack hit Keene, Texas, no one noticed.

       A broad array of businesses and public agencies was hit by the latest attack, apparently on almost all continents, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. Ransomware criminals infiltrate networks and sow malware that cripples them by scrambling all their data. Victims get a decoder key when they pay up.

       The Swedish grocery chain Coop said most of its 800 stores would be closed for a second day Sunday because its cash register software supplier was crippled. A Swedish pharmacy chain, gas station chain, the state railway and public broadcaster SVT were also hit.

       In Germany, an unnamed IT services company told authorities that several thousand of its customers were compromised, the news agency DPA reported. Also among reported victims were two big Dutch IT services companies, VelzArt and Hoppenbrouwer Techniek. Most ransomware victims don’t publicly report attacks or disclose if they’ve paid ransoms.

       Fred Voccola, CEO of the breached software company, Kaseya, estimated the number of victims to be in the low thousands, mostly small businesses like “dental practices, architecture firms, plastic surgery centers, libraries, things like that.”

       World & Nation

       Suspected Russian hack fuels new U.S. action on cybersecurity

       World & Nation

       Suspected Russian hack fuels new U.S. action on cybersecurity

       U.S. officials are scrambling to reinforce the nation’s cyber defenses following a sweeping hack that may have exposed government and corporate secrets to Russia.

       Advertisement

       Voccola said in an interview that only 50 to 60 of the company’s 37,000 customers were compromised. But 70% were managed-service providers who use the company’s hacked VSA software to manage multiple customers. It automates the installation of software and security updates and manages backups and other vital tasks.

       Experts say it was no coincidence that REvil launched the attack at the start of the Fourth of July holiday weekend, knowing that U.S. offices would be lightly staffed. Many victims may not learn of it until they are back at work Monday. Most end users of managed-service providers “have no idea” whose software keeps their networks humming, said Voccola.

       Kaseya said it sent a detection tool to nearly 900 customers Saturday night.

       The REvil offer of blanket decryption for all victims of the Kaseya attack in exchange for $70 million suggested its inability to cope with the sheer quantity of infected networks, said Allan Liska, an analyst with the cybersecurity firm Recorded Future. Although analysts reported seeing demands of $5 million and $500,000 for bigger targets, it was apparently demanding $45,000 from most.

       Advertisement

       Business

       Colonial Pipeline paid hackers nearly $5 million in ransom, sources say

       Business

       Colonial Pipeline paid hackers nearly $5 million in ransom, sources say

       The payment came shortly after the attack got underway last week. The FBI discourages organizations from paying ransom to hackers.

       “This attack is a lot bigger than they expected, and it is getting a lot of attention. It is in REvil’s interest to end it quickly,” said Liska. “This is a nightmare to manage.”

       Analyst Brett Callow of Emsisoft said he suspects REvil is hoping insurers might crunch the numbers and determine the $70 million will be cheaper for them than extended downtime.

       Sophisticated ransomware gangs at REvil’s level usually examine a victim’s financial records — and insurance policies if they can find them — from files they steal before activating the ransomware. The criminals then threaten to dump the stolen data online unless paid. In this attack, that appears not to have happened.

       Advertisement

       Dutch researchers said they alerted Miami-based Kaseya to the breach and said the criminals used a “zero day,” the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing.

       Newsletter

       Must-read stories from the L.A. Times

       Get all the day's most vital news with our Today's Headlines newsletter, sent every weekday morning.

       Enter email address

       Sign Me Up

       You may occasionally receive promotional content from the Los Angeles Times.

       “The level of sophistication here was extraordinary,” he said.

       When the cybersecurity firm Mandiant finishes its investigation, Voccola said he is confident it will show that the criminals didn’t just violate Kaseya code in breaking into his network but also exploited vulnerabilities in third-party software.

       Advertisement

       It was not the first ransomware attack to leverage managed-services providers. In 2019, criminals hobbled the networks of 22 Texas municipalities through one. That same year, 400 U.S. dental practices were crippled in a separate attack.

       One of the Dutch vulnerability researchers, Victor Gevers, said his team is worried about products like Kaseya’s VSA because of the total control of vast computing resources they can offer. “More and more of the products that are used to keep networks safe and secure are showing structural weaknesses,” he wrote in a blog post Sunday.

       World & Nation

       MWD among targets in large-scale cyber-espionage hack blamed on China

       World & Nation

       MWD among targets in large-scale cyber-espionage hack blamed on China

       A large-scale cyber-spying campaign blamed on China might have given hackers access to the networks of critical U.S. companies and agencies.

       The cybersecurity firm ESET identified victims in least 17 countries, including the United Kingdom, South Africa, Canada, Argentina, Mexico, Indonesia, New Zealand and Kenya.

       Advertisement

       Kaseya says the attack affected only “on-premise” customers, organizations running their own data centers, as opposed to its cloud-based services that run software for customers. It also shut down those servers as a precaution, however.

       Kaseya, which called on customers Friday to shut down their VSA servers immediately, said Sunday it hoped to have a patch in the next few days.

       Active since April 2019, REvil provides ransomware-as-a-service, meaning it develops the network-paralyzing software and leases it to so-called affiliates who infect targets and earn the lion’s share of ransoms. U.S. officials say the most potent ransomware gangs are based in Russia and allied states and operate with Kremlin tolerance and sometimes collude with Russian security services.

       Cybersecurity expert Dmitri Alperovitch of the Silverado Policy Accelerator think tank said that although he does not believe the Kaseya attack is Kremlin-directed, it shows that Putin “has not yet moved” on shutting down cybercriminals.

       


标签:综合
关键词: REvil     software     attack     cybersecurity researchers     Voccola     Advertisement     networks     multiple customers     ransomware     victims    
滚动新闻