MSP security is not at the standard that it should be; how many more times must MSPs succumb to advanced hacker tradecraft before they seek out an effective security solution?
Last week, cyber criminals once again targeted managed service providers (MSPs). The attackers, believed to be a ransomware gang, breached the MSPs’ internal networks and leveraged the MSPs’ own legitimate tools and technologies to deploy ransomware on client networks. Unfortunately, this is not the first time MSP security has failed and such an event has occurred.
As described by news outlets, the attack timeline was as follows:
- Ransomware gang breaches MPSs via exposed remote desktop protocol (RDP) ports
- Once inside, the attackers elevated their privileges
- Next, the hackers disabled running anti-virus (A/V) products
- After disabling A/V products, the gang looked for popular remote management software accounts that MSPs use to legitimately monitor and manage their clients (software such as Webroot SecureAnywhere, Kaseya VSA, and ConnectWise Control)
- They discovered accounts that allowed them to gain access to Webroot’s SecureAnywhere, Kaseya VAS, and ConnectWise Control
- Finally, the hackers used these accounts to control the remote management software to download files from a popular file-hosting site (pastebin.com) and deploy a Powershell script to the MSPs’ client networks. This Powershell script downloaded and installed the Sodinokibi ransomware on client desktops, laptops, and servers.
As this recent example shows, running anti-virus products and using firewalls was ineffective at stopping this attack. Unfortunately, none of the MSP security solutions employed helped them adequately detect and respond in real-time to these sophisticated cyberattacks. Why is that?