Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Kaseya: Roughly 1,500 Businesses Hit By REvil Ransomware Attack

Kaseya: Roughly 1,500 Businesses Hit By REvil Ransomware Attack

Kaseya says the REvil supply-chain ransomware attack breached the systems of roughly 60 of its direct customers using the company’s VSA on-premises product.

In all, the cloud-based MSP software provider added that it’s aware of up to 1,500 downstream victims who had their networks managed by MSPs using Kaseya remote management tools.

“The attack had limited impact, with only approximately 50 of the more than 35,000 Kaseya customers being breached,” Kaseya said in a press release.

“Of the approximately 800,000 to 1,000,000 local and small businesses that are managed by Kaseya’s customers, only about 800 to 1,500 have been compromised.”

The company provides network and endpoint indicators of compromise (IOCs) to help security researchers and customers investigations, as well as an updated version of its Compromise Detection Tool to check systems for breach signs.

Kaseya says it’s currently working on the restoration process and readying to roll out a fix for the exploited zero-day to VSA customers.

All on-premises VSA Servers should continue to remain offline until further instructions from Kaseya about when it is safe to restore operations.  A patch will be required to be installed prior to restarting the VSA and a set of recommendations on how to increase your security posture. — Kaseya

Also Read: How Does Ransomware Work? Examples and Defense Tips

Zero-day exploited while Kaseya was validating patches

To deploy ransomware payloads on the systems of Kaseya customers and their clients, the REvil operators exploited a zero-day vulnerability (CVE-2021-30116) in Kaseya VSA, an RMM (Remote Monitoring and Management) software commonly used by MSPs to manage client’s networks.

Kaseya was in the process of patching the zero-day vulnerability reported privately by researchers at the Dutch Institute for Vulnerability Disclosure (DIVD), as BleepingComputer later found.

However, the REvil affiliate behind the attack obtained the zero-day’s details and exploited it to deploy the ransomware before Kaseya could start rolling a fix to VSA customers.

“The attackers were able to exploit zero-day vulnerabilities in the VSA product to bypass authentication and run arbitrary command execution,” Kaseya explains.

“This allowed the attackers to leverage the standard VSA product functionality to deploy ransomware to endpoints. There is no evidence that Kaseya’s VSA codebase has been maliciously modified.”

REvil now claims to have encrypted over 1,000,000 systems and, after first demanding $70 million, is now asking for $50 million for a universal decryptor.

REvil claims of encrypting 1 million endpoints
REvil claims to have encrypted 1 million endpoints

This is not the first time ransomware groups have targeted Kaseya’s cloud-based MSP platform.

GandCrabREvil (Sodinokibi), and Ragnar Locker targeted Kaseya’s remote management tools to make it a lot harder for victim’s MSP to detect and block ongoing ransomware attacks.

Also Read: How to Choose a Penetration Testing Vendor

In related news, CISA and the FBI have shared guidance for victims of the supply-chain ransomware attack.

The White House National Security Council is also urging victims to report any incidents and follow the guidance issued by Kaseya.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us