supply chain attack

Acronis protects customer’s server in REvil attack on Kaseya

The recent supply-chain attack on Kaseya by the REvil ransomware group impacted dozens of managed service providers (MSPs) who rely on Kaseya VSA, as well as thousands of small businesses that are managed by those MSPs. While the initial ransom demand was dropped from $70 million to $50 million, the pain and frustration of those targeted rose steadily during the incident.

It’s worth noting that as news of the attack spread and frustration among MSPs grew, what didn’t grab headlines was the fact Acronis’ cyber protection technology was able to stop the ransomware attack in its tracks.

 

Cyberthreat update from Acronis CPOCs: Week of July 5, 2021

Here at Acronis, we’re always monitoring for dangers to your data, deploying updates to handle newly-discovered vulnerabilities, and issuing alerts and recommendations to help you stay protected. Our global network of Acronis Cyber Protection Operations Centers (CPOCs) continue to work around the clock to proactively detect and defend against the latest cyberthreats.

Part of this work includes video updates to inform you of modern hazards in the digital landscape — such as supply chain attacks impacting hundreds of businesses and shifts in ransomware gangs’ strategies. Here’s a look at some of the most recent breaking news and analyses:

REvil ransomware supply chain attack against MSPs

REvil ransomware supply chain attack against MSPs

Just as people were starting to forget about the huge Solar Winds software supply-chain attack, another high-profile attack happens. This time, the REvil/Sodinokibi ransomware group pushed out a malicious update for Kaseya's VSA IT management software, leading to dozens of MSPs around the globe – and subsequently their customers – being compromised by ransomware.

The global network of Acronis Cyber Protection Operation Centers (CPOCs) is monitoring the situation, as additional details of the attack are still unraveling. Here’s what we know at this point.