Supply Chain Council of European Union | Scceu.org
News

6-year-old Kaseya vulnerability surfaces amid VSA supply chain attack

Credit: 217194570 © Transversospinales | Dreamstime.com

A six-year-old flaw lying in Kaseya’s deprecated billing and customer support site has surfaced amid the ongoing attempt to rectify a supply chain attack on the vendor’s VSA product that has affected over 1000 businesses globally. 

Last week, the US-based IT infrastructure management solutions vendor discovered a potential security incident involving its VSA software, which is used by managed service providers (MSPs) to deliver IT management services to customers.  

John Hammond, senior security researcher at cyber security firm Huntress, said at the time that on 2 July, “many” Kaseya VSA servers were used to deploy ransomware, with the party behind the campaign appearing to be affiliated with the REvil group, which is believed to be linked with Russia.   

According to cyber security expert Brian Krebs, part of the chain involved the exploit CVE-2021-30116, which has been around since April. 

However, this isn’t the only dated Kaseya-related vulnerability to be concerned about, with a new report posted by Krebs on his KrebsOnSecurity site claiming that security incident response firm Mandiant notified the vendor about a six-year-old vulnerability that was still around in an older version of its billing and customer support portal. 

Related posts

EY announces an expanded alliance with P&G to transform and build supply chain resilience during and beyond the COVID-19 pandemic

scceu

Consultant Insight: DHL Supply Chain plays catch up with NTA acquisition

scceu

Skimmer supply chain attack targets 100 Sotheby’s real estate sites

scceu