As fake updates target victims, Kaseya allegedly knew of exp

As fake updates target victims, Kaseya allegedly knew of exploited vulnerability in April


As fake updates target victims, Kaseya allegedly knew of exploited vulnerability in April
SHARE
Users of software from Kaseya Ltd. are being targeted with fake updates following an attack by the REvil ransomware group, as it was revealed today that the company was allegedly informed of a vulnerability exploited in a ransomware attack by REvil in April.
Detected by researchers at Malwarebytes Labs, the campaign targets potential victims with spam that pushes Cobalt Strike payloads disguised as Kaseya VSA security updates.
Cobalt Strike is penetration testing software with legitimate uses but can also be used by bad actors to attack a company. As noted in November, when the source code for software allegedly leaked, in the hands of hackers the software can be used to identify security issues that can be exploited.

Related Keywords

Netherlands , Russia , White House , District Of Columbia , United States , Russian , Dutch , Frank Breedijk , Andy Jassy , Kaseya Revil , Michael Dell , Pat Gelsinger , Malwarebytes Kaseya , Cube Club , Dutch Institute For Vulnerability Disclosure , Amazon Web Services , Microsoft Corp , Cube Event Community , Microsoft , Kaseya Ltd , Malwarebytes Labs , Cobalt Strike , Dutch Institute , Vulnerability Disclosure , John Furrier , Dell Technologies , நெதர்லாந்து , ரஷ்யா , வெள்ளை வீடு , மாவட்டம் ஆஃப் கொலம்பியா , ஒன்றுபட்டது மாநிலங்களில் , ரஷ்ய , டச்சு , ஆண்டி ஜாஸ்ஸி , மைக்கேல் டெல் , பேட் கெள்சிங்கேர் , கன சங்கம் , அமேசான் வலை சேவைகள் , மைக்ரோசாஃப்ட் கார்ப் , மைக்ரோசாஃப்ட் , கோபால்ட் வேலைநிறுத்தம் , டச்சு நிறுவனம் , ஜான் ஃபுரியர் , டெல் தொழில்நுட்பங்கள் ,

© 2025 Vimarsana