TechNewsPro_Masthead_2.jpg

The latest in NEWS, RESOURCES and JOBS

Lower the TCO of your legacy data wareho
Talend_Banner_728x90px_v1.jpg
  • Caspar James - Tech Journalist

Kaseya was the victim of a ransomware attack, with the hackers demanding $70 million

Businesses around the world were affected by the breach, seizing data and demanding $70 million and it seems this attack could just be the tip of the iceberg. The Florida based company was hacked in early July and was their biggest attack on record, with businesses around the world hit, from schools in New Zealand to supermarkets in Sweden. Kaseya has been quick to respond to the hack and their cybersecurity teams have been working to regain control of stolen data.



Kaseya’s customer’s data was stolen and a ransom of $70 million was demanded for its return. This was a very serious data breach, especially as Kaseya is a managed data provider and they act to provide data services to small and medium sized businesses who don’t have their own tech departments. Kaseya regularly pushes updates its customers, but in this instance, it pushed out malicious software to its customers’ systems leading to the hack.

In the case of this data breach, the security system set up to protect customers had been targeted, leading to the breach. This is a new method for hackers to breach data systems, as they are attacking the actual defence system that is supposed to protect data and this sort of attack has not been used before.


Between 800 and 1,500 of Kaseya’s customers had been affected, although this figure could be higher. Of these victims, 145 were US customers, which included small and medium sized businesses and local and state governments. In a statement by President Biden on Tuesday, he stated that the hack had been felt by smaller businesses such as dentists and accountants, very few domestic companies had been affected.


Biden said, “It appears to have caused minimal damage to US businesses, but we’re still gathering information. I feel good about our ability to be a blessing to be able to respond.”


This hack however has been felt in other parts of the world. In Sweden, hundreds of supermarkets had to close due to their tills being rendered inoperable. Schools in New Zealand were knocked offline.


The Russian hacker group REvil has claimed responsibly for the attack. In June, they hacked the US meat producer JBS and demanded a $11 million ransom. REvil has set itself up as a provider of ransomware, where it leases out its ability to extort businesses to criminals, in exchange for a percentage of each ransom payment. REvil even offers a service to allow its victims to quickly pay ransoms.


It is not known at this stage whether Kaseya had paid the ransom, or had been negotiating with the hackers for a lower figure. If the payment had been made, it would only exacerbate a ransomware arms race. If ransoms are paid, hackers get more money to spend on improving their hacking arsenal, improving operations and acquiring better skilled hackers. When hackers know they will be paid and not get caught, they get more brazen. Therefore we will see a lot more of these attacks coming up in the future.


As these attacks are becoming much more frequent, the Biden administration has been discussing its domestic and international l responses. Biden intends to meet with officials from the department of justice, state and homeland security and other intelligence agencies to discuss the topic of ransomware and find a solution to counter it. They would meet their Russian counterparts next next to discuss this pressing concern.



In a press statement by The White House press secretary, Jen Psaki said, "As the president made clear to President Putin when they met, if the Russian government cannot or will not take action against criminal actors in Russia, we will take action or reserve the right."

Element_300x600_June_2.jpg

LATEST RESOURCES

 

 

How the Australian government departments are revitalising the citizen and supplier experience

Accelerating the delivery of excellent service. Here we outline how government departments can deliver a better experience while also saving time and money for themselves and their staff by leveraging process mapping, automation and document generation.

Best Practices for Office 365 Security

Microsoft Office 365 has largely defined how teams collaborate in the cloud with over 100 million monthly users. We look at the best practices for Office 365 security monitoring.

Beyond Security Events and Compliance 

The Splunk platform is designed to investigate, monitor, analyze and act on data at any scale. We call this Data-to-Everything Platform, which removes barriers between data and action.

The Impact of Chatbots and AI on the Customer Journey

Emerging technologies – like Artificial Intelligence (AI) – are helping companies transform the customer experience, but businesses need to act quickly to stay ahead of the pack and start delivering the type of service that becomes a true competitive differentiator.

Endpoint Security for Dummies

Symantec Endpoint Suite Product Guide. Stay ahead of the evolving threat landscape. Prevent ransomware and emerging threats. Saves resources with simplified EDR.

Leveraging CIAM to Unlock the Power of AI and IoT

How customer identity and access management (CIAM) maximises the business value of AI and IoT while protecting your customers.

Parting the clouds. 

for greater security

Covid-19 has landed CSOs a unique opportunity to embrace web isolation.

Eliminate malware threats with zero trust 

Isolation-powered security provides full protection against email and Web based threats.

MenloSecurity_Signature_Purple_RGB.jpg
MenloSecurity_Signature_Purple_RGB.jpg
bold360_Logo..png
Symantec_Logo.png
Alien_Vault_Logo.jpg
Splunk_logo.png
nintex_logo.png

    SUBSCRIBE

to our latest RESOURCES

to keep up to date with the

latest whitepapers

WP_GMC_Cover.jpg
WP_bold360_Cover.jpg