Saturday, July 03, 2021

****The Pagan Valley Goth Beauty Guru****

MesaZona: TABLE OF CONTENTS > Most-Viewed Items On The Menu / Take A Look...You Might Like Them

WEEKEND REVIEW

Most Viewed Last 7 Days

From The Verge: REvil RAN$OMEWARE RIPPLE T$UNAMI ATTACK Remote IT Management Software on Kaseya VSA

More details from different sources

REvil ransomware attacks systems using Kaseya’s remote IT management software

Just in time to ruin the holiday weekend, ransomware attackers have apparently used Kaseya — a software platform designed to help manage IT services remotely — to deliver their payload. Sophos director and ethical hacker Mark Loman tweeted about the attack on Friday, and reported that affected systems will demand $44,999 to be unlocked. A note on Kaseya’s website implores customers to shut off their VSA servers for now “because one of the first things the attacker does is shutoff administrative access to the VSA.”

=========================================================================

Important Notice July 3rd, 2021

July 3, 2021 1:30 PM EDT 

Latest Updates will be published at:  Important Notice July 3rd, 2021 – Kaseya 

Kaseya’s VSA product has unfortunately been the victim of a sophisticated cyberattack.   Due to our teams’ fast response, we believe that this has been localized to a very small number of on-premises customers only.   

Kaseya is progressing on the security incident along multiple workstreams: 

  • Since the security of our customers is paramount, we are continuing to strongly recommend that our on-premises customers’ VSA servers remain offline until further notice.  We will also keep our SaaS servers offline until further notice.   
  • We have been advised by our outside experts, that customers who experienced ransomware and receive communication from the attackers should not click on any links -- they may be weaponized.     
  • We have engaged with the FBI and are working with them on an incident handling process for our worldwide customers impacted by the cyberattack.  We will be publishing a list of contacts later today. 
  • Kaseya executives are directly reaching out to impacted customers to understand their situations and what assistance is possible.  If you believe that you have been impacted, please contact support@kaseya.com with the subject “Security Incident Report.” 
  • We continue to engage with Industry experts to assess the manner and impact of the attack to ensure that our R&D organization has properly identified and mitigated the vulnerability.   
  • R&D has replicated the attack vector and is working on mitigating it.  We will not publish a resolution timeframe until we have thoroughly validated and tested the proposed solution.  We appreciate your patience. 
  • We have engaged a computer forensics firm to identify the indicators of compromise (IOCs) to ensure that we can identify which systems and data were accessed.   
  • R&D is working on a self-assessment tool for our customers, to enable them to definitively determine whether they were affected.  This will be published as part of the patch for on-premises customers. 
  • At this time, we believe that none of our NOC customers (neither SaaS nor on-premises) were affected by the attack.  We’re continuing to investigate this. 
  • ALL ON-PREMISES VSA SERVERS SHOULD CONTINUE TO REMAIN OFFLINE UNTIL FURTHER INSTRUCTIONS FROM KASEYA ABOUT WHEN IT IS SAFE TO RESTORE OPERATIONS. A PATCH WILL BE REQUIRED TO BE INSTALLED PRIOR TO RESTARTING THE VSA. 
     
  • SAAS & HOSTED VSA SERVERS WILL BECOME OPERATIONAL ONCE KASEYA HAS DETERMINED THAT WE CAN SAFELY RESTORE OPERATIONS. 

=========================================================================

INSERT: Cybersecurity and Infrastructure Security Agency CISA

Kaseya VSA Supply-Chain Ransomware Attack

=========================================================================

On Saturday, Kaseya issued another update, saying that it had been advised by its outside experts that “customers who experienced ransomware and receive a communication from the attackers should not click on any links – they may be weaponized.”

Insert >> hot potato:

Huge ransomware attack hits hundreds of US businesses

 A ransomware attack has hit hundreds of businesses across the US, in a supply chain attack that targets Kaseya’s VSA system management platform (used for remote monitoring and IT management). While Kaseya claims less than 40 of over 36,000 customers were affected, the targeting of large managed service providers has led to vast numbers of clients further downstream being hit as a result.

Ransomware gang REvil appear to have their payload delivered via a standard automatic software update. It then uses PowerShell to decode and extract its contents while simultaneously suppressing numerous Windows Defender mechanisms such as including real-time monitoring, cloud lookup, and controlled folder access (Microsoft’s own built-in anti-ransomware feature). This payload also includes an older (but legitimate) version of Windows Defender, which is used as a trusted executable in order to launch a DLL with the encryptor.

It’s not yet known if REvil is stealing any data from victims before activating their ransomware and encryption, but the group is known to have done so in past attacks.

The scale of the attack is still unfolding; supply chain attacks like these that compromise weak links further upstream (instead of hitting targets directly) have the potential to wreak havoc on a broad scale if those weak links are widely used — as Kaseya’s VSA is, in this case. Furthermore, its arrival on the weekend of 4th of July seems to have been timed to minimize the availability of staff to deal with the threat and slowing the response to it.

=========================================================================

> According to a report from Bleeping Computer, the attack targeted six large MSPs and has encrypted data for as many as 200 companies.

> At DoublePulsar, Kevin Beaumont has posted more details about how the attack seems to work, with REvil ransomware arriving via a Kaseya update and using the platform’s administrative privileges to infect systems. Once the Managed Service Providers are infected, their systems can attack the clients that they provide remote IT services for (network management, system updates, and backups, among other things).

In a statement, Kaseya told The Verge that “We are investigating a potential attack against the VSA that indicates to have been limited to a small number of our on-premises customers only.” A notice claims that all of its cloud servers are now in “maintenance mode,” a move that the spokesperson said is being taken due to an “abundance of caution.” Later on Friday evening, Kaseya CEO Fred Voccola issued a statement saying they estimated the number of MSPs affected is fewer than 40, and are preparing a patch to mitigate the vulnerability.

“While our early indicators suggested that only a very small number of on-premises customers were affected, we took a conservative approach in shutting down the SaaS servers to ensure we protected our more than 36,000 customers to the best of our ability,” Voccola said in the statement, adding that the company’s SaaS customers were never at risk, and reiterating that “only a very small percentage of our customers were affected.”

> On Saturday, Bloomberg reported that the attack was affecting more than 1,000 businesses in a ripple effect; the attack focused on managed service providers, but these providers offer IT services to other companies that may now be affected as well.

> A grocery chain in Sweden reported it couldn’t open 800 of its stores on Saturday when the attack resulted in its cash registers malfunctioning, Bloomberg reported.

The attack has been linked to the notorious REvil ransomware gang (already linked to attacks on Acer and meat supplier JBS earlier this year), and

The Record notes that, collecting incidents under more than one name, this may be the third time Kaseya software has been a vector for their exploits.

Kaseya said Saturday it would provide updates on the situation every three to four hours.

Update July 2nd, 10:40PM ET: Added statement from Kaseya CEO.

Update July 3rd 12:04PM ET: Added new information from Kaseya and updates about the spread of the attack

 

SUSPICIOUS BEHAVIOR PART 2: "Dodgie Giles" + QUICKY 13:36 Mesa City Council Meeting - 7/1/2021

What you see is what you get

A 3-Minute invocation (that is educational for a welcome change)

Historic Preservation Awards (No recipients or awardees present or available on Zoom)

1

2

3

KEVIN CHRISTOPHER READS THE CONSENT AGENDA

NO ONLINE COMMENT CARDS SUBMITTED

NO ITEMS FROM CITIZENS PRESENT

  

New Communities and Community Land Trusts

SUSPICIOUS BEHAVIOR NOT CAUGHT IN A SCREEN-GRAB Any Way and Any How > ZOOM REMOTE Mesa Council Study Session - 7/1/2021

Now really there's not much that District 2 Council member Julie Spilsbury had to say . . . A slide presentation on proposed internal city audits starts at 14:00 running for about 10 minutes. Lots of banter that looks like time-killers An announcement by Hizzoner that he will be "on a family-vacation" and that Vice-Mayor Jennifer Duff will be in charge in what might be controversial meetings on next Thursday July 8th...and O YEAH > Summer Break Starts July 9 - until August 19th Another retirement after after 23 years for Heather Wolf, who's given a send-off by John Pombier. Everything closely monitored byCity Manager Chris Brady

GOTCHA AGAIN ONE MORE TIME!

 
"The Blame-Game" goes on and it's getting us nowhere fast to strengthen international information security
Ransomware attack on Kaseya hits hundreds of businesses - The Washington  Post
    
"A ransomware attack appears to be underway against the remote IT management platform Kaseya, affecting many of its clients, the US cyber security agency said. Researchers blame the same hackers who went after the meatpacker JBS.

The US Cybersecurity and Infrastructure Security Agency (CISA) said on Friday evening it was “taking action to understand and address the recent supply-chain ransomware attack against Kaseya” and providers that employ their software.

Kaseya has taken their cloud service offline. It initially said 200 companies were affected, but later changed that to “a small number.” Neither the company nor CISA have said anything about how the hackers may have gained access.

John Hammond of the cybersecurity firm Huntress Labs said “thousands” of computers were affected. “We currently have three Huntress partners who are impacted with roughly 200 businesses that have been encrypted,” he said, calling it a “colossal and devastating supply chain attack.” . . .

Cybercrime alert: Criminals using consumer information to apply for  unemployment benefits

While the US government has blamed last year’s SolarWinds breach on Russia – Moscow has denied any involvement, calling the insinuations “absurd”and “pathetic” – the Kaseya hack seemed to be the work of REvil, a group many US researchers have described as “Russian-speaking.”

“Based on everything we are seeing right now, we strongly believe this (is) REvil/Sodinikibi,” Hammond said. . .

While the White House did not blame Russia for the JBS attack, White House Press Secretary Jen Psaki said that “responsible states do not harbour ransomware criminals” after the FBI pointed to REvil as the likely culprit behind the breach.  

Cyber Sleuths: Virtual Team Building Activities - Online / Remote Room  Escape | Feet First Events

Cyber-sleuths also don’t believe the timing of the reported Kaseya hack was an accident. It came as the US was gearing up for a three-day weekend to celebrate the Independence Day holiday, and many companies as well as government agencies were closing up shop early.

“There’s zero doubt in my mind that the timing here was intentional,” Jake Williams of Rendition Infosec told AP. 

Cyber Threat Maps | TCAT Shelbyville - ITIM

Washington has repeatedly accused Moscow of either orchestrating cyber attacks on US infrastructure or “harboring criminal entities” that do so. Last month’s summit between US President Joe Biden and Russian President Vladimir Putin in Geneva prominently featured a discussion on hacking. 

Who's Attacking Whom? Realtime Attack Trackers – Krebs on Security

WHO'S ATTACKING WHO? . .On Friday morning, the Russian Embassy in Washington issued a statement noting that “constant attacks on critical infrastructure in Russia” are coming from US soil, and expressed hope the Americans would “abandon the practice of unfounded accusations and focus on professional work with Russian experts to strengthen international information security.”

=========================================================================

Who’s Attacking Whom?

Realtime Attack Trackers

It seems nearly every day we’re reading about Internet attacks aimed at knocking sites offline and breaking into networks, but it’s often difficult to visualize this type of activity. In this post, we’ll take a look at multiple ways of tracking online attacks and attackers around the globe and in real-time.

A couple of notes about these graphics. Much of the data that powers these live maps is drawn from a mix of actual targets and “honeypots,” decoy systems that security firms deploy to gather data about the sources, methods and frequency of online attacks. Also, the organizations referenced in some of these maps as “attackers” typically are compromised systems within those organizations that are being used to relay attacks launched from someplace else.

The Cyber Threat Map from FireEye recently became famous in a 60 Minutes story on cyberattacks against retailers and their credit card systems. This graphic reminds me of the ICBM monitors from NORAD, as featured in the 1984 movie War Games (I’m guessing that association is intentional). Not a lot of raw data included in this map, but it’s fun to watch.

Zelensky Calls for a European Army as He Slams EU Leaders’ Response

      Jan 23, 2026 During the EU Summit yesterday, the EU leaders ...