Security News > 2021 > July > Kaseya says it's seen no sign of supply chain attack, sets SaaS restoration target of Tuesday afternoon, on-prem fix to follow
Kaseya has said it's been unable to find signs its code was maliciously modified, and offered its users a ray of hope with news that it is testing a patch for its on-prem software and is considering restoring its SaaS services on Tuesday, US Eastern Daylight Time.
The beleaguered IT for service providers company is fighting a supply chain attack on its VSA product that it has documented with a rolling advisory that was updated at 09:30PM on July 5th EDT. The update has good news and bad news.
The good news is that the update revealed that the company estimates it will be possible to restart its SaaS servers on July 6th between 2:00 PM and 5:00 PM EDT. That date is not final: the update says a final decision will be made "Tomorrow morning between 8:00 AM EDT - 12:00 AM EDT".
"Kaseya said it's met with the FBI and the USA's Cybersecurity and Infrastructure Security Agency CISA"to discuss systems and network hardening requirements prior to service restoration for both SaaS and on-premises customers.
"We expect the patch to be available within 24 hours after our SaaS servers have been brought up," the update advises.
Kaseya has advised its users to pull the plug on their on-prem VSA servers, so news that a fix is imminent will be welcome - but news that it will arrive later than the SaaS fix will not.
News URL
https://go.theregister.com/feed/www.theregister.com/2021/07/06/kaseya_update/
Related news
- Israel’s Pager Attacks and Supply Chain Vulnerabilities (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- LottieFiles hit in npm supply chain attack targeting users' crypto (source)
- LottieFiles hacked in supply chain attack to steal users’ crypto (source)
- LottieFiles supply chain attack exposes users to malicious crypto wallet drainer (source)