{"id":41602,"date":"2021-07-02T22:33:00","date_gmt":"2021-07-02T22:33:00","guid":{"rendered":"http:\/\/a0e544d1-d815-4c9d-a892-001f96ca8c71"},"modified":"2021-07-02T22:33:00","modified_gmt":"2021-07-02T22:33:00","slug":"kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","title":{"rendered":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack"},"content":{"rendered":"<p>UPDATE: In a statement late Friday evening, Kaseya CEO Fred Voccola confirmed that the company&#8217;s Incident Response team caught wind of the attack mid-day and immediately shut down their SaaS servers\u202fas a precautionary measure,\u202fdespite not having received any reports\u202fof compromise from any SaaS or hosted customers.<\/p>\n<p>&#8220;[We] immediately notified our\u202fon-premises\u202fcustomers via email, in-product notices, and phone to shut down their VSA servers to prevent them from being compromised. We then followed our established incident response process to determine the scope of the incident and the extent that our customers were affected,&#8221; Voccola said.&nbsp;<\/p>\n<p>&#8220;We engaged our internal incident response team and leading industry experts in forensic investigations to help us determine the root cause of the issue. We notified\u202flaw enforcement and government cybersecurity agencies, including the FBI and CISA. While our early indicators suggested that\u202fonly\u202fa very small number of\u202fon-premises\u202fcustomers were affected, we\u202ftook\u202fa conservative approach\u202fin shutting down the SaaS servers\u202fto ensure we protected our more than 36,000 customers to the best of our ability.&#8221;\u202f\u202f&nbsp;<\/p>\n<p>So far, the company said they believe their SaaS customers &#8220;were never at-risk&#8221; and expects to\u202frestore\u202fservice\u202fto them in the next 24 hours once it is confirmed to be safe.<\/p>\n<p>According to Voccola, about 40 customers worldwide were affected and the company is preparing a patch to mitigate the vulnerability for any on-premises victims.&nbsp;<\/p>\n<p>&#8220;We&#8217;ve heard from\u202fthe vast majority\u202fof our customers that they experienced no issues at all, and I am grateful to our internal teams, outside experts, and industry partners who worked alongside of us to quickly bring this to a successful outcome,&#8221; Voccola added.&nbsp;<\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1411140009709670406\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Comment sections on Reddit<\/a> are now inundated with responses from customers trying to respond to the attack and restore systems.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>PREVIOUSLY: Kaseya has <a href=\"https:\/\/helpdesk.kaseya.com\/hc\/en-gb\/articles\/4403440684689-Important-Notice-July-2nd-2021\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">announced<\/a> that it is dealing with a massive ransomware attack that now may be affecting at least eight MSPs and hundreds of organizations.<\/p>\n<p>In a message posted to its website, the remote management solutions provider said it is &#8220;experiencing a potential attack against the VSA that has been limited to a small number of on-premise customers only as of 2:00 PM EDT today.&#8221;&nbsp;<\/p>\n<p>&#8220;We are in the process of investigating the root cause of the incident with an abundance of caution but we recommend that you IMMEDIATELY shutdown your VSA server until you receive further notice from us,&#8221; the company said.&nbsp;<\/p>\n<p>&#8220;It&#8217;s critical that you do this immediately, because one of the first things the attacker does is shut off administrative access to the VSA.&#8221;<\/p>\n<p>Kaseya has taken down all SaaS instances of its VSA remote monitoring and management tool in light of the attack.&nbsp;<\/p>\n<p>John Hammond, senior security researcher at Huntress, told <em>ZDNet<\/em> that they were first notified of the attack at 12:35 ET and said it &#8220;has been an all-hands-on-deck evolution to respond and make the community aware.&#8221;&nbsp;<\/p>\n<p>Hammond attributed the attack to the prolific REvil\/Sodinikibi ransomware group and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-hits-200-companies-in-msp-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Bleeping Computer<\/a>, <a href=\"https:\/\/therecord.media\/revil-ransomware-executes-supply-chain-attack-via-malicious-kaseya-update\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">The Record<\/a> and <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/ransomware-attack-software-manager-hits-200-companies-rcna1338\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">NBC News<\/a> all also reported that REvil or an affiliate was the culprit. Through an update to VSA software, REvil is allegedly spreading the ransomware widely.&nbsp;<\/p>\n<p>&#8220;We cannot emphasize enough that we do not know how this is infiltrated in Kaseya&#8217;s VSA. At the moment, no one does. We are aware of four MSPs where all of the clients are affected &#8212; 3 in the US and one abroad. MSPs with over thousands of endpoints are being hit,&#8221; Hammond said before Huntress updated its total to 8.&nbsp;<\/p>\n<p>&#8220;We have seen that when an MSP is compromised, we&#8217;ve seen proof that it has spread through the VSA into all the MSP&#8217;s customers. Kaseya&#8217;s VSA could be either on prem or cloud hosted. They currently have all of their cloud servers offline for emergency maintenance.&#8221;&nbsp;<\/p>\n<p>Hammond added that three of Huntress&#8217; partners have been impacted, with &#8220;roughly 200 businesses encrypted.&#8221;&nbsp;<\/p>\n<p>He explained that agent.crt is dropped by the Kaseya VSA and is then decoded with certutil to carve out agent.exe, and inside agent.exe it has embedded `MsMpEng.exe` and `mpsvc.dll`.&nbsp;<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/\" class=\"lazy\" alt=\"analysis.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/07\/02\/7d1d89e9-ceb6-4f2d-9cd2-96a122dcd006\/resize\/470xauto\/0ace1dede6d8e77257dae05a472ac4e7\/analysis.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/07\/02\/7d1d89e9-ceb6-4f2d-9cd2-96a122dcd006\/resize\/470xauto\/0ace1dede6d8e77257dae05a472ac4e7\/analysis.png\" class alt=\"analysis.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Huntress <\/span><\/figcaption><\/figure>\n<p>&#8220;The legitimate Windows Defender executable was used to side-load a malicious DLL. It is the same exact binary for all victims,&#8221; he said.&nbsp;<\/p>\n<p>Huntress has a <a href=\"https:\/\/old.reddit.com\/r\/msp\/comments\/ocggbv\/crticial_ransomware_incident_in_progress\/h3u5j2e\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Reddit threat of updates<\/a> about the situation and said there are indications that VSA admin user accounts are disabled only moments before ransomware is deployed.<\/p>\n<p>CISA <a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1411069203952640005\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">released a statement on Twitter<\/a> that said the organization is &#8220;taking action to understand and address the supply-chain ransomware attack against Kaseya VSA and the multiple MSPs that employ VSA software.&#8221;&nbsp;<\/p>\n<p>Mark Loman, a malware analyst for Sophos, shared a lengthy thread on Twitter about the attack and said some victims are already seeing a <a href=\"https:\/\/twitter.com\/markloman\/status\/1411053456983564300\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">ransom page demanding $44,999<\/a>. Hammond told ZDNet that Huntress has seen ransom demands of $5 million already.&nbsp;<\/p>\n<p>This is far from the first time Kaseya&#8217;s tools have been used to spread a ransomware attack. As ZDNet has previously reported, REvil&#8217;s predecessor Gandcrab leveraged Kaseya twice in 2019 to launch attacks, first <a href=\"https:\/\/www.zdnet.com\/article\/gandcrab-ransomware-gang-infects-customers-of-remote-it-support-firms\/\">using a Kaseya plugin<\/a> then <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gang-hacks-msps-to-deploy-ransomware-on-customer-systems\/\">VSA products<\/a> later that year.&nbsp;<\/p>\n<p>Ransomware actors typically launch attacks on weekends or at night because there are less people watching systems.&nbsp;<\/p>\n<p>Sophos <a href=\"https:\/\/community.sophos.com\/b\/security-blog\/posts\/active-ransomware-attack-on-kaseya-customers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">released a detailed guide<\/a> for potential victims to figure out if they are under attack. &nbsp;<\/p>\n<p>Chris Grove, technology evangelist with Nozomi Networks, said these types of supply chain attacks, like <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-the-more-we-learn-the-worse-it-looks\/\" target=\"_blank\" rel=\"noopener\">SolarWinds<\/a>, go &#8220;straight to the jugular of organizations looking to recover from a breach.&#8221;<br \/>&nbsp;<br \/>&#8220;These types of technology management solutions can have high concentrations of risk due to their large collection of enterprise accounts with elevated privileges, unrestricted firewall rules needed for them to operate, and a cultural &#8216;trust&#8217; that the traffic to\/from them is legitimate and should be allowed,&#8221; Grove said.&nbsp;<\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">SolarWinds Updates<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Victims are already seeing ransom demands ranging from $45,000 to $5 million.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-41602","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-02T22:33:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Kaseya urges customers to immediately shut down VSA servers after ransomware attack\",\"datePublished\":\"2021-07-02T22:33:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\"},\"wordCount\":996,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\",\"name\":\"Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\",\"datePublished\":\"2021-07-02T22:33:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kaseya urges customers to immediately shut down VSA servers after ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-02T22:33:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack","datePublished":"2021-07-02T22:33:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/"},"wordCount":996,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","url":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","name":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","datePublished":"2021-07-02T22:33:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/","contentUrl":"https:\/\/www.zdnet.com\/article\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Kaseya urges customers to immediately shut down VSA servers after ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41602"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41602\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}