Kaseya VSA Supply Chain Attack (2021)

Exploiting Trusted Third Parties

Victim:

Kaseya’s MSP customers

Attacker/Malware:

REvil’s Sodinokibi

Industry:

Widespread

Estimated Cost:

$70+M Ransoms

Primary Attack Vector:

Zero-Day Exploit in Supply Chain Software

Prevention Failure:

Implicit Trust in Supply Chain Software

BlastWave Solution:

Network Cloaking

Kill Chain Analysis:

Weaponizing Supply Chain Trust

The 2021 Kaseya VSA attack was a devastating supply chain compromise in which the REvil group exploited zero-day vulnerabilities in the Kaseya VSA software to gain access to vulnerable, internet-facing VSA servers. This managed service provider (MSP) tool was granted high levels of implicit trust across thousands of client networks.

The attackers leveraged zero-day exploits to upload malware and distribute a malicious update (posing as a legitimate hotfix) to client environments, deployingthe ransomware payload in a single step. This incident exploited the standard industry practice of granting significant, broad, and implicit trust to third-party software and vendors.

BlastWave Prevention Analysis:

Zero Trust for Vendor and Supply Chain Software

Traditional security models fail when the software itself is compromised. BlastWave mitigates this risk by enforcing Identity-Defined Microsegmentation (IDM)across all vendor- and supply-chain-related software communications.

First, the VSA servers would have been cloaked and undiscoverable on theInternet, ensuring the attack is blocked at the first attempt to breach the ZeroTrust boundary. Second, in an OT environment, patches are generally not pushed immediately, which is even more common in cloaked environments due to BlastShield’s virtual air gap.

A virtual Air Gap delays patching in the OT environment, allowing patches to be tested by other customers before implementation in your network.

Download Hackopedia Volume 1 Now – It's Free

Our Privacy Policy applies.

Take the Next Step

Reading about past failures is only useful if it changes future outcomes. If attackers can see your OT network, they can target it. If they can target it, compliance, safety, and uptime are already at risk.

BlastWave eliminates reconnaissance, initial access, and lateral movement — without agents, without downtime, and without changing IPs, protocols, or PLCs.

Secure Your OT Network