{"id":13069,"date":"2019-03-28T18:38:01","date_gmt":"2019-03-28T14:38:01","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/msp-as-a-threat-vector\/13069\/"},"modified":"2019-11-15T15:22:23","modified_gmt":"2019-11-15T11:22:23","slug":"msp-as-a-threat-vector","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/msp-as-a-threat-vector\/13069\/","title":{"rendered":"MSPs as a threat vector"},"content":{"rendered":"<p>Becoming a \u201clink\u201d in a supply-chain attack is an unpleasant experience for any organization \u2014 and twice as unpleasant for a managed service provider (MSP). That\u2019s especially so if security system management is one of its services. And yet this situation is not as speculative as we would like it to be.<\/p>\n<p>In fact, malefactors generally pay close attention to MSPs. Think about it: MSPs have direct access to the infrastructure of many other firms. Once you are safely inside an MSP\u2019s network, you have unlimited opportunities for data theft or infection. This is why cybercriminals closely scrutinize MSPs\u2019 toolkits and wait for one to commit an error. A little while back, some of those cybercriminals got what they wanted: <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-18362\" target=\"_blank\" rel=\"noopener nofollow\">Unauthenticated attackers took advantage of an MSP\u2019s software vulnerability to install cryptomalware payload<\/a>.<\/p>\n<h2>What kind of vulnerability?<\/h2>\n<p>The vulnerability resided in ConnectWise\u2019s ManagedITSync plug-in for cross-integration between the professional services automation platform ConnectWise Manage and the Kaseya VSA remote monitoring and management system.<\/p>\n<p>The vulnerability allows remote modification of the Kaseya VSA database. This, in turn, enables attackers to add new users with any access rights whatsoever and create any tasks \u2014 such as uploading malware to all of the MSPs\u2019 clients\u2019 computers.<\/p>\n<p>This is not a new vulnerability. It was discovered back in 2017. As soon as it was, ConnectWise updated its plug-in and seemed to have neutralized the threat. But, as usual, not all users installed the update.<\/p>\n<h2>Details of the incident<\/h2>\n<p>According to the Huntress Labs <a href=\"https:\/\/blog.huntresslabs.com\/cve-2017-18362-arbitrary-sql-injection-in-mangeditsync-integration-ba142ff24f4d\" target=\"_blank\" rel=\"noopener nofollow\">research team<\/a>, the vulnerability was used by unidentified hackers to attack an unnamed MSP\u2019s client computers using a piece of encryption ransomware called GandCrab. Taking advantage of the fact that Kaseya had administrator access to all end-user devices, the attackers created a task to download and run the malware on endpoints. The danger of GandCrab is covered <a href=\"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/\" target=\"_blank\" rel=\"noopener nofollow\">in this post<\/a>.<\/p>\n<p>There is no information stating whether this case was the only one, but around the same time, the US Cybersecurity and Infrastructure Security Agency (CISA) issued a <a href=\"https:\/\/ics-cert.us-cert.gov\/CISA-Awareness-Briefing-Chinese-Malicious-Cyber-Activity\" target=\"_blank\" rel=\"noopener nofollow\">warning<\/a> about the rise in Chinese actors\u2019 malicious cyberactivity targeting MSPs.<\/p>\n<h2>What\u2019s to be done?<\/h2>\n<p>First, don\u2019t forget to update your software. If you\u2019re looking for a solution to the particular integration problem between ConnectWise Manage and Kaseya VSA, start by <a href=\"https:\/\/marketplace.connectwise.com\/kaseya\" target=\"_blank\" rel=\"noopener nofollow\">updating the integration tool<\/a>.<\/p>\n<p>But do not trust this was an isolated incident. Likely as not, the same or other attackers are already looking for other ways to get to MSPs\u2019 clients.<\/p>\n<p>Therefore, your own infrastructure protection must be taken no less seriously than that of your clients\u2019 infrastructure. If you provide security services, you have all the tools you need to safeguard your own systems \u2014 especially if you have the protection solutions management console already deployed.<\/p>\n<p>You can read more about Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/advert\/partners\/managed-service-provider?redef=1&amp;THRU&amp;reseller=gl_kdmsp_acq_ona_smm__onl_b2b__wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">offerings for MSPs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers display active interest in MSPs, exploiting vulnerabilities to infect their clients with cryptomalware.<\/p>\n","protected":false},"author":700,"featured_media":13070,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1716,433,268],"class_list":{"0":"post-13069","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-msp","10":"tag-ransomware","11":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/msp-as-a-threat-vector\/13069\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/msp-as-a-threat-vector\/15522\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/msp-as-a-threat-vector\/17447\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/msp-as-a-threat-vector\/15596\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/msp-as-a-threat-vector\/14277\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/msp-as-a-threat-vector\/18139\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/msp-as-a-threat-vector\/17105\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/msp-as-a-threat-vector\/22513\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/msp-as-a-threat-vector\/26209\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/msp-as-a-threat-vector\/11610\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/msp-as-a-threat-vector\/10545\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/msp-as-a-threat-vector\/18882\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/msp-as-a-threat-vector\/23912\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/msp-as-a-threat-vector\/18206\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/msp-as-a-threat-vector\/22377\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/msp-as-a-threat-vector\/22313\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/msp\/","name":"MSP"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13069"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13069\/revisions"}],"predecessor-version":[{"id":14476,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13069\/revisions\/14476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13070"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}