Kaseya agent registry keys11/30/2023 ![]() ![]() So far, we don’t see any substantial discrepancy between the results of our investigation and the publicly available IOCs that have been shared. ![]() We are thankful for all information that other security researchers and response teams have been sharing, such as Huntress and Kevin Beaumont. We have been investigating this issue and our CSIRT team have been working around the clock to help affected organizations. EDIT 17:40 CET: Added redacted screenshots of exploit traffic EDIT 23.10 CET: Added additional details and attack overview EDIT 19.40 CET: Added methods to identify compromised systems EDIT 17.14 CET: Added link to script to identify infected systems EDIT 14.45 CET: Further clarified the identified steps of the exploit
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |