Discover & Test your Ransomware
Free Assessment to discover your Ransomware Attack Surface
- Exposed Vulnerability discovery susceptible to ransomware
- Discovery of RDP and other exposed Risky Ports
- Exposed Databases, Cloud Buckets, Risky APIs
- Discover Kaseya exposure
Note: We will provide an expert walkthrough of your findings using the FireCompass portal and followed by an Executive Summary report. We are providing free assessments to a limited number of organizations only.
REvil ransomware conducted a massive attack through the Kaseya VSA patch and remote management software that encrypted MSPs worldwide and their customers. The zero-day Kaseya vulnerability was discovered by DIVD researcher Wietse Boonstra and was assigned the CVE-2021-30116 identifier. Kaseya states that REvil used the Zero-day vulnerability in their on-premise VSA service to conduct the attack and that a patch would be released soon.
REvil ransomware gang targeted MSPs with thousands of customers, through what appears to be a Kaseya VSA supply-chain attack. Eight known large MSPs that have been hit as part of this supply-chain attack. Kaseya issued a security advisory on their help desk site, warning all VSA customers to immediately shut down their VSA server to prevent the attack’s spread while investigating.
At FireCompass, we help organizations to constantly monitor and discover potential vulnerabilities in open ports, unpatched servers that are vulnerable to ransomware. We will then perform safe active attacks on the organisation’s systems by simulating scenarios like that of a ransomware actor. We provide successful attack narratives along with possible mitigation strategies. We are happy to announce that FireCompass would be providing Free Ransomware Risk Assessment.