06 Jul 2021

Managed service providers & supply chains – The backdoor to your network

By Stuart Slater

Those of you who enjoy keeping track of IT security news over their weekends may be a bit too familiar with the name “Kaseya” today. For those who aren’t, what is Kaseya?

Kaseya is a software company based out in Florida, USA, who provide IT management software to managed service providers (MSPs) to allow IT teams to remotely manage networks, systems and information technology for their clients. They offer a range of tools, but the one we’re most interested in today is a program called Kaseya VSA.

Kaseya VSA is used by MSPs to provide IT security and administration to their clients remotely, in lieu of an in-house IT support team. This meant that Kaseya VSA had to have access to administrative level processes in order to patch machines, manage backups and anti-virus programs.

An organization named REvil, who are commonly known in the cyber security world as one of the most infamous ransomware operators in the world (also associated with the Colonial Pipeline attack that affected fuel distribution to 45% of East Coast, USA), saw this as an opportunity to gain easy access to a multitude of client networks.

Perhaps you should consider asking your MSP what they’re doing to ensure they’re keeping you safe

Therefore, using a SQLi* vulnerability within Kaseya VSA, attackers were able to access the administration panel for all MSPs and deploy an application that disabled Windows’ built-in protection (Windows Defender), then proceeded to encrypt data on client networks. The cyber security company who initially detected the incident, Huntress Labs, have said they were tracking around 30 MSPs across the US, Australia, EU and Latin America, where well over 1,000 businesses were affected by the ransomware attack.

*SQLi is short for an SQL injection attack, whereby an attacker will use malicious SQL code to gain access to the backend database of your website, to access sensitive information that is normally hidden to a user.

REvil have since announced on 4th July that their price to decrypt all victims has been set at $70 million (approximately £50.5 million), which, if paid, would overtake the current $4.5 million record that would appear a small sum in comparison.

What does this teach us?

Firstly, it should be said that an attack of this magnitude is unlikely to be on any MSP’s risk register, and that MSPs cannot be blamed for an unknown vulnerability in a piece of software they use to administrate. For the MSPs who are affected by this, I really hope they can do right by their clients and learn valuable lessons.

But what if this happened to a software company who willingly ignored a vulnerability? This isn’t to say Kaseya did that, as we simply don’t know, but there is evidence of companies who do just that. This leads us to our next question: How can we be sure that companies supplying services to our organization are using tools that are responsibly patching vulnerabilities?

This question leads to the core of supply chain security, and expecting everyone within your supply chain to have a level of security that assures others that you will not fall victim to an attack. With this in mind, perhaps you should consider asking your MSP, the company you buy software from, what they’re doing to ensure they’re keeping you safe, before it’s too late.

Find out more about our cyber security experts.

Get in touch

Related insights

Selling shares in your company: Understanding the income tax trap 

1 April 2026

Read
A calendar with the last date of the month circled - it has 'pay day' written on it with a smiley face.

Payroll compliance: Navigating upcoming changes and reforms

1 April 2026

Read
Three people in business attire are seated at a desk in an office, reviewing a document together. The person on the left is pointing at the document while the other two look on attentively.

National minimum wage underpayments and how to prevent them

31 March 2026

Read
Six secondary school students sitting in class whilst two students have their hands up to answer a question.

Academies Accounts Direction 2025 to 2026 published

30 March 2026

Read
A group of 10 PKF Francis Clark colleagues posing with a trophy at the black tie Best Workplaces Awards event

We're up to sixth in UK’s Best Large Workplaces 2026 – and remain top-ranked accountancy firm

19 March 2026

Read
Street of terraced houses

How distributions in specie impact capital allowances

17 March 2026

Read
Group of people smiling in office

Director national insurance contributions

16 March 2026

Read

Incentivising your employees with growth shares

13 March 2026

Read
A group of four colleagues having a discussion around a board room table.

Employment related securities year end: what has to be reported?

9 March 2026

Read
Two female business owners sat at a desk working out their VAT on a laptop computer.

What is employment related securities (ERS) year end reporting?

9 March 2026

Read

2025/26 year end tax planning guide

5 March 2026

Read

Enterprise management incentives scheme now available to larger companies

4 March 2026

Read