Skip to main content

OXEN Technology’s Statement on the Kaseya Ransomware Attack

Statement on Kaseya Supply Chain Hack

OXEN is aware of the highly disruptive Kaseya ransomware attack, which has impacted thousands of businesses across the world. This attack came through some Managed Service Providers (MSPs) using the Kaseya VSA remote monitoring & management tool, which was used to infect their end-customers with REvil ransomware.

We want to first let you know that OXEN and our clients were not affected by this hack. OXEN does not utilize Kaseya VSA software. We are still actively keeping up with this event to learn, mature, and strengthen our own security practices. At this time, unless you have reason to believe that another vendor of yours utilizes Kaseya VSA software, you do not need to take any action to respond to this breach, but there is always some lesson to be learned.

Kaseya’s response appears to have been swift, decisive, and coordinated: communicating quickly and recommending to their customers that all VSA servers be shut down immediately. They even shut down their own cloud/SaaS-hosted servers to be sure they are unaffected while they investigate, assess, and patch their software, supply chain, and environment. While much remains to be seen, at least this response shows how much has been learned since the recent SolarWinds attack, which affected many in our industry over the last year.

Our industry is constantly targeted, and new vulnerabilities and breaches are discovered almost daily. OXEN is vigilant in our efforts to continually improve our security and that of our clients, and to strengthen our incident response to be able to quickly detect, alert on, and respond to security events in order to best protect our clients should a breach of one of our critical vendors occur in the future.

One of the key tenets of security is to assume that at some point you will be breached. It is not a matter of IF, but WHEN it will happen. The proactive choices we make to protect ourselves can prevent some breaches, but the proactive planning far in advance of actually experiencing a breach is what can allow a business to quickly recover and limit the damage of such an event.

Our responsibility to protect our customers is something that OXEN takes very seriously. We know there is always more we can do. While this event is likely to result in lost revenue, hardship, and pain for the businesses that were affected, it also serves as a warning and an opportunity for our industry to become stronger and smarter. we want to assure you that OXEN will learn from and leverage this and future events, to better protect ourselves and our clients.

Make no mistake, we must not put our heads in the sand. Now is the time to be diligent in our efforts to protect and plan so that businesses can survive and thrive. OXEN is here to help you do that. Please don’t hesitate to reach out to us at hello@oxen.tech or 888.296.3619 should you have any questions or concerns.


Recent Posts / View All Posts

social engineering tactics

How Hackers Use Social Engineering Tactics in Phishing Scams

| Business Productivity, Security | No Comments
Social engineering is quite a buzzword these days in the world of cybersecurity. But what is it, and why are businesses so afraid of it? It is a form of hacking that uses deception and manipulation to get victims to divulge information. Companies have reason to be fearful because social engineering tactics have led to a lot of destruction and millions of dollars in losses for businesses worldwide. Phishing is one of the most rampant types of attacks these days. It has been highly successful because it uses tried-and-tested social engineering techniques to hoodwink potential victims. What are these Social…
spot social engineering

Training Employees to Spot Social Engineering

| Security, Tech Tip | No Comments
Social engineering is one of the newest methods hackers use to access sensitive information. Rather than attacking a system directly, this technique relies on human psychology to gain information. This method is brilliant when you think about it because it does not have to deal with going past ironclad network security. If hackers can manipulate even a single employee, they might hand over sensitive information on a silver platter, and the hackers can take control of the organization’s entire system. This is why its important for your employees to learn how to spot social engineering. Companies must understand that if…
Phishing Scam Tactics

Top 8 Phishing Scam Tactics and How to Identify Them

| Business Productivity, Security, Tech Tip | No Comments
Phishing has been a common hacking method for over two decades now. You would think that everyone would already know how it works and how to avoid becoming a victim, right? Sadly, that is not the case for these Phishing Scam Tactics. There are more victims now than ever. In 2022, there were more than 300,000 victims in the US alone, with damages amounting to over $52 million! The thing is that phishing scams have evolved over the years. Hackers are now more adept at hoodwinking unsuspecting victims, and they also have easy access to modern technology that helps elevate…