Malwarebytes has spotted a malware campaign which is taking advantage of the Kaseya software gap. The malicious email was sent to a UK business posing as a security update. The link itself pointed to a server containing a malicious download. The intent of the attack appears to have been to install Cobalt Strike, which could have granted malicious hackers remote access to the targeted companys network and PCs. The latest news is that its attempt to bring its SaaS services back online has failed, missing its original intention of making systems online.”]
Source: https://grahamcluley.com/malware-campaign-targets-companies-waiting-for-kaseya-security-patch/

