ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah

    IT Discussion
    msp ransomware security breach
    21
    111
    12.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @SmithErick
      last edited by

      @SmithErick said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

      Wonder if their RMM was the attack vector with that known ConnectWise / Kaseya depreciated integration?

      I would guess it is a decent chance.

      1 Reply Last reply Reply Quote 0
      • pmonchoP
        pmoncho @SmithErick
        last edited by

        @SmithErick

        Received my Cyberheist email from KnowBe4 about an hour ago and one article confirms that it was ConnectWise / Kaseya vulnerability from 2017 that was the vector.

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @pmoncho
          last edited by

          @pmoncho said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

          @SmithErick

          Received my Cyberheist email from KnowBe4 about an hour ago and one article confirms that it was ConnectWise / Kaseya vulnerability from 2017 that was the vector.

          We had a thread about that last week here on ML. We know that ConnectWise had vulnerable DLLs on their Windows installs. But we don't know if that was the case here. But we do know that they advertise publicly that they use some ConnectWise stuff, so the chances are relatively high.

          pmonchoP 1 Reply Last reply Reply Quote 0
          • pmonchoP
            pmoncho @scottalanmiller
            last edited by

            @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

            @pmoncho said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

            @SmithErick

            Received my Cyberheist email from KnowBe4 about an hour ago and one article confirms that it was ConnectWise / Kaseya vulnerability from 2017 that was the vector.

            We had a thread about that last week here on ML. We know that ConnectWise had vulnerable DLLs on their Windows installs. But we don't know if that was the case here. But we do know that they advertise publicly that they use some ConnectWise stuff, so the chances are relatively high.

            Yeah, I saw that.

            What I found interesting was that a source stated that the update was either not installed or not installed "correctly." What is "not installing correctly" with regards to Connectwise?

            scottalanmillerS 1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller @pmoncho
              last edited by

              @pmoncho said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

              @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

              @pmoncho said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

              @SmithErick

              Received my Cyberheist email from KnowBe4 about an hour ago and one article confirms that it was ConnectWise / Kaseya vulnerability from 2017 that was the vector.

              We had a thread about that last week here on ML. We know that ConnectWise had vulnerable DLLs on their Windows installs. But we don't know if that was the case here. But we do know that they advertise publicly that they use some ConnectWise stuff, so the chances are relatively high.

              Yeah, I saw that.

              What I found interesting was that a source stated that the update was either not installed or not installed "correctly." What is "not installing correctly" with regards to Connectwise?

              Good question. How does Connectwise get "installed incorrectly" that puts it at risk? And why do they make it so easy to do that someone actually did?

              1 Reply Last reply Reply Quote 0
              • DustinB3403D
                DustinB3403
                last edited by DustinB3403

                Does ConnectWise come with a default set of credentials to use and access that needs should to be changed once the installation is complete?

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @DustinB3403
                  last edited by

                  @DustinB3403 said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                  Does ConnectWise come with a default set of credentials to use and access that needs should to be changed once the installation is complete?

                  Not the ConnectWise products that we use, but don't know about their broader suites.

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @DustinB3403
                    last edited by

                    @DustinB3403 said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                    @proteksupport now is your chance to clear things up. Otherwise we have to assume the information posted in the OP at least as some basis in truth.

                    Still waiting to hear what part of direct reports is untrue. We will certainly take any claims to the client to verify. But we need to know which piece(s) Protek is claiming were not true. Because it's all first hand info.

                    1 Reply Last reply Reply Quote 1
                    • IRJI
                      IRJ
                      last edited by

                      Screenshot_2019-02-12-13-39-45-880_com.brave.browser.png

                      That page is now mysteriously gone.

                      scottalanmillerS 1 Reply Last reply Reply Quote 2
                      • scottalanmillerS
                        scottalanmiller @IRJ
                        last edited by

                        @IRJ LOL, we had actually been giggling about that the other day

                        1 Reply Last reply Reply Quote 1
                        • scottalanmillerS
                          scottalanmiller @Reid Cooper
                          last edited by

                          @Reid-Cooper said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                          Looks like up until a few days ago they were really active on Twitter. And then went silent around when the supposed issue began.

                          https://twitter.com/proteksupport

                          Their last posts before going silent were all about security and avoiding things like ransomware.

                          Just checked it again, still silent. Pretty suspicious.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            A second customer of Protek came forward and confirmed the ransomware situation. So definitely looking for Protek to respond with what part of the customers' statements is not true.

                            1 Reply Last reply Reply Quote 1
                            • scottalanmillerS
                              scottalanmiller
                              last edited by scottalanmiller

                              So they are sending this to customers, while still claiming it isn't true?

                              Protek Support Ransomware Utah

                              ObsolesceO 1 Reply Last reply Reply Quote 4
                              • ObsolesceO
                                Obsolesce @scottalanmiller
                                last edited by Obsolesce

                                @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                So they are sending this to customers, while still claiming it isn't true?

                                Protek Support Ransomware Utah

                                Do we know if the cause of the ransomware hit to these places were due to Protek, or that they just happen to be protek customers, or a 3rd party service for example that protek uses for it's customers? Or was Protek itself hacked, and therefore customers networks exposed....?

                                What's really going on?

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @Obsolesce
                                  last edited by

                                  @Obsolesce said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                  @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                  So they are sending this to customers, while still claiming it isn't true?

                                  Protek Support Ransomware Utah

                                  Do we know if the cause of the ransomware hit to these places were due to Protek, or that they just happen to be protek customers, or a 3rd party service for example that protek uses for it's customers? Or was Protek itself hacked, and therefore customers networks exposed....?

                                  What's really going on?

                                  Protek isn't saying and they aren't responding here and their Twitter feed is silent since this happened. What we know for sure is that multiple (and rumor is "all") of their customers were hit at the same time. Whether or not Protek was hacked themselves, or was ransomed themselves we have no way to know.

                                  We do know that Protek is the responsible party that had to pay the ransom, it was not coincidental that their customers were hit, it was a problem on the Protek side that caused or allowed it to happen. Protek was the vector through which it happened.

                                  If it was a third party service, you'd expect the third party to have to have paid.

                                  ObsolesceO 1 Reply Last reply Reply Quote 3
                                  • ObsolesceO
                                    Obsolesce @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                    @Obsolesce said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                    @scottalanmiller said in Protek Support MSP Ransomware Hits Customers in Salt Lake City, Utah:

                                    So they are sending this to customers, while still claiming it isn't true?

                                    Protek Support Ransomware Utah

                                    Do we know if the cause of the ransomware hit to these places were due to Protek, or that they just happen to be protek customers, or a 3rd party service for example that protek uses for it's customers? Or was Protek itself hacked, and therefore customers networks exposed....?

                                    What's really going on?

                                    Protek isn't saying and they aren't responding here and their Twitter feed is silent since this happened. What we know for sure is that multiple (and rumor is "all") of their customers were hit at the same time. Whether or not Protek was hacked themselves, or was ransomed themselves we have no way to know.

                                    We do know that Protek is the responsible party that had to pay the ransom, it was not coincidental that their customers were hit, it was a problem on the Protek side that caused or allowed it to happen. Protek was the vector through which it happened.

                                    If it was a third party service, you'd expect the third party to have to have paid.

                                    Gotcha, makes sense now.

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller
                                      last edited by

                                      Now if only Protek would own up and admit what happened, we'd know some more. Without them willing to engage in a dialogue, everyone automatically kind of jumps to the worst possible case in their minds. Given that their remediation is not going well (that's how we found out about it, they weren't actively fixing affected customers for a while, and possibly not at all yet, we don't know) it seems like going public with an apology and explanation would be the best thing to do.

                                      1 Reply Last reply Reply Quote 2
                                      • scottalanmillerS
                                        scottalanmiller
                                        last edited by

                                        Just decided to check in on their Twitter feed again. Still nothing. Total silence since the issue began. No word if any customers have been restored yet.

                                        1 Reply Last reply Reply Quote 2
                                        • scottalanmillerS
                                          scottalanmiller
                                          last edited by

                                          Just looking at this a month later (one month to the day.) Still waiting on clarification from Protek as to what they meant when they said that this didn't happen. Their Twitter and Facebook still remain silent, having gone dark the day that this occurred. They website doesn't have new content (but few would.) But did just before. The only change seems to be that they used to prominently display their team on their site, and that appears to have been removed from what I can tell. If I were to guess, that's either because too many of those people are no longer there and/or the site made it really clear that the staff were nearly all break/fix reactive techs and that there was only one "proactive" staffer in the entire company (Protek's own words) so advertising themselves as a proactive solution probably didn't fly.

                                          1 Reply Last reply Reply Quote 1
                                          • DustinB3403D
                                            DustinB3403
                                            last edited by

                                            The entire page has just been removed.

                                            chrome_2019-03-05_08-06-19.png

                                            scottalanmillerS black3dynamiteB 2 Replies Last reply Reply Quote 2
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 4 / 6
                                            • First post
                                              Last post