

- #MASSIVE ACTIVATION PATCH PATCH#
- #MASSIVE ACTIVATION PATCH SOFTWARE#
- #MASSIVE ACTIVATION PATCH OFFLINE#
July 11, 2121: Kaseya VSA SaaS Restore and On-Premises Patch Begins The SaaS restore appears complete, though Kaseya did have some unplanned SaaS infrastructure maintenance during the restore day. After a July 6 delay, Kaseya’s SaaS-based VSA platform began a re-activated with security enhancements on Sunday, July 11, 2021.July 12, 2021: Kaseya VSA SaaS Restore and On-Premises Patch Progress When the VSA attack initially occurred, ConnectWise said it was disabling the IT Glue connection out of an abundance of caution. ConnectWise also performed a risk assessment, and then reactivated the ConnectWise Manage and Automate integrations with IT Glue. Kaseya had hired Mandiant to investigate the VSA attack. ConnectWise reactivated the connection after receiving written assurances from Mandiant that IT Glue was not impacted by the VSA incident. ET, has reactivated an integration with IT Glue - an MSP documentation platform owned by Kaseya. ConnectWise-IT Glue Integration: ConnectWise, as of 10:00 a.m.
#MASSIVE ACTIVATION PATCH OFFLINE#
REvil Disappears: Websites run by the ransomware gang REvil suddenly became unreachable, sparking widespread speculation that the group had been knocked offline perhaps by the U.S. CISA Guidance for Kaseya MSPs: The CISA (Cybersecurity and Information Security Agency) has issued this guidance for MSPs and customers that run Kaseya’s VSA software.Ģ. July 13, 2021: CISA Guidance REvil Disappears ConnectWise Re-Activates IT Glue Integrationġ. Emsisoft has confirmed the key is effective at unlocking victims, Kaseya adds.

Kaseya did not say whether the company paid the REvil ransomware gang any type of extortion to obtain the key.

#MASSIVE ACTIVATION PATCH SOFTWARE#
