{"id":40482,"date":"2020-04-28T21:08:58","date_gmt":"2020-04-28T17:08:58","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=40482"},"modified":"2025-11-21T13:29:47","modified_gmt":"2025-11-21T09:29:47","slug":"takeaways-from-2019-ransomware-attacks-on-msps","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/takeaways-from-2019-ransomware-attacks-on-msps\/","title":{"rendered":"Takeaways From 2019 Ransomware Attacks on MSPs"},"content":{"rendered":"<p>If you are <a href=\"https:\/\/www.msp360.com\/resources\/blog\/what-is-an-msp\/\">an MSP<\/a> or use the services of one, you should be aware that the level of cyberthreat for MSPs has increased dramatically over the last year.<\/p>\n<p>As we\u2019ve previously pointed out, the range of threat vectors faced by the average MSP is now huge, from <a href=\"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/\">social engineering attacks<\/a> to <a href=\"https:\/\/www.msp360.com\/resources\/blog\/cryptojacking-how-to-detect-and-avoid\/\">cryptojacking<\/a>, alongside the ever-present threat of phishing.<!--more--><\/p>\n<p>Recent hacks against MSPs have illustrated that MSPs not only face an increased threat level, but that the sophistication of these attacks has been slowly increasing. In this article, we'll review a few recent hacks against MSPs, look at why MSPs are becoming a major target for hackers, and then cover what you can do to protect yourself.<\/p>\n<h2>Recent Hacks Against MSPs<\/h2>\n<p>The most recent review of the scale of hacking that MSPs face has come not from cybersecurity analysts or industry groups, but from the US government. Back at the beginning of last year, the US Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion\" target=\"_blank\" rel=\"noopener noreferrer\">released a detailed report<\/a> that highlighted the threats that MSPs face from state-sponsored hackers.<\/p>\n<p>The report claimed that two Chinese nationals had \u201cconducted global campaigns of computer intrusions targeting, among other data, intellectual property and confidential business and technological information at managed service providers (MSPs).\u201d<\/p>\n<p>Unfortunately, many in the industry didn\u2019t pay the report the attention it was due. That might have been because the DoJ made something of a mistake in the way they titled the report. Many MSPs thought, given the connection between the hacks and the Chinese government, that they were primarily targeting governmental and military systems.<\/p>\n<p>That is not the case.<\/p>\n<p>In fact, the last year has seen a huge increase in the number of attacks on MSPs of all sizes, in all sectors, and across all systems. Many popular WordPress-based websites - including several high-profile MSPs - have been subjected to DDoS attacks, and others have reported sophisticated <a href=\"https:\/\/www.msp360.com\/resources\/blog\/spear-phishing-prevention\/\">spear phishing<\/a> attempts.<\/p>\n<p>The most high-profile of these was reported in Dark Reading earlier this year, and concerned an MSP that was breached and then held to ransom. \u201cThe attack resulted in some 1,500 to 2,000 systems belonging to the MSP\u2019s clients getting cryptolocked,\u201d the report stated, \u201cand the MSP itself facing a $2.6 million ransom demand.\u201d<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">Steps for Keeping Backup Data Safe from Ransomware<\/div>\n<div class=\"call-to-action__text\">Find out the main strategies for protecting data backups from ransomware<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" data-portal=\"5442029\" data-id=\"08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><span class=\"hs-cta-node hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" id=\"hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Group-176.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h2>Why MSPs?<\/h2>\n<p>Though cyberattacks against companies of all types are growing, the level of growth in the threats that MSPs face is increasing exponentially.<\/p>\n<p>The reason hackers are now targeting MSPs is precisely the reason that many companies turn to MSPs to manage their IT systems. The typical MSP holds sensitive (and potentially lucrative) data across many clients.<\/p>\n<p>The benefits of this for companies are clear enough: contracting an MSP to handle high-value systems can dramatically decrease overheads, while increasing security. This is the reason why the MSP market has grown so rapidly over the past few years, and is expected to grow from $180.5 billion in 2018 to $282.0 billion by 2023.<\/p>\n<p>Unfortunately, MSPs have become a victim of their own success.<\/p>\n<p>For hackers, a major advantage of going after MSPs is not just the sheer number of MSPs around. More than that, some basic features of the MSP business model mean that the data held by these companies is extremely valuable.<\/p>\n<p>For example, MSPs will often have agreements with payment processors to provide merchant services to companies in order to act as a payment gateway to process transactions. Since processors like this are built to <a href=\"https:\/\/www.getweave.com\/payment-processing-for-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">handle virtually all payment situations<\/a> (including point-of-sale systems or payment submissions over mobile apps), there is a massive amount of financial data being collected.<\/p>\n<p>This data is a huge temptation for criminals, whether their crime model is ransoming mission-critical data or stealing high-value intellectual property. One hack can be used to obtain valuable data on multiple targets, all of whom meet the appropriate victim profile.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/are-your-clients-more-secure-than-you-do-something-about-it\/\">Why Are Cybercriminals Targeting MSPs?<\/a><\/p>\n<h2>The Response<\/h2>\n<p id=\"last\">The increased threat level that MSPs face requires a multi-channel response.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>The first and most critical response that MSPs must make is to conduct a comprehensive <a href=\"https:\/\/www.msp360.com\/resources\/blog\/it-security-audit-guide\/\">IT security audit<\/a>. Even if you complete security audits on a regular basis, now is the time to complete a one-off assessment.<\/p>\n<p>The threats that are covered in the DoJ report were likely not included in your last such audit, and they need to be. The warnings that have come over the last year also mean that it is now impossible for MSPs to claim that they were unaware of an increased threat level, and cyber insurance should be looked at accordingly.<\/p>\n<p>Secondly, look at the technical tools you have in place to defend against hackers. In this regard, it\u2019s useful to look at the Australian government\u2019s document on \u201c<a href=\"https:\/\/cyber.gov.au\/government\/news\/msp-e8\/\" target=\"_blank\" rel=\"noopener noreferrer\">Implementing the Essential Eight for MSPs<\/a>,\u201d which was released in direct response to the DoJ warning. The \u201cessential eight\u201d of the title are a set of security measures that the Australian Cyber Security Centre has put together.<\/p>\n<p>In summary, these measures are application whitelisting, application patching, application hardening, restricting administrative privileges, <a href=\"https:\/\/www.msp360.com\/resources\/blog\/mfa-for-msps\/\">multi-factor authentication<\/a>, OS patching, <a href=\"https:\/\/www.baculasystems.com\/blog\/seven-steps-for-hardening-backup-system-vulnerabilities\" target=\"_blank\" rel=\"noopener noreferrer\">hardening backup systems<\/a>, and adjusting Microsoft Office macro settings.<\/p>\n<p>To this, we would add that all of your endpoints \u2013 whether enterprise- or consumer-facing \u2013 need to be covered by a quality cybersecurity suite. This includes basic steps like moving to https and ensuring that your systems have <a href=\"https:\/\/www.msp360.com\/resources\/blog\/security-certifications-for-mssps\/\">security certifications<\/a> to protect yourself against more-exotic attack vectors, such as Bluetooth security vulnerabilities. And it goes without saying that all public systems should be protected by two-factor authentication and IoT-device security audits.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/designing-a-ransomware-response-plan\/\">Designing a Ransomware Response Plan<\/a><\/p>\n<h2>Expect the Unexpected<\/h2>\n<p>For many in the MSP sector, news of increased threats will not come as a surprise. In fact, some have been expecting such a rise, as hackers recognize the value of the data held by MSPs. In this context, MSPs should see the recent uptick in attacks as an opportunity to improve their security measures, rather than as an opportunity to panic.<\/p>\n<p>In truth, the recent increase in attacks is just the latest in the long arms race between hackers and their victims. Many of the techniques used in the recent attacks against MSPs have long been staples of the cybersecurity industry, and - apart from besides their increased frequency - will represent little that is new to experienced cybersecurity pros.<\/p>\n<p>For now, MSPs are on top. It remains to be seen when \u2013 if ever \u2013 new types of attack, such as those utilizing sophisticated deepfakes, will be seen in the wild. But it is as important as ever that companies in all sectors, and especially MSPs, prepare for the worst.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you are an MSP or use the services of one, you should be aware that the level of cyberthreat for MSPs has increased dramatically over the last year. As we\u2019ve previously pointed out, the range of threat vectors faced by the average MSP is now huge, from social engineering attacks to cryptojacking, alongside the [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":40483,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-40482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=40482"}],"version-history":[{"count":3,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40482\/revisions"}],"predecessor-version":[{"id":61429,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40482\/revisions\/61429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/40483"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=40482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=40482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=40482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}