Skip to main content

Kaseya VSA 0-day - REvil Ransomware Supply Chain Attack

This Playbook is part of the Rapid Breach Response Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

On July 2nd, Kaseya company has experienced an attack against the VSA (Virtual System/Server Administrator) product. Kaseya customers pointed out a ransomware outbreak in their environments. Further investigation revealed that REvil group exploited VSA zero-day vulnerabilities for authentication bypass and arbitrary command execution. This allowed the attacker to deploy ransomware on Kaseya customers' endpoints.

This playbook should be trigger manually and includes the following tasks:

  • Collect related known indicators from several sources.
  • Indicators, PS commands, Registry changes and known HTTP requests hunting using PAN-OS, Cortex XDR and SIEM products.
    • Splunk advanced queries can be modified through the playbook inputs.
    • QRadar query is done using Reference Set and "QRadar Indicator Hunting V2" playbook
  • Search for internet facing Kaseya VSA servers using Xpanse.
  • Block indicators automatically or manually.
  • Provide advanced hunting and detection capabilities.
  • Mitigation using Kaseya On-Premises and SaaS patch.

More information: Kaseya Incident Overview & Technical Details

Note: This is a beta playbook, which lets you implement and test pre-release software. Since the playbook is beta, it might contain bugs. Updates to the pack during the beta phase might include non-backward compatible features. We appreciate your feedback on the quality and usability of the pack to help us identify issues, fix them, and continually improve.


This playbook uses the following sub-playbooks, integrations, and scripts.


  • Post Intrusion Ransomware Investigation
  • Splunk Indicator Hunting
  • Block Indicators - Generic v2
  • Palo Alto Networks - Hunting And Threat Detection
  • Search Endpoints By Hash - Generic V2
  • QRadar Domain Indicators Hunting
  • Panorama Query Logs for Kaseya breach Threat IDs
  • QRadar Indicator Hunting V2


  • SplunkPy


  • ParseHTMLIndicators
  • http
  • SearchIncidentsV2
  • isError


  • qradar-get-reference-by-name
  • splunk-search
  • setIndicators
  • expanse-get-issues
  • linkIncidents
  • qradar-create-reference-set-value
  • qradar-create-reference-set
  • closeInvestigation
  • extractIndicators
  • qradar-delete-reference-set

Playbook Inputs#

NameDescriptionDefault ValueRequired
BlockIndicatorsAutomaticallyWhether to automatically block the indicators involved.FalseOptional
SplunkEarliestTimeThe earliest time for the Splunk search query.-14dOptional
SplunkLatestTimeThe latest time for the Splunk search query.nowOptional
YaraRulesSourceThe source of the Yara rules
SigmaRulesSourceThe source of the Sigma rules
QRadarSearchTimeRangeThe time range for the QRadar search query.LAST 14 DAYSOptional
SplunkAdvancedSearch4FilesandRegSearch splunk for related REvil - Kaseya breach file names.index=* "c:\kworking\agent.exe" OR "c:\windows\mpsvc.dll" OR "c:\windows\system32\sfc.dll" OR "c:\kworking\binco-readme.txt" OR "c:\kworking\agent.crt" OR "c:\windows\cert.exe" OR "SOFTWARE\BlackLivesMatter"Optional
SplunkAdvancedSearch4PSCMDSearch Splunk for related REvil - Kaseya breach Powershell behaviours.index= "C:\Windows\cert.exe & echo %RANDOM%" OR "C:\Windows\cert.exe -decode c:\kworking\agent.crt" OR "del /q /f c:\kworking\agent.crt*"Optional
SplunkAdvancedSearch4WebLogSearch Splunk for related REvil - Kaseya breach web access logs activity.index=* ("POST" AND "/dl.asp") OR ("GET" AND "/done.asp") OR ("POST" AND "/cgi-bin/KUpload.dll") OR ("POST" AND "/userFilterTableRpt.asp")Optional
EDLDomainBlocklistThe name of the EDL Domain Block List.Demisto Remediation - Domain EDLOptional
QRadarDomainFieldNameThe QRadar domain field name to check against the Reference Set of Kaseya domains.domainOptional
ReferenceListNameThe reference list name to create in QRadar for the Domain Indicators Hunting.KaseyaDomainIndicatorsOptional

Playbook Outputs#

There are no outputs for this playbook.

Playbook Image#

Kaseya VSA  0-day - REvil Ransomware Supply Chain Attack