A Russian hacking group utilized a zero-day vulnerability in Kaseya VSA, a network management tool employed by managed service providers, to spread ransomware to thousands of small and medium-sized businesses around the world. The attackers demanded payments of between $45,000 and $70 million in cryptocurrency for a universal decryptor. The attack took advantage of the trust relationship between the VSA servers and their extension, the VSA agents, and employed malware scanners and other security tools to conceal the malicious activity. Experts recommend multiple layers of security, post-incident follow-up, employee awareness, and pre-contract due diligence to prevent similar attacks.
Source: Thelastwatchdogs
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.