id sid tid token lemma pos csirt-divd-nl-68 1 1 Kaseya Kaseya NNP csirt-divd-nl-68 1 2 VSA VSA NNP csirt-divd-nl-68 1 3 Limited Limited NNP csirt-divd-nl-68 1 4 Disclosure Disclosure NNP csirt-divd-nl-68 1 5 | | NNP csirt-divd-nl-68 1 6 DIVD DIVD VBD csirt-divd-nl-68 1 7 CSIRT CSIRT NNP csirt-divd-nl-68 1 8 Skip Skip NNS csirt-divd-nl-68 1 9 to to IN csirt-divd-nl-68 1 10 the the DT csirt-divd-nl-68 1 11 content content NN csirt-divd-nl-68 1 12 . . . csirt-divd-nl-68 2 1 Home home NN csirt-divd-nl-68 2 2 / / SYM csirt-divd-nl-68 2 3 Blog Blog NNP csirt-divd-nl-68 2 4 / / SYM csirt-divd-nl-68 2 5 Kaseya Kaseya NNP csirt-divd-nl-68 2 6 vsa vsa NN csirt-divd-nl-68 2 7 limited limit VBD csirt-divd-nl-68 2 8 disclosure disclosure NN csirt-divd-nl-68 2 9 DIVD DIVD NNP csirt-divd-nl-68 2 10 CSIRT CSIRT NNS csirt-divd-nl-68 2 11 Making make VBG csirt-divd-nl-68 2 12 the the DT csirt-divd-nl-68 2 13 internet internet NN csirt-divd-nl-68 2 14 safer safe JJR csirt-divd-nl-68 2 15 through through IN csirt-divd-nl-68 2 16 Coordinated Coordinated NNP csirt-divd-nl-68 2 17 Vulnerability Vulnerability NNP csirt-divd-nl-68 2 18 Disclosure Disclosure NNP csirt-divd-nl-68 2 19 Menu Menu NNP csirt-divd-nl-68 2 20 Home Home NNP csirt-divd-nl-68 2 21 DIVD DIVD NNP csirt-divd-nl-68 2 22 CSIRT csirt NN csirt-divd-nl-68 2 23 Cases case NNS csirt-divd-nl-68 2 24 DIVD-2021 divd-2021 NN csirt-divd-nl-68 2 25 - - HYPH csirt-divd-nl-68 2 26 00015 00015 CD csirt-divd-nl-68 2 27 Telegram Telegram NNP csirt-divd-nl-68 2 28 group group NN csirt-divd-nl-68 2 29 shares share NNS csirt-divd-nl-68 2 30 stolen steal VBD csirt-divd-nl-68 2 31 credentials credential NNS csirt-divd-nl-68 2 32 .... .... NFP csirt-divd-nl-68 2 33 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 2 34 - - HYPH csirt-divd-nl-68 2 35 00014 00014 CD csirt-divd-nl-68 2 36 DIVD DIVD NNP csirt-divd-nl-68 2 37 recommends recommend VBZ csirt-divd-nl-68 2 38 not not RB csirt-divd-nl-68 2 39 exposing expose VBG csirt-divd-nl-68 2 40 the the DT csirt-divd-nl-68 2 41 on on IN csirt-divd-nl-68 2 42 - - HYPH csirt-divd-nl-68 2 43 premise premise NN csirt-divd-nl-68 2 44 Kaseya Kaseya NNP csirt-divd-nl-68 2 45 Unitrends unitrend VBZ csirt-divd-nl-68 2 46 servers server NNS csirt-divd-nl-68 2 47 to to IN csirt-divd-nl-68 2 48 the the DT csirt-divd-nl-68 2 49 ... ... : csirt-divd-nl-68 2 50 DIVD-2021 divd-2021 JJ csirt-divd-nl-68 2 51 - - HYPH csirt-divd-nl-68 2 52 00012 00012 CD csirt-divd-nl-68 2 53 Botnet Botnet NNP csirt-divd-nl-68 2 54 stolen steal VBN csirt-divd-nl-68 2 55 credentials credential NNS csirt-divd-nl-68 2 56 ... ... : csirt-divd-nl-68 2 57 DIVD-2021 divd-2021 JJ csirt-divd-nl-68 2 58 - - HYPH csirt-divd-nl-68 2 59 00011 00011 CD csirt-divd-nl-68 2 60 Multiple multiple JJ csirt-divd-nl-68 2 61 vulnerabilities vulnerability NNS csirt-divd-nl-68 2 62 discovered discover VBN csirt-divd-nl-68 2 63 in in IN csirt-divd-nl-68 2 64 Kaseya Kaseya NNP csirt-divd-nl-68 2 65 VSA VSA NNP csirt-divd-nl-68 2 66 .... .... . csirt-divd-nl-68 2 67 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 2 68 - - HYPH csirt-divd-nl-68 2 69 00010 00010 CD csirt-divd-nl-68 2 70 A a DT csirt-divd-nl-68 2 71 PreAuth PreAuth NNP csirt-divd-nl-68 2 72 RCE RCE NNP csirt-divd-nl-68 2 73 vulnerability vulnerability NN csirt-divd-nl-68 2 74 has have VBZ csirt-divd-nl-68 2 75 been be VBN csirt-divd-nl-68 2 76 found find VBN csirt-divd-nl-68 2 77 in in IN csirt-divd-nl-68 2 78 vCenter vCenter NNP csirt-divd-nl-68 2 79 Server Server NNP csirt-divd-nl-68 2 80 ... ... : csirt-divd-nl-68 2 81 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 2 82 - - HYPH csirt-divd-nl-68 2 83 00005 00005 CD csirt-divd-nl-68 2 84 A a DT csirt-divd-nl-68 2 85 PreAuth PreAuth NNP csirt-divd-nl-68 2 86 RCE RCE NNP csirt-divd-nl-68 2 87 vulnerability vulnerability NN csirt-divd-nl-68 2 88 has have VBZ csirt-divd-nl-68 2 89 been be VBN csirt-divd-nl-68 2 90 found find VBN csirt-divd-nl-68 2 91 in in IN csirt-divd-nl-68 2 92 Pulse Pulse NNP csirt-divd-nl-68 2 93 Connect Connect NNP csirt-divd-nl-68 2 94 Secure Secure NNP csirt-divd-nl-68 2 95 ... ... : csirt-divd-nl-68 2 96 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 2 97 - - HYPH csirt-divd-nl-68 2 98 00004 00004 CD csirt-divd-nl-68 2 99 A a DT csirt-divd-nl-68 2 100 list list NN csirt-divd-nl-68 2 101 of of IN csirt-divd-nl-68 2 102 credentials credential NNS csirt-divd-nl-68 2 103 that that WDT csirt-divd-nl-68 2 104 phishers phisher NNS csirt-divd-nl-68 2 105 gained gain VBD csirt-divd-nl-68 2 106 from from IN csirt-divd-nl-68 2 107 victims victim NNS csirt-divd-nl-68 2 108 has have VBZ csirt-divd-nl-68 2 109 leaked leak VBN csirt-divd-nl-68 2 110 and and CC csirt-divd-nl-68 2 111 has have VBZ csirt-divd-nl-68 2 112 ... ... : csirt-divd-nl-68 2 113 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 2 114 - - HYPH csirt-divd-nl-68 2 115 00002 00002 CD csirt-divd-nl-68 2 116 Kaseya Kaseya NNP csirt-divd-nl-68 2 117 recommends recommend VBZ csirt-divd-nl-68 2 118 disabling disable VBG csirt-divd-nl-68 2 119 the the DT csirt-divd-nl-68 2 120 on on IN csirt-divd-nl-68 2 121 - - HYPH csirt-divd-nl-68 2 122 premise premise NN csirt-divd-nl-68 2 123 Kaseya Kaseya NNP csirt-divd-nl-68 2 124 VSA VSA NNP csirt-divd-nl-68 2 125 servers server NNS csirt-divd-nl-68 2 126 immediately immediately RB csirt-divd-nl-68 2 127 .... .... . csirt-divd-nl-68 2 128 DIVD-2021 divd-2021 NN csirt-divd-nl-68 2 129 - - HYPH csirt-divd-nl-68 2 130 00001 00001 CD csirt-divd-nl-68 2 131 On on IN csirt-divd-nl-68 2 132 - - HYPH csirt-divd-nl-68 2 133 prem prem NN csirt-divd-nl-68 2 134 Exchange Exchange NNP csirt-divd-nl-68 2 135 Servers Servers NNPS csirt-divd-nl-68 2 136 targeted target VBD csirt-divd-nl-68 2 137 with with IN csirt-divd-nl-68 2 138 0-day 0-day NN csirt-divd-nl-68 2 139 exploits exploit NNS csirt-divd-nl-68 2 140 ... ... : csirt-divd-nl-68 2 141 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 142 - - HYPH csirt-divd-nl-68 2 143 00014 00014 CD csirt-divd-nl-68 2 144 SolarWinds SolarWinds NNP csirt-divd-nl-68 2 145 Orion Orion NNP csirt-divd-nl-68 2 146 API api NN csirt-divd-nl-68 2 147 authentication authentication NN csirt-divd-nl-68 2 148 bypass bypass NN csirt-divd-nl-68 2 149 ... ... : csirt-divd-nl-68 2 150 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 151 - - HYPH csirt-divd-nl-68 2 152 00013 00013 CD csirt-divd-nl-68 2 153 A a DT csirt-divd-nl-68 2 154 list list NN csirt-divd-nl-68 2 155 of of IN csirt-divd-nl-68 2 156 credentials credential NNS csirt-divd-nl-68 2 157 that that WDT csirt-divd-nl-68 2 158 phishers phisher NNS csirt-divd-nl-68 2 159 gained gain VBD csirt-divd-nl-68 2 160 from from IN csirt-divd-nl-68 2 161 victims victim NNS csirt-divd-nl-68 2 162 has have VBZ csirt-divd-nl-68 2 163 leaked leak VBN csirt-divd-nl-68 2 164 and and CC csirt-divd-nl-68 2 165 has have VBZ csirt-divd-nl-68 2 166 ... ... : csirt-divd-nl-68 2 167 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 168 - - HYPH csirt-divd-nl-68 2 169 00012 00012 CD csirt-divd-nl-68 2 170 A a DT csirt-divd-nl-68 2 171 list list NN csirt-divd-nl-68 2 172 of of IN csirt-divd-nl-68 2 173 49 49 CD csirt-divd-nl-68 2 174 577 577 CD csirt-divd-nl-68 2 175 vulnerable vulnerable JJ csirt-divd-nl-68 2 176 Fortinet Fortinet NNP csirt-divd-nl-68 2 177 devices device NNS csirt-divd-nl-68 2 178 leaked leak VBD csirt-divd-nl-68 2 179 online online RB csirt-divd-nl-68 2 180 ... ... . csirt-divd-nl-68 2 181 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 182 - - HYPH csirt-divd-nl-68 2 183 00011 00011 CD csirt-divd-nl-68 2 184 Four four CD csirt-divd-nl-68 2 185 critical critical JJ csirt-divd-nl-68 2 186 vulnerabilities vulnerability NNS csirt-divd-nl-68 2 187 in in IN csirt-divd-nl-68 2 188 Vembu Vembu NNP csirt-divd-nl-68 2 189 BDR BDR NNP csirt-divd-nl-68 2 190 ... ... HYPH csirt-divd-nl-68 2 191 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 192 - - HYPH csirt-divd-nl-68 2 193 00010 00010 CD csirt-divd-nl-68 2 194 WordPress WordPress NNP csirt-divd-nl-68 2 195 Plugin Plugin NNP csirt-divd-nl-68 2 196 wpDiscuz wpDiscuz NNP csirt-divd-nl-68 2 197 has have VBZ csirt-divd-nl-68 2 198 a a DT csirt-divd-nl-68 2 199 vulnerability vulnerability NN csirt-divd-nl-68 2 200 that that WDT csirt-divd-nl-68 2 201 alllows alllow VBZ csirt-divd-nl-68 2 202 attackers attacker NNS csirt-divd-nl-68 2 203 to to IN csirt-divd-nl-68 2 204 tak tak NNP csirt-divd-nl-68 2 205 ... ... : csirt-divd-nl-68 2 206 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 207 - - HYPH csirt-divd-nl-68 2 208 00009 00009 CD csirt-divd-nl-68 2 209 Data Data NNP csirt-divd-nl-68 2 210 dumped dump VBN csirt-divd-nl-68 2 211 from from IN csirt-divd-nl-68 2 212 compromised compromise VBN csirt-divd-nl-68 2 213 Pulse Pulse NNP csirt-divd-nl-68 2 214 Secure Secure NNP csirt-divd-nl-68 2 215 VPN VPN NNP csirt-divd-nl-68 2 216 enterprise enterprise NN csirt-divd-nl-68 2 217 servers server NNS csirt-divd-nl-68 2 218 .... .... . csirt-divd-nl-68 2 219 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 220 - - HYPH csirt-divd-nl-68 2 221 00008 00008 CD csirt-divd-nl-68 2 222 313 313 CD csirt-divd-nl-68 2 223 000 000 CD csirt-divd-nl-68 2 224 .NL .NL : csirt-divd-nl-68 2 225 domains domain NNS csirt-divd-nl-68 2 226 running run VBG csirt-divd-nl-68 2 227 Wordpress Wordpress NNP csirt-divd-nl-68 2 228 scanned scan VBD csirt-divd-nl-68 2 229 .... .... . csirt-divd-nl-68 2 230 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 231 - - HYPH csirt-divd-nl-68 2 232 00007 00007 CD csirt-divd-nl-68 2 233 Citrix Citrix NNP csirt-divd-nl-68 2 234 ShareFile ShareFile NNP csirt-divd-nl-68 2 235 storage storage NN csirt-divd-nl-68 2 236 zones zone NNS csirt-divd-nl-68 2 237 Controller Controller NNP csirt-divd-nl-68 2 238 multiple multiple JJ csirt-divd-nl-68 2 239 security security NN csirt-divd-nl-68 2 240 updates update NNS csirt-divd-nl-68 2 241 ... ... : csirt-divd-nl-68 2 242 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 243 - - HYPH csirt-divd-nl-68 2 244 00006 00006 CD csirt-divd-nl-68 2 245 SMBv3 SMBv3 NNP csirt-divd-nl-68 2 246 Server Server NNP csirt-divd-nl-68 2 247 Compression Compression NNP csirt-divd-nl-68 2 248 Transform Transform NNP csirt-divd-nl-68 2 249 Header Header NNP csirt-divd-nl-68 2 250 Memory Memory NNP csirt-divd-nl-68 2 251 Corruption Corruption NNP csirt-divd-nl-68 2 252 ... ... : csirt-divd-nl-68 2 253 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 254 - - HYPH csirt-divd-nl-68 2 255 00005 00005 CD csirt-divd-nl-68 2 256 Apache Apache NNP csirt-divd-nl-68 2 257 Tomcat Tomcat NNP csirt-divd-nl-68 2 258 AJP AJP NNP csirt-divd-nl-68 2 259 File File NNP csirt-divd-nl-68 2 260 Read read NN csirt-divd-nl-68 2 261 / / SYM csirt-divd-nl-68 2 262 Inclusion Inclusion NNP csirt-divd-nl-68 2 263 Vulnerability Vulnerability NNP csirt-divd-nl-68 2 264 ... ... : csirt-divd-nl-68 2 265 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 266 - - HYPH csirt-divd-nl-68 2 267 00004 00004 CD csirt-divd-nl-68 2 268 List List NNP csirt-divd-nl-68 2 269 of of IN csirt-divd-nl-68 2 270 Mirai Mirai NNP csirt-divd-nl-68 2 271 botnet botnet NN csirt-divd-nl-68 2 272 victims victim NNS csirt-divd-nl-68 2 273 published publish VBN csirt-divd-nl-68 2 274 with with IN csirt-divd-nl-68 2 275 credentials credential NNS csirt-divd-nl-68 2 276 ... ... : csirt-divd-nl-68 2 277 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 278 - - HYPH csirt-divd-nl-68 2 279 00003 00003 CD csirt-divd-nl-68 2 280 Exploits exploit NNS csirt-divd-nl-68 2 281 available available JJ csirt-divd-nl-68 2 282 for for IN csirt-divd-nl-68 2 283 MS MS NNP csirt-divd-nl-68 2 284 RDP RDP NNP csirt-divd-nl-68 2 285 Gateway Gateway NNP csirt-divd-nl-68 2 286 Bluegate Bluegate NNP csirt-divd-nl-68 2 287 ... ... : csirt-divd-nl-68 2 288 DIVD-2020 divd-2020 NN csirt-divd-nl-68 2 289 - - HYPH csirt-divd-nl-68 2 290 00002 00002 CD csirt-divd-nl-68 2 291 Wildcard Wildcard NNP csirt-divd-nl-68 2 292 Certificates Certificates NNPS csirt-divd-nl-68 2 293 Citrix Citrix NNP csirt-divd-nl-68 2 294 ADC ADC NNP csirt-divd-nl-68 2 295 ... ... : csirt-divd-nl-68 2 296 DIVD-2020 DIVD-2020 NNP csirt-divd-nl-68 2 297 - - HYPH csirt-divd-nl-68 2 298 00001 00001 CD csirt-divd-nl-68 2 299 Citrix Citrix NNP csirt-divd-nl-68 2 300 ADC ADC NNP csirt-divd-nl-68 2 301 ... ... : csirt-divd-nl-68 2 302 CVEs CVEs NNP csirt-divd-nl-68 2 303 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 304 - - HYPH csirt-divd-nl-68 2 305 30201 30201 CD csirt-divd-nl-68 2 306 - - HYPH csirt-divd-nl-68 2 307 Authenticated authenticate VBN csirt-divd-nl-68 2 308 XML XML NNP csirt-divd-nl-68 2 309 External External NNP csirt-divd-nl-68 2 310 Entity Entity NNP csirt-divd-nl-68 2 311 vulnerability vulnerability NN csirt-divd-nl-68 2 312 in in IN csirt-divd-nl-68 2 313 Kaseya Kaseya NNP csirt-divd-nl-68 2 314 VS VS NNP csirt-divd-nl-68 2 315 ... ... : csirt-divd-nl-68 2 316 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 317 - - HYPH csirt-divd-nl-68 2 318 30121 30121 CD csirt-divd-nl-68 2 319 - - HYPH csirt-divd-nl-68 2 320 Authenticated authenticate VBN csirt-divd-nl-68 2 321 local local JJ csirt-divd-nl-68 2 322 file file NN csirt-divd-nl-68 2 323 inclusion inclusion NN csirt-divd-nl-68 2 324 in in IN csirt-divd-nl-68 2 325 Kaseya Kaseya NNP csirt-divd-nl-68 2 326 VSA VSA NNP csirt-divd-nl-68 2 327 < < XX csirt-divd-nl-68 2 328 v9.5.6 v9.5.6 NNP csirt-divd-nl-68 2 329 ... ... : csirt-divd-nl-68 2 330 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 331 - - HYPH csirt-divd-nl-68 2 332 30120 30120 CD csirt-divd-nl-68 2 333 - - HYPH csirt-divd-nl-68 2 334 2FA 2fa CD csirt-divd-nl-68 2 335 bypass bypass NN csirt-divd-nl-68 2 336 in in IN csirt-divd-nl-68 2 337 Kaseya Kaseya NNP csirt-divd-nl-68 2 338 VSA VSA NNP csirt-divd-nl-68 2 339 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 340 - - HYPH csirt-divd-nl-68 2 341 30119 30119 CD csirt-divd-nl-68 2 342 - - HYPH csirt-divd-nl-68 2 343 Authenticated Authenticated NNP csirt-divd-nl-68 2 344 Authenticated Authenticated NNP csirt-divd-nl-68 2 345 reflective reflective JJ csirt-divd-nl-68 2 346 XSS XSS NNP csirt-divd-nl-68 2 347 in in IN csirt-divd-nl-68 2 348 Kaseya Kaseya NNP csirt-divd-nl-68 2 349 VSA VSA NNP csirt-divd-nl-68 2 350 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 351 - - HYPH csirt-divd-nl-68 2 352 30118 30118 CD csirt-divd-nl-68 2 353 - - HYPH csirt-divd-nl-68 2 354 Unautheticated unautheticate VBN csirt-divd-nl-68 2 355 RCE RCE NNP csirt-divd-nl-68 2 356 in in IN csirt-divd-nl-68 2 357 Kaseya Kaseya NNP csirt-divd-nl-68 2 358 VSA VSA NNP csirt-divd-nl-68 2 359 < < XX csirt-divd-nl-68 2 360 v9.5.5 v9.5.5 NNP csirt-divd-nl-68 2 361 ... ... : csirt-divd-nl-68 2 362 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 363 - - HYPH csirt-divd-nl-68 2 364 30117 30117 CD csirt-divd-nl-68 2 365 - - HYPH csirt-divd-nl-68 2 366 Autheticated autheticate VBN csirt-divd-nl-68 2 367 SQL sql NN csirt-divd-nl-68 2 368 injection injection NN csirt-divd-nl-68 2 369 in in IN csirt-divd-nl-68 2 370 Kaseya Kaseya NNP csirt-divd-nl-68 2 371 VSA VSA NNP csirt-divd-nl-68 2 372 < < XX csirt-divd-nl-68 2 373 v9.5.6 v9.5.6 NNP csirt-divd-nl-68 2 374 ... ... : csirt-divd-nl-68 2 375 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 376 - - HYPH csirt-divd-nl-68 2 377 30116 30116 CD csirt-divd-nl-68 2 378 - - HYPH csirt-divd-nl-68 2 379 Unautheticated unautheticated JJ csirt-divd-nl-68 2 380 credential credential JJ csirt-divd-nl-68 2 381 leak leak NN csirt-divd-nl-68 2 382 and and CC csirt-divd-nl-68 2 383 business business NN csirt-divd-nl-68 2 384 logic logic NN csirt-divd-nl-68 2 385 flaw flaw NN csirt-divd-nl-68 2 386 in in IN csirt-divd-nl-68 2 387 Ka Ka NNP csirt-divd-nl-68 2 388 ... ... NFP csirt-divd-nl-68 2 389 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 390 - - HYPH csirt-divd-nl-68 2 391 26474 26474 CD csirt-divd-nl-68 2 392 - - HYPH csirt-divd-nl-68 2 393 Unauthenticated unauthenticated JJ csirt-divd-nl-68 2 394 server server NN csirt-divd-nl-68 2 395 side side NN csirt-divd-nl-68 2 396 request request NN csirt-divd-nl-68 2 397 forgery forgery NN csirt-divd-nl-68 2 398 in in IN csirt-divd-nl-68 2 399 Vembu vembu JJ csirt-divd-nl-68 2 400 product product NN csirt-divd-nl-68 2 401 ... ... : csirt-divd-nl-68 2 402 CVE-2021 cve-2021 NN csirt-divd-nl-68 2 403 - - HYPH csirt-divd-nl-68 2 404 26473 26473 CD csirt-divd-nl-68 2 405 - - HYPH csirt-divd-nl-68 2 406 Unauthenticated unauthenticated JJ csirt-divd-nl-68 2 407 arbitrary arbitrary JJ csirt-divd-nl-68 2 408 file file NN csirt-divd-nl-68 2 409 upload upload JJ csirt-divd-nl-68 2 410 and and CC csirt-divd-nl-68 2 411 command command NN csirt-divd-nl-68 2 412 execution execution NN csirt-divd-nl-68 2 413 ... ... : csirt-divd-nl-68 2 414 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 2 415 - - HYPH csirt-divd-nl-68 2 416 26472 26472 CD csirt-divd-nl-68 2 417 - - HYPH csirt-divd-nl-68 2 418 Unauthenticated unauthenticated JJ csirt-divd-nl-68 2 419 remote remote JJ csirt-divd-nl-68 2 420 command command NN csirt-divd-nl-68 2 421 execution execution NN csirt-divd-nl-68 2 422 in in IN csirt-divd-nl-68 2 423 Vembu vembu JJ csirt-divd-nl-68 2 424 products product NNS csirt-divd-nl-68 2 425 ... ... : csirt-divd-nl-68 2 426 Blog Blog NNP csirt-divd-nl-68 2 427 2021 2021 CD csirt-divd-nl-68 2 428 - - HYPH csirt-divd-nl-68 2 429 07 07 CD csirt-divd-nl-68 2 430 - - HYPH csirt-divd-nl-68 2 431 07 07 CD csirt-divd-nl-68 2 432 : : : csirt-divd-nl-68 2 433 Kaseya Kaseya NNP csirt-divd-nl-68 2 434 VSA VSA NNP csirt-divd-nl-68 2 435 Limited Limited NNP csirt-divd-nl-68 2 436 Disclosure Disclosure NNP csirt-divd-nl-68 2 437 ... ... : csirt-divd-nl-68 2 438 2021 2021 CD csirt-divd-nl-68 2 439 - - SYM csirt-divd-nl-68 2 440 07 07 CD csirt-divd-nl-68 2 441 - - HYPH csirt-divd-nl-68 2 442 06 06 CD csirt-divd-nl-68 2 443 : : : csirt-divd-nl-68 2 444 Kaseya Kaseya NNP csirt-divd-nl-68 2 445 Case Case NNP csirt-divd-nl-68 2 446 Update Update NNP csirt-divd-nl-68 2 447 3 3 CD csirt-divd-nl-68 2 448 ... ... SYM csirt-divd-nl-68 2 449 2021 2021 CD csirt-divd-nl-68 2 450 - - SYM csirt-divd-nl-68 2 451 07 07 CD csirt-divd-nl-68 2 452 - - HYPH csirt-divd-nl-68 2 453 04 04 CD csirt-divd-nl-68 2 454 : : : csirt-divd-nl-68 2 455 Kaseya Kaseya NNP csirt-divd-nl-68 2 456 Case Case NNP csirt-divd-nl-68 2 457 Update Update NNP csirt-divd-nl-68 2 458 2 2 CD csirt-divd-nl-68 2 459 ... ... SYM csirt-divd-nl-68 2 460 2021 2021 CD csirt-divd-nl-68 2 461 - - SYM csirt-divd-nl-68 2 462 07 07 CD csirt-divd-nl-68 2 463 - - HYPH csirt-divd-nl-68 2 464 03 03 CD csirt-divd-nl-68 2 465 : : : csirt-divd-nl-68 2 466 Kaseya Kaseya NNP csirt-divd-nl-68 2 467 Case Case NNP csirt-divd-nl-68 2 468 Update update NN csirt-divd-nl-68 2 469 ... ... NFP csirt-divd-nl-68 2 470 2021 2021 CD csirt-divd-nl-68 2 471 - - SYM csirt-divd-nl-68 2 472 07 07 CD csirt-divd-nl-68 2 473 - - HYPH csirt-divd-nl-68 2 474 02 02 CD csirt-divd-nl-68 2 475 : : : csirt-divd-nl-68 2 476 Kaseya Kaseya NNP csirt-divd-nl-68 2 477 VSA VSA NNP csirt-divd-nl-68 2 478 Advisory Advisory NNP csirt-divd-nl-68 2 479 ... ... : csirt-divd-nl-68 2 480 2021 2021 CD csirt-divd-nl-68 2 481 - - HYPH csirt-divd-nl-68 2 482 06 06 CD csirt-divd-nl-68 2 483 - - HYPH csirt-divd-nl-68 2 484 06 06 CD csirt-divd-nl-68 2 485 : : : csirt-divd-nl-68 2 486 vCenter vCenter NNP csirt-divd-nl-68 2 487 Server Server NNP csirt-divd-nl-68 2 488 PreAuth PreAuth NNP csirt-divd-nl-68 2 489 RCE RCE NNP csirt-divd-nl-68 2 490 ... ... : csirt-divd-nl-68 2 491 2021 2021 CD csirt-divd-nl-68 2 492 - - HYPH csirt-divd-nl-68 2 493 06 06 CD csirt-divd-nl-68 2 494 - - HYPH csirt-divd-nl-68 2 495 03 03 CD csirt-divd-nl-68 2 496 : : : csirt-divd-nl-68 2 497 Warehouse Warehouse NNP csirt-divd-nl-68 2 498 Botnet Botnet NNP csirt-divd-nl-68 2 499 ... ... NFP csirt-divd-nl-68 2 500 2021 2021 CD csirt-divd-nl-68 2 501 - - HYPH csirt-divd-nl-68 2 502 05 05 CD csirt-divd-nl-68 2 503 - - HYPH csirt-divd-nl-68 2 504 14 14 CD csirt-divd-nl-68 2 505 : : : csirt-divd-nl-68 2 506 Closing Closing NNP csirt-divd-nl-68 2 507 ProxyLogon ProxyLogon NNP csirt-divd-nl-68 2 508 case case NN csirt-divd-nl-68 2 509 / / SYM csirt-divd-nl-68 2 510 Case Case NNP csirt-divd-nl-68 2 511 ProxyLogon ProxyLogon NNP csirt-divd-nl-68 2 512 gesloten gesloten NN csirt-divd-nl-68 2 513 ... ... NFP csirt-divd-nl-68 2 514 2021 2021 CD csirt-divd-nl-68 2 515 - - SYM csirt-divd-nl-68 2 516 05 05 CD csirt-divd-nl-68 2 517 - - HYPH csirt-divd-nl-68 2 518 11 11 CD csirt-divd-nl-68 2 519 : : : csirt-divd-nl-68 2 520 Vembu Vembu NNP csirt-divd-nl-68 2 521 Zero Zero NNP csirt-divd-nl-68 2 522 Days day NNS csirt-divd-nl-68 2 523 ... ... : csirt-divd-nl-68 2 524 2021 2021 CD csirt-divd-nl-68 2 525 - - HYPH csirt-divd-nl-68 2 526 05 05 CD csirt-divd-nl-68 2 527 - - SYM csirt-divd-nl-68 2 528 10 10 CD csirt-divd-nl-68 2 529 : : : csirt-divd-nl-68 2 530 Pulse Pulse NNP csirt-divd-nl-68 2 531 Secure secure JJ csirt-divd-nl-68 2 532 PreAuth PreAuth NNP csirt-divd-nl-68 2 533 RCE RCE NNP csirt-divd-nl-68 2 534 ... ... : csirt-divd-nl-68 2 535 More More JJR csirt-divd-nl-68 2 536 ... ... . csirt-divd-nl-68 3 1 Donate donate JJ csirt-divd-nl-68 3 2 RSS RSS NNP csirt-divd-nl-68 3 3 Contact Contact NNP csirt-divd-nl-68 3 4 Kaseya Kaseya NNP csirt-divd-nl-68 3 5 VSA VSA NNP csirt-divd-nl-68 3 6 Limited Limited NNP csirt-divd-nl-68 3 7 Disclosure Disclosure NNP csirt-divd-nl-68 3 8 07 07 CD csirt-divd-nl-68 3 9 Jul Jul NNP csirt-divd-nl-68 3 10 2021 2021 CD csirt-divd-nl-68 3 11 - - : csirt-divd-nl-68 3 12 Frank Frank NNP csirt-divd-nl-68 3 13 Breedijk Breedijk NNP csirt-divd-nl-68 3 14 English English NNP csirt-divd-nl-68 3 15 below below IN csirt-divd-nl-68 3 16 Why why WRB csirt-divd-nl-68 3 17 we -PRON- PRP csirt-divd-nl-68 3 18 are be VBP csirt-divd-nl-68 3 19 only only RB csirt-divd-nl-68 3 20 disclosing disclose VBG csirt-divd-nl-68 3 21 limited limited JJ csirt-divd-nl-68 3 22 details detail NNS csirt-divd-nl-68 3 23 on on IN csirt-divd-nl-68 3 24 the the DT csirt-divd-nl-68 3 25 Kaseya Kaseya NNP csirt-divd-nl-68 3 26 vulnerabilities vulnerability NNS csirt-divd-nl-68 3 27 Last last JJ csirt-divd-nl-68 3 28 weekend weekend NN csirt-divd-nl-68 3 29 we -PRON- PRP csirt-divd-nl-68 3 30 found find VBD csirt-divd-nl-68 3 31 ourselves -PRON- PRP csirt-divd-nl-68 3 32 in in IN csirt-divd-nl-68 3 33 the the DT csirt-divd-nl-68 3 34 middle middle NN csirt-divd-nl-68 3 35 of of IN csirt-divd-nl-68 3 36 a a DT csirt-divd-nl-68 3 37 storm storm NN csirt-divd-nl-68 3 38 . . . csirt-divd-nl-68 4 1 A a DT csirt-divd-nl-68 4 2 storm storm NN csirt-divd-nl-68 4 3 created create VBN csirt-divd-nl-68 4 4 by by IN csirt-divd-nl-68 4 5 the the DT csirt-divd-nl-68 4 6 ransomware ransomware NN csirt-divd-nl-68 4 7 attacks attack NNS csirt-divd-nl-68 4 8 executed execute VBN csirt-divd-nl-68 4 9 via via IN csirt-divd-nl-68 4 10 Kaseya Kaseya NNP csirt-divd-nl-68 4 11 VSA VSA NNP csirt-divd-nl-68 4 12 , , , csirt-divd-nl-68 4 13 using use VBG csirt-divd-nl-68 4 14 a a DT csirt-divd-nl-68 4 15 vulnerability vulnerability NN csirt-divd-nl-68 4 16 which which WDT csirt-divd-nl-68 4 17 we -PRON- PRP csirt-divd-nl-68 4 18 confidentially confidentially RB csirt-divd-nl-68 4 19 disclosed disclose VBD csirt-divd-nl-68 4 20 to to IN csirt-divd-nl-68 4 21 Kaseya Kaseya NNP csirt-divd-nl-68 4 22 , , , csirt-divd-nl-68 4 23 together together RB csirt-divd-nl-68 4 24 with with IN csirt-divd-nl-68 4 25 six six CD csirt-divd-nl-68 4 26 other other JJ csirt-divd-nl-68 4 27 vulnerabilities vulnerability NNS csirt-divd-nl-68 4 28 . . . csirt-divd-nl-68 5 1 Ever ever RB csirt-divd-nl-68 5 2 since since IN csirt-divd-nl-68 5 3 we -PRON- PRP csirt-divd-nl-68 5 4 released release VBD csirt-divd-nl-68 5 5 the the DT csirt-divd-nl-68 5 6 news news NN csirt-divd-nl-68 5 7 that that IN csirt-divd-nl-68 5 8 we -PRON- PRP csirt-divd-nl-68 5 9 indeed indeed RB csirt-divd-nl-68 5 10 notified notify VBD csirt-divd-nl-68 5 11 Kaseya Kaseya NNP csirt-divd-nl-68 5 12 of of IN csirt-divd-nl-68 5 13 a a DT csirt-divd-nl-68 5 14 vulnerability vulnerability NN csirt-divd-nl-68 5 15 used use VBN csirt-divd-nl-68 5 16 in in IN csirt-divd-nl-68 5 17 the the DT csirt-divd-nl-68 5 18 ransomware ransomware NN csirt-divd-nl-68 5 19 attack attack NN csirt-divd-nl-68 5 20 , , , csirt-divd-nl-68 5 21 we -PRON- PRP csirt-divd-nl-68 5 22 have have VBP csirt-divd-nl-68 5 23 been be VBN csirt-divd-nl-68 5 24 getting get VBG csirt-divd-nl-68 5 25 requests request NNS csirt-divd-nl-68 5 26 to to TO csirt-divd-nl-68 5 27 release release VB csirt-divd-nl-68 5 28 details detail NNS csirt-divd-nl-68 5 29 about about IN csirt-divd-nl-68 5 30 these these DT csirt-divd-nl-68 5 31 vulnerabilities vulnerability NNS csirt-divd-nl-68 5 32 and and CC csirt-divd-nl-68 5 33 the the DT csirt-divd-nl-68 5 34 disclosure disclosure NN csirt-divd-nl-68 5 35 timeline timeline NN csirt-divd-nl-68 5 36 . . . csirt-divd-nl-68 6 1 In in IN csirt-divd-nl-68 6 2 line line NN csirt-divd-nl-68 6 3 with with IN csirt-divd-nl-68 6 4 the the DT csirt-divd-nl-68 6 5 guidelines guideline NNS csirt-divd-nl-68 6 6 for for IN csirt-divd-nl-68 6 7 Coordinated Coordinated NNP csirt-divd-nl-68 6 8 Vulnerability Vulnerability NNP csirt-divd-nl-68 6 9 Disclosure Disclosure NNP csirt-divd-nl-68 6 10 we -PRON- PRP csirt-divd-nl-68 6 11 have have VBP csirt-divd-nl-68 6 12 not not RB csirt-divd-nl-68 6 13 disclosed disclose VBN csirt-divd-nl-68 6 14 any any DT csirt-divd-nl-68 6 15 details detail NNS csirt-divd-nl-68 6 16 so so RB csirt-divd-nl-68 6 17 far far RB csirt-divd-nl-68 6 18 . . . csirt-divd-nl-68 7 1 And and CC csirt-divd-nl-68 7 2 , , , csirt-divd-nl-68 7 3 while while IN csirt-divd-nl-68 7 4 we -PRON- PRP csirt-divd-nl-68 7 5 feel feel VBP csirt-divd-nl-68 7 6 it -PRON- PRP csirt-divd-nl-68 7 7 is be VBZ csirt-divd-nl-68 7 8 time time NN csirt-divd-nl-68 7 9 to to TO csirt-divd-nl-68 7 10 be be VB csirt-divd-nl-68 7 11 more more RBR csirt-divd-nl-68 7 12 open open JJ csirt-divd-nl-68 7 13 about about IN csirt-divd-nl-68 7 14 this this DT csirt-divd-nl-68 7 15 process process NN csirt-divd-nl-68 7 16 and and CC csirt-divd-nl-68 7 17 our -PRON- PRP$ csirt-divd-nl-68 7 18 decisions decision NNS csirt-divd-nl-68 7 19 regarding regard VBG csirt-divd-nl-68 7 20 this this DT csirt-divd-nl-68 7 21 matter matter NN csirt-divd-nl-68 7 22 , , , csirt-divd-nl-68 7 23 we -PRON- PRP csirt-divd-nl-68 7 24 will will MD csirt-divd-nl-68 7 25 still still RB csirt-divd-nl-68 7 26 not not RB csirt-divd-nl-68 7 27 release release VB csirt-divd-nl-68 7 28 the the DT csirt-divd-nl-68 7 29 full full JJ csirt-divd-nl-68 7 30 details detail NNS csirt-divd-nl-68 7 31 . . . csirt-divd-nl-68 8 1 Why why WRB csirt-divd-nl-68 8 2 the the DT csirt-divd-nl-68 8 3 secrecy secrecy NN csirt-divd-nl-68 8 4 ? ? . csirt-divd-nl-68 9 1 As as IN csirt-divd-nl-68 9 2 the the DT csirt-divd-nl-68 9 3 ransomware ransomware NN csirt-divd-nl-68 9 4 attack attack NN csirt-divd-nl-68 9 5 using use VBG csirt-divd-nl-68 9 6 Kaseya Kaseya NNP csirt-divd-nl-68 9 7 VSA VSA NNP csirt-divd-nl-68 9 8 software software NN csirt-divd-nl-68 9 9 has have VBZ csirt-divd-nl-68 9 10 shown show VBN csirt-divd-nl-68 9 11 , , , csirt-divd-nl-68 9 12 the the DT csirt-divd-nl-68 9 13 effects effect NNS csirt-divd-nl-68 9 14 of of IN csirt-divd-nl-68 9 15 a a DT csirt-divd-nl-68 9 16 malicious malicious JJ csirt-divd-nl-68 9 17 actor actor NN csirt-divd-nl-68 9 18 knowing know VBG csirt-divd-nl-68 9 19 the the DT csirt-divd-nl-68 9 20 full full JJ csirt-divd-nl-68 9 21 details detail NNS csirt-divd-nl-68 9 22 of of IN csirt-divd-nl-68 9 23 a a DT csirt-divd-nl-68 9 24 vulnerability vulnerability NN csirt-divd-nl-68 9 25 can can MD csirt-divd-nl-68 9 26 be be VB csirt-divd-nl-68 9 27 devastating devastating JJ csirt-divd-nl-68 9 28 . . . csirt-divd-nl-68 10 1 This this DT csirt-divd-nl-68 10 2 immediately immediately RB csirt-divd-nl-68 10 3 poses pose VBZ csirt-divd-nl-68 10 4 a a DT csirt-divd-nl-68 10 5 dilemma dilemma NN csirt-divd-nl-68 10 6 to to IN csirt-divd-nl-68 10 7 anybody anybody NN csirt-divd-nl-68 10 8 that that WDT csirt-divd-nl-68 10 9 discovers discover VBZ csirt-divd-nl-68 10 10 a a DT csirt-divd-nl-68 10 11 critical critical JJ csirt-divd-nl-68 10 12 vulnerability vulnerability NN csirt-divd-nl-68 10 13 in in IN csirt-divd-nl-68 10 14 a a DT csirt-divd-nl-68 10 15 critical critical JJ csirt-divd-nl-68 10 16 piece piece NN csirt-divd-nl-68 10 17 of of IN csirt-divd-nl-68 10 18 software software NN csirt-divd-nl-68 10 19 , , , csirt-divd-nl-68 10 20 do do VBP csirt-divd-nl-68 10 21 we -PRON- PRP csirt-divd-nl-68 10 22 disclose disclose VB csirt-divd-nl-68 10 23 the the DT csirt-divd-nl-68 10 24 details detail NNS csirt-divd-nl-68 10 25 or or CC csirt-divd-nl-68 10 26 not not RB csirt-divd-nl-68 10 27 ? ? . csirt-divd-nl-68 11 1 Let let VB csirt-divd-nl-68 11 2 ’s -PRON- PRP csirt-divd-nl-68 11 3 use use VB csirt-divd-nl-68 11 4 an an DT csirt-divd-nl-68 11 5 analogy analogy NN csirt-divd-nl-68 11 6 . . . csirt-divd-nl-68 12 1 Say say VB csirt-divd-nl-68 12 2 a a DT csirt-divd-nl-68 12 3 security security NN csirt-divd-nl-68 12 4 researcher researcher NN csirt-divd-nl-68 12 5 discovers discover VBZ csirt-divd-nl-68 12 6 a a DT csirt-divd-nl-68 12 7 vulnerability vulnerability NN csirt-divd-nl-68 12 8 in in IN csirt-divd-nl-68 12 9 a a DT csirt-divd-nl-68 12 10 high high JJ csirt-divd-nl-68 12 11 - - HYPH csirt-divd-nl-68 12 12 end end NN csirt-divd-nl-68 12 13 car car NN csirt-divd-nl-68 12 14 . . . csirt-divd-nl-68 13 1 When when WRB csirt-divd-nl-68 13 2 you -PRON- PRP csirt-divd-nl-68 13 3 kick kick VBP csirt-divd-nl-68 13 4 the the DT csirt-divd-nl-68 13 5 left left JJ csirt-divd-nl-68 13 6 rear rear JJ csirt-divd-nl-68 13 7 bumper bumper NN csirt-divd-nl-68 13 8 in in IN csirt-divd-nl-68 13 9 just just RB csirt-divd-nl-68 13 10 the the DT csirt-divd-nl-68 13 11 right right JJ csirt-divd-nl-68 13 12 way way NN csirt-divd-nl-68 13 13 , , , csirt-divd-nl-68 13 14 the the DT csirt-divd-nl-68 13 15 car car NN csirt-divd-nl-68 13 16 doors door NNS csirt-divd-nl-68 13 17 open open VBP csirt-divd-nl-68 13 18 , , , csirt-divd-nl-68 13 19 and and CC csirt-divd-nl-68 13 20 the the DT csirt-divd-nl-68 13 21 engine engine NN csirt-divd-nl-68 13 22 starts start VBZ csirt-divd-nl-68 13 23 . . . csirt-divd-nl-68 14 1 What what WP csirt-divd-nl-68 14 2 should should MD csirt-divd-nl-68 14 3 the the DT csirt-divd-nl-68 14 4 researcher researcher NN csirt-divd-nl-68 14 5 do do VB csirt-divd-nl-68 14 6 ? ? . csirt-divd-nl-68 15 1 Tell tell VB csirt-divd-nl-68 15 2 everybody everybody NN csirt-divd-nl-68 15 3 , , , csirt-divd-nl-68 15 4 tell tell VB csirt-divd-nl-68 15 5 all all PDT csirt-divd-nl-68 15 6 the the DT csirt-divd-nl-68 15 7 owners owner NNS csirt-divd-nl-68 15 8 of of IN csirt-divd-nl-68 15 9 this this DT csirt-divd-nl-68 15 10 type type NN csirt-divd-nl-68 15 11 of of IN csirt-divd-nl-68 15 12 car car NN csirt-divd-nl-68 15 13 , , , csirt-divd-nl-68 15 14 or or CC csirt-divd-nl-68 15 15 inform inform VB csirt-divd-nl-68 15 16 the the DT csirt-divd-nl-68 15 17 manufacturer manufacturer NN csirt-divd-nl-68 15 18 so so IN csirt-divd-nl-68 15 19 he -PRON- PRP csirt-divd-nl-68 15 20 can can MD csirt-divd-nl-68 15 21 recall recall VB csirt-divd-nl-68 15 22 and and CC csirt-divd-nl-68 15 23 fix fix VB csirt-divd-nl-68 15 24 the the DT csirt-divd-nl-68 15 25 car car NN csirt-divd-nl-68 15 26 ? ? . csirt-divd-nl-68 16 1 If if IN csirt-divd-nl-68 16 2 the the DT csirt-divd-nl-68 16 3 full full JJ csirt-divd-nl-68 16 4 details detail NNS csirt-divd-nl-68 16 5 are be VBP csirt-divd-nl-68 16 6 made make VBN csirt-divd-nl-68 16 7 public public JJ csirt-divd-nl-68 16 8 , , , csirt-divd-nl-68 16 9 it -PRON- PRP csirt-divd-nl-68 16 10 is be VBZ csirt-divd-nl-68 16 11 evident evident JJ csirt-divd-nl-68 16 12 that that IN csirt-divd-nl-68 16 13 many many JJ csirt-divd-nl-68 16 14 cars car NNS csirt-divd-nl-68 16 15 will will MD csirt-divd-nl-68 16 16 get get VB csirt-divd-nl-68 16 17 stolen steal VBN csirt-divd-nl-68 16 18 very very RB csirt-divd-nl-68 16 19 soon soon RB csirt-divd-nl-68 16 20 . . . csirt-divd-nl-68 17 1 If if IN csirt-divd-nl-68 17 2 you -PRON- PRP csirt-divd-nl-68 17 3 inform inform VBP csirt-divd-nl-68 17 4 the the DT csirt-divd-nl-68 17 5 owners owner NNS csirt-divd-nl-68 17 6 , , , csirt-divd-nl-68 17 7 this this DT csirt-divd-nl-68 17 8 will will MD csirt-divd-nl-68 17 9 likely likely RB csirt-divd-nl-68 17 10 happen happen VB csirt-divd-nl-68 17 11 too too RB csirt-divd-nl-68 17 12 . . . csirt-divd-nl-68 18 1 The the DT csirt-divd-nl-68 18 2 chances chance NNS csirt-divd-nl-68 18 3 of of IN csirt-divd-nl-68 18 4 the the DT csirt-divd-nl-68 18 5 details detail NNS csirt-divd-nl-68 18 6 remaining remain VBG csirt-divd-nl-68 18 7 secret secret NNP csirt-divd-nl-68 18 8 are be VBP csirt-divd-nl-68 18 9 slim slim JJ csirt-divd-nl-68 18 10 if if IN csirt-divd-nl-68 18 11 you -PRON- PRP csirt-divd-nl-68 18 12 inform inform VBP csirt-divd-nl-68 18 13 a a DT csirt-divd-nl-68 18 14 broad broad JJ csirt-divd-nl-68 18 15 audience audience NN csirt-divd-nl-68 18 16 . . . csirt-divd-nl-68 19 1 Even even RB csirt-divd-nl-68 19 2 if if IN csirt-divd-nl-68 19 3 you -PRON- PRP csirt-divd-nl-68 19 4 limit limit VBP csirt-divd-nl-68 19 5 the the DT csirt-divd-nl-68 19 6 details detail NNS csirt-divd-nl-68 19 7 to to TO csirt-divd-nl-68 19 8 ‘ ' `` csirt-divd-nl-68 19 9 a a DT csirt-divd-nl-68 19 10 security security NN csirt-divd-nl-68 19 11 issue issue NN csirt-divd-nl-68 19 12 involving involve VBG csirt-divd-nl-68 19 13 the the DT csirt-divd-nl-68 19 14 bumper bumper NN csirt-divd-nl-68 19 15 ’ ' '' csirt-divd-nl-68 19 16 , , , csirt-divd-nl-68 19 17 you -PRON- PRP csirt-divd-nl-68 19 18 might may MD csirt-divd-nl-68 19 19 tip tip VB csirt-divd-nl-68 19 20 off off RP csirt-divd-nl-68 19 21 the the DT csirt-divd-nl-68 19 22 wrong wrong JJ csirt-divd-nl-68 19 23 people people NNS csirt-divd-nl-68 19 24 . . . csirt-divd-nl-68 20 1 Telling tell VBG csirt-divd-nl-68 20 2 the the DT csirt-divd-nl-68 20 3 manufacturer manufacturer NN csirt-divd-nl-68 20 4 there there EX csirt-divd-nl-68 20 5 is be VBZ csirt-divd-nl-68 20 6 a a DT csirt-divd-nl-68 20 7 good good JJ csirt-divd-nl-68 20 8 chance chance NN csirt-divd-nl-68 20 9 that that IN csirt-divd-nl-68 20 10 he -PRON- PRP csirt-divd-nl-68 20 11 comes come VBZ csirt-divd-nl-68 20 12 up up RP csirt-divd-nl-68 20 13 with with IN csirt-divd-nl-68 20 14 a a DT csirt-divd-nl-68 20 15 fix fix NN csirt-divd-nl-68 20 16 before before IN csirt-divd-nl-68 20 17 large large JJ csirt-divd-nl-68 20 18 - - HYPH csirt-divd-nl-68 20 19 scale scale NN csirt-divd-nl-68 20 20 car car NN csirt-divd-nl-68 20 21 thefts theft NNS csirt-divd-nl-68 20 22 are be VBP csirt-divd-nl-68 20 23 happening happen VBG csirt-divd-nl-68 20 24 , , , csirt-divd-nl-68 20 25 and and CC csirt-divd-nl-68 20 26 consider consider VB csirt-divd-nl-68 20 27 if if IN csirt-divd-nl-68 20 28 you -PRON- PRP csirt-divd-nl-68 20 29 need need VBP csirt-divd-nl-68 20 30 to to TO csirt-divd-nl-68 20 31 tell tell VB csirt-divd-nl-68 20 32 the the DT csirt-divd-nl-68 20 33 owners owner NNS csirt-divd-nl-68 20 34 to to TO csirt-divd-nl-68 20 35 keep keep VB csirt-divd-nl-68 20 36 their -PRON- PRP$ csirt-divd-nl-68 20 37 car car NN csirt-divd-nl-68 20 38 behind behind IN csirt-divd-nl-68 20 39 closed closed JJ csirt-divd-nl-68 20 40 doors door NNS csirt-divd-nl-68 20 41 in in IN csirt-divd-nl-68 20 42 the the DT csirt-divd-nl-68 20 43 meantime meantime NN csirt-divd-nl-68 20 44 . . . csirt-divd-nl-68 21 1 How how WRB csirt-divd-nl-68 21 2 does do VBZ csirt-divd-nl-68 21 3 this this DT csirt-divd-nl-68 21 4 relate relate VB csirt-divd-nl-68 21 5 to to IN csirt-divd-nl-68 21 6 Kaseya Kaseya NNP csirt-divd-nl-68 21 7 VSA VSA NNP csirt-divd-nl-68 21 8 ? ? . csirt-divd-nl-68 22 1 When when WRB csirt-divd-nl-68 22 2 we -PRON- PRP csirt-divd-nl-68 22 3 discovered discover VBD csirt-divd-nl-68 22 4 the the DT csirt-divd-nl-68 22 5 vulnerabilities vulnerability NNS csirt-divd-nl-68 22 6 in in IN csirt-divd-nl-68 22 7 early early JJ csirt-divd-nl-68 22 8 April April NNP csirt-divd-nl-68 22 9 , , , csirt-divd-nl-68 22 10 it -PRON- PRP csirt-divd-nl-68 22 11 was be VBD csirt-divd-nl-68 22 12 evident evident JJ csirt-divd-nl-68 22 13 to to IN csirt-divd-nl-68 22 14 us -PRON- PRP csirt-divd-nl-68 22 15 that that IN csirt-divd-nl-68 22 16 we -PRON- PRP csirt-divd-nl-68 22 17 could could MD csirt-divd-nl-68 22 18 not not RB csirt-divd-nl-68 22 19 let let VB csirt-divd-nl-68 22 20 these these DT csirt-divd-nl-68 22 21 vulnerabilities vulnerability NNS csirt-divd-nl-68 22 22 fall fall VB csirt-divd-nl-68 22 23 into into IN csirt-divd-nl-68 22 24 the the DT csirt-divd-nl-68 22 25 wrong wrong JJ csirt-divd-nl-68 22 26 hands hand NNS csirt-divd-nl-68 22 27 . . . csirt-divd-nl-68 23 1 After after IN csirt-divd-nl-68 23 2 some some DT csirt-divd-nl-68 23 3 deliberation deliberation NN csirt-divd-nl-68 23 4 , , , csirt-divd-nl-68 23 5 we -PRON- PRP csirt-divd-nl-68 23 6 decided decide VBD csirt-divd-nl-68 23 7 that that IN csirt-divd-nl-68 23 8 informing inform VBG csirt-divd-nl-68 23 9 the the DT csirt-divd-nl-68 23 10 vendor vendor NN csirt-divd-nl-68 23 11 and and CC csirt-divd-nl-68 23 12 awaiting await VBG csirt-divd-nl-68 23 13 the the DT csirt-divd-nl-68 23 14 delivery delivery NN csirt-divd-nl-68 23 15 of of IN csirt-divd-nl-68 23 16 a a DT csirt-divd-nl-68 23 17 patch patch NN csirt-divd-nl-68 23 18 was be VBD csirt-divd-nl-68 23 19 the the DT csirt-divd-nl-68 23 20 right right JJ csirt-divd-nl-68 23 21 thing thing NN csirt-divd-nl-68 23 22 to to TO csirt-divd-nl-68 23 23 do do VB csirt-divd-nl-68 23 24 . . . csirt-divd-nl-68 24 1 We -PRON- PRP csirt-divd-nl-68 24 2 hypothesized hypothesize VBD csirt-divd-nl-68 24 3 that that IN csirt-divd-nl-68 24 4 , , , csirt-divd-nl-68 24 5 in in IN csirt-divd-nl-68 24 6 the the DT csirt-divd-nl-68 24 7 wrong wrong JJ csirt-divd-nl-68 24 8 hands hand NNS csirt-divd-nl-68 24 9 , , , csirt-divd-nl-68 24 10 these these DT csirt-divd-nl-68 24 11 vulnerabilities vulnerability NNS csirt-divd-nl-68 24 12 could could MD csirt-divd-nl-68 24 13 lead lead VB csirt-divd-nl-68 24 14 to to IN csirt-divd-nl-68 24 15 the the DT csirt-divd-nl-68 24 16 compromise compromise NN csirt-divd-nl-68 24 17 of of IN csirt-divd-nl-68 24 18 large large JJ csirt-divd-nl-68 24 19 numbers number NNS csirt-divd-nl-68 24 20 of of IN csirt-divd-nl-68 24 21 computers computer NNS csirt-divd-nl-68 24 22 managed manage VBN csirt-divd-nl-68 24 23 by by IN csirt-divd-nl-68 24 24 Kaseya Kaseya NNP csirt-divd-nl-68 24 25 VSA VSA NNP csirt-divd-nl-68 24 26 . . . csirt-divd-nl-68 25 1 As as IN csirt-divd-nl-68 25 2 we -PRON- PRP csirt-divd-nl-68 25 3 stated state VBD csirt-divd-nl-68 25 4 before before RB csirt-divd-nl-68 25 5 , , , csirt-divd-nl-68 25 6 Kaseya Kaseya NNP csirt-divd-nl-68 25 7 ’s ’s , csirt-divd-nl-68 25 8 response response NN csirt-divd-nl-68 25 9 to to IN csirt-divd-nl-68 25 10 our -PRON- PRP$ csirt-divd-nl-68 25 11 disclosure disclosure NN csirt-divd-nl-68 25 12 has have VBZ csirt-divd-nl-68 25 13 been be VBN csirt-divd-nl-68 25 14 on on IN csirt-divd-nl-68 25 15 point point NN csirt-divd-nl-68 25 16 and and CC csirt-divd-nl-68 25 17 timely timely JJ csirt-divd-nl-68 25 18 ; ; : csirt-divd-nl-68 25 19 unlike unlike IN csirt-divd-nl-68 25 20 other other JJ csirt-divd-nl-68 25 21 vendors vendor NNS csirt-divd-nl-68 25 22 , , , csirt-divd-nl-68 25 23 we -PRON- PRP csirt-divd-nl-68 25 24 have have VBP csirt-divd-nl-68 25 25 previously previously RB csirt-divd-nl-68 25 26 disclosed disclose VBN csirt-divd-nl-68 25 27 vulnerabilities vulnerability NNS csirt-divd-nl-68 25 28 to to IN csirt-divd-nl-68 25 29 . . . csirt-divd-nl-68 26 1 They -PRON- PRP csirt-divd-nl-68 26 2 listened listen VBD csirt-divd-nl-68 26 3 to to IN csirt-divd-nl-68 26 4 our -PRON- PRP$ csirt-divd-nl-68 26 5 findings finding NNS csirt-divd-nl-68 26 6 , , , csirt-divd-nl-68 26 7 and and CC csirt-divd-nl-68 26 8 addressed address VBD csirt-divd-nl-68 26 9 some some DT csirt-divd-nl-68 26 10 of of IN csirt-divd-nl-68 26 11 them -PRON- PRP csirt-divd-nl-68 26 12 by by IN csirt-divd-nl-68 26 13 releasing release VBG csirt-divd-nl-68 26 14 a a DT csirt-divd-nl-68 26 15 patch patch NN csirt-divd-nl-68 26 16 resolving resolve VBG csirt-divd-nl-68 26 17 a a DT csirt-divd-nl-68 26 18 number number NN csirt-divd-nl-68 26 19 of of IN csirt-divd-nl-68 26 20 these these DT csirt-divd-nl-68 26 21 vulnerabilities vulnerability NNS csirt-divd-nl-68 26 22 . . . csirt-divd-nl-68 27 1 Followed follow VBN csirt-divd-nl-68 27 2 by by IN csirt-divd-nl-68 27 3 a a DT csirt-divd-nl-68 27 4 second second JJ csirt-divd-nl-68 27 5 patch patch NN csirt-divd-nl-68 27 6 resolving resolve VBG csirt-divd-nl-68 27 7 even even RB csirt-divd-nl-68 27 8 more more RBR csirt-divd-nl-68 27 9 . . . csirt-divd-nl-68 28 1 We -PRON- PRP csirt-divd-nl-68 28 2 ’ve have VB csirt-divd-nl-68 28 3 been be VBN csirt-divd-nl-68 28 4 in in IN csirt-divd-nl-68 28 5 contact contact NN csirt-divd-nl-68 28 6 with with IN csirt-divd-nl-68 28 7 Kaseya Kaseya NNP csirt-divd-nl-68 28 8 ahead ahead RB csirt-divd-nl-68 28 9 of of IN csirt-divd-nl-68 28 10 the the DT csirt-divd-nl-68 28 11 release release NN csirt-divd-nl-68 28 12 of of IN csirt-divd-nl-68 28 13 both both PDT csirt-divd-nl-68 28 14 these these DT csirt-divd-nl-68 28 15 patches patch NNS csirt-divd-nl-68 28 16 , , , csirt-divd-nl-68 28 17 allowing allow VBG csirt-divd-nl-68 28 18 us -PRON- PRP csirt-divd-nl-68 28 19 to to TO csirt-divd-nl-68 28 20 validate validate VB csirt-divd-nl-68 28 21 that that IN csirt-divd-nl-68 28 22 these these DT csirt-divd-nl-68 28 23 vulnerabilities vulnerability NNS csirt-divd-nl-68 28 24 had have VBD csirt-divd-nl-68 28 25 indeed indeed RB csirt-divd-nl-68 28 26 been be VBN csirt-divd-nl-68 28 27 resolved resolve VBN csirt-divd-nl-68 28 28 by by IN csirt-divd-nl-68 28 29 the the DT csirt-divd-nl-68 28 30 patch patch NN csirt-divd-nl-68 28 31 in in IN csirt-divd-nl-68 28 32 development development NN csirt-divd-nl-68 28 33 . . . csirt-divd-nl-68 29 1 Unfortunately unfortunately RB csirt-divd-nl-68 29 2 , , , csirt-divd-nl-68 29 3 the the DT csirt-divd-nl-68 29 4 worst bad JJS csirt-divd-nl-68 29 5 - - HYPH csirt-divd-nl-68 29 6 case case NN csirt-divd-nl-68 29 7 scenario scenario NN csirt-divd-nl-68 29 8 came come VBD csirt-divd-nl-68 29 9 true true JJ csirt-divd-nl-68 29 10 on on IN csirt-divd-nl-68 29 11 Friday Friday NNP csirt-divd-nl-68 29 12 the the DT csirt-divd-nl-68 29 13 2nd 2nd NN csirt-divd-nl-68 29 14 of of IN csirt-divd-nl-68 29 15 July July NNP csirt-divd-nl-68 29 16 . . . csirt-divd-nl-68 30 1 Kaseya Kaseya NNP csirt-divd-nl-68 30 2 VSA VSA NNP csirt-divd-nl-68 30 3 was be VBD csirt-divd-nl-68 30 4 used use VBN csirt-divd-nl-68 30 5 in in IN csirt-divd-nl-68 30 6 an an DT csirt-divd-nl-68 30 7 attack attack NN csirt-divd-nl-68 30 8 to to TO csirt-divd-nl-68 30 9 spread spread VB csirt-divd-nl-68 30 10 ransomware ransomware NN csirt-divd-nl-68 30 11 , , , csirt-divd-nl-68 30 12 and and CC csirt-divd-nl-68 30 13 Kaseya Kaseya NNP csirt-divd-nl-68 30 14 was be VBD csirt-divd-nl-68 30 15 compelled compel VBN csirt-divd-nl-68 30 16 to to TO csirt-divd-nl-68 30 17 use use VB csirt-divd-nl-68 30 18 the the DT csirt-divd-nl-68 30 19 nuclear nuclear JJ csirt-divd-nl-68 30 20 option option NN csirt-divd-nl-68 30 21 : : : csirt-divd-nl-68 30 22 shutting shut VBG csirt-divd-nl-68 30 23 down down RP csirt-divd-nl-68 30 24 their -PRON- PRP$ csirt-divd-nl-68 30 25 Kaseya Kaseya NNP csirt-divd-nl-68 30 26 Cloud Cloud NNP csirt-divd-nl-68 30 27 and and CC csirt-divd-nl-68 30 28 advising advise VBG csirt-divd-nl-68 30 29 customers customer NNS csirt-divd-nl-68 30 30 to to TO csirt-divd-nl-68 30 31 turn turn VB csirt-divd-nl-68 30 32 off off RP csirt-divd-nl-68 30 33 their -PRON- PRP$ csirt-divd-nl-68 30 34 on on NN csirt-divd-nl-68 30 35 - - HYPH csirt-divd-nl-68 30 36 premise premise NN csirt-divd-nl-68 30 37 Kaseya Kaseya NNP csirt-divd-nl-68 30 38 VSA VSA NNP csirt-divd-nl-68 30 39 servers server NNS csirt-divd-nl-68 30 40 . . . csirt-divd-nl-68 31 1 A a DT csirt-divd-nl-68 31 2 message message NN csirt-divd-nl-68 31 3 that that WDT csirt-divd-nl-68 31 4 unfortunately unfortunately RB csirt-divd-nl-68 31 5 arrived arrive VBD csirt-divd-nl-68 31 6 too too RB csirt-divd-nl-68 31 7 late late RB csirt-divd-nl-68 31 8 for for IN csirt-divd-nl-68 31 9 some some DT csirt-divd-nl-68 31 10 of of IN csirt-divd-nl-68 31 11 their -PRON- PRP$ csirt-divd-nl-68 31 12 customers customer NNS csirt-divd-nl-68 31 13 . . . csirt-divd-nl-68 32 1 We -PRON- PRP csirt-divd-nl-68 32 2 later later RB csirt-divd-nl-68 32 3 learned learn VBD csirt-divd-nl-68 32 4 that that IN csirt-divd-nl-68 32 5 one one CD csirt-divd-nl-68 32 6 of of IN csirt-divd-nl-68 32 7 the the DT csirt-divd-nl-68 32 8 two two CD csirt-divd-nl-68 32 9 vulnerabilities vulnerability NNS csirt-divd-nl-68 32 10 used use VBN csirt-divd-nl-68 32 11 in in IN csirt-divd-nl-68 32 12 the the DT csirt-divd-nl-68 32 13 attack attack NN csirt-divd-nl-68 32 14 was be VBD csirt-divd-nl-68 32 15 one one CD csirt-divd-nl-68 32 16 we -PRON- PRP csirt-divd-nl-68 32 17 previously previously RB csirt-divd-nl-68 32 18 disclosed disclose VBD csirt-divd-nl-68 32 19 to to IN csirt-divd-nl-68 32 20 Kasya Kasya NNP csirt-divd-nl-68 32 21 VSA VSA NNP csirt-divd-nl-68 32 22 . . . csirt-divd-nl-68 33 1 What what WP csirt-divd-nl-68 33 2 can can MD csirt-divd-nl-68 33 3 we -PRON- PRP csirt-divd-nl-68 33 4 tell tell VB csirt-divd-nl-68 33 5 ? ? . csirt-divd-nl-68 34 1 In in IN csirt-divd-nl-68 34 2 this this DT csirt-divd-nl-68 34 3 blogpost blogpost NN csirt-divd-nl-68 34 4 and and CC csirt-divd-nl-68 34 5 DIVD DIVD NNP csirt-divd-nl-68 34 6 case case NN csirt-divd-nl-68 34 7 DIVD-2021 DIVD-2021 NNP csirt-divd-nl-68 34 8 - - HYPH csirt-divd-nl-68 34 9 00011 00011 CD csirt-divd-nl-68 34 10 we -PRON- PRP csirt-divd-nl-68 34 11 publish publish VBP csirt-divd-nl-68 34 12 the the DT csirt-divd-nl-68 34 13 timeline timeline NN csirt-divd-nl-68 34 14 and and CC csirt-divd-nl-68 34 15 limited limited JJ csirt-divd-nl-68 34 16 details detail NNS csirt-divd-nl-68 34 17 of of IN csirt-divd-nl-68 34 18 the the DT csirt-divd-nl-68 34 19 vulnerabilities vulnerability NNS csirt-divd-nl-68 34 20 we -PRON- PRP csirt-divd-nl-68 34 21 notified notify VBD csirt-divd-nl-68 34 22 Kaseya Kaseya NNP csirt-divd-nl-68 34 23 of of IN csirt-divd-nl-68 34 24 . . . csirt-divd-nl-68 35 1 Full full JJ csirt-divd-nl-68 35 2 disclosure disclosure NN csirt-divd-nl-68 35 3 ? ? . csirt-divd-nl-68 36 1 Given give VBN csirt-divd-nl-68 36 2 the the DT csirt-divd-nl-68 36 3 serious serious JJ csirt-divd-nl-68 36 4 nature nature NN csirt-divd-nl-68 36 5 of of IN csirt-divd-nl-68 36 6 these these DT csirt-divd-nl-68 36 7 vulnerabilities vulnerability NNS csirt-divd-nl-68 36 8 and and CC csirt-divd-nl-68 36 9 the the DT csirt-divd-nl-68 36 10 obvious obvious JJ csirt-divd-nl-68 36 11 consequences consequence NNS csirt-divd-nl-68 36 12 of of IN csirt-divd-nl-68 36 13 abuse abuse NN csirt-divd-nl-68 36 14 of of IN csirt-divd-nl-68 36 15 Kaseya Kaseya NNP csirt-divd-nl-68 36 16 VSA VSA NNP csirt-divd-nl-68 36 17 we -PRON- PRP csirt-divd-nl-68 36 18 will will MD csirt-divd-nl-68 36 19 not not RB csirt-divd-nl-68 36 20 disclose disclose VB csirt-divd-nl-68 36 21 the the DT csirt-divd-nl-68 36 22 full full JJ csirt-divd-nl-68 36 23 details detail NNS csirt-divd-nl-68 36 24 of of IN csirt-divd-nl-68 36 25 the the DT csirt-divd-nl-68 36 26 vulnerabilities vulnerability NNS csirt-divd-nl-68 36 27 until until IN csirt-divd-nl-68 36 28 such such JJ csirt-divd-nl-68 36 29 time time NN csirt-divd-nl-68 36 30 that that WDT csirt-divd-nl-68 36 31 Kaseya Kaseya NNP csirt-divd-nl-68 36 32 has have VBZ csirt-divd-nl-68 36 33 released release VBN csirt-divd-nl-68 36 34 a a DT csirt-divd-nl-68 36 35 patch patch NN csirt-divd-nl-68 36 36 and and CC csirt-divd-nl-68 36 37 this this DT csirt-divd-nl-68 36 38 patch patch NN csirt-divd-nl-68 36 39 has have VBZ csirt-divd-nl-68 36 40 been be VBN csirt-divd-nl-68 36 41 installed instal VBN csirt-divd-nl-68 36 42 on on IN csirt-divd-nl-68 36 43 a a DT csirt-divd-nl-68 36 44 sufficient sufficient JJ csirt-divd-nl-68 36 45 number number NN csirt-divd-nl-68 36 46 of of IN csirt-divd-nl-68 36 47 systems system NNS csirt-divd-nl-68 36 48 , , , csirt-divd-nl-68 36 49 something something NN csirt-divd-nl-68 36 50 for for IN csirt-divd-nl-68 36 51 which which WDT csirt-divd-nl-68 36 52 we -PRON- PRP csirt-divd-nl-68 36 53 have have VBP csirt-divd-nl-68 36 54 the the DT csirt-divd-nl-68 36 55 monitoring monitoring NN csirt-divd-nl-68 36 56 scripts script NNS csirt-divd-nl-68 36 57 . . . csirt-divd-nl-68 37 1 In in IN csirt-divd-nl-68 37 2 the the DT csirt-divd-nl-68 37 3 past past JJ csirt-divd-nl-68 37 4 few few JJ csirt-divd-nl-68 37 5 days day NNS csirt-divd-nl-68 37 6 we -PRON- PRP csirt-divd-nl-68 37 7 have have VBP csirt-divd-nl-68 37 8 been be VBN csirt-divd-nl-68 37 9 working work VBG csirt-divd-nl-68 37 10 with with IN csirt-divd-nl-68 37 11 Kaseya Kaseya NNP csirt-divd-nl-68 37 12 to to TO csirt-divd-nl-68 37 13 make make VB csirt-divd-nl-68 37 14 sure sure JJ csirt-divd-nl-68 37 15 customers customer NNS csirt-divd-nl-68 37 16 turn turn VB csirt-divd-nl-68 37 17 off off RP csirt-divd-nl-68 37 18 their -PRON- PRP$ csirt-divd-nl-68 37 19 systems system NNS csirt-divd-nl-68 37 20 , , , csirt-divd-nl-68 37 21 by by IN csirt-divd-nl-68 37 22 tipping tip VBG csirt-divd-nl-68 37 23 them -PRON- PRP csirt-divd-nl-68 37 24 off off RP csirt-divd-nl-68 37 25 about about IN csirt-divd-nl-68 37 26 customers customer NNS csirt-divd-nl-68 37 27 that that WDT csirt-divd-nl-68 37 28 still still RB csirt-divd-nl-68 37 29 have have VBP csirt-divd-nl-68 37 30 systems system NNS csirt-divd-nl-68 37 31 online online RB csirt-divd-nl-68 37 32 , , , csirt-divd-nl-68 37 33 and and CC csirt-divd-nl-68 37 34 hope hope VBP csirt-divd-nl-68 37 35 to to TO csirt-divd-nl-68 37 36 be be VB csirt-divd-nl-68 37 37 able able JJ csirt-divd-nl-68 37 38 to to TO csirt-divd-nl-68 37 39 continue continue VB csirt-divd-nl-68 37 40 to to TO csirt-divd-nl-68 37 41 work work VB csirt-divd-nl-68 37 42 together together RB csirt-divd-nl-68 37 43 to to TO csirt-divd-nl-68 37 44 ensure ensure VB csirt-divd-nl-68 37 45 that that IN csirt-divd-nl-68 37 46 their -PRON- PRP$ csirt-divd-nl-68 37 47 patch patch NN csirt-divd-nl-68 37 48 is be VBZ csirt-divd-nl-68 37 49 installed instal VBN csirt-divd-nl-68 37 50 everywhere everywhere RB csirt-divd-nl-68 37 51 . . . csirt-divd-nl-68 38 1 We -PRON- PRP csirt-divd-nl-68 38 2 have have VBP csirt-divd-nl-68 38 3 no no DT csirt-divd-nl-68 38 4 indication indication NN csirt-divd-nl-68 38 5 that that IN csirt-divd-nl-68 38 6 Kaseya Kaseya NNP csirt-divd-nl-68 38 7 is be VBZ csirt-divd-nl-68 38 8 hesitant hesitant JJ csirt-divd-nl-68 38 9 to to TO csirt-divd-nl-68 38 10 release release VB csirt-divd-nl-68 38 11 a a DT csirt-divd-nl-68 38 12 patch patch NN csirt-divd-nl-68 38 13 . . . csirt-divd-nl-68 39 1 Instead instead RB csirt-divd-nl-68 39 2 they -PRON- PRP csirt-divd-nl-68 39 3 are be VBP csirt-divd-nl-68 39 4 still still RB csirt-divd-nl-68 39 5 working work VBG csirt-divd-nl-68 39 6 hard hard RB csirt-divd-nl-68 39 7 to to TO csirt-divd-nl-68 39 8 make make VB csirt-divd-nl-68 39 9 sure sure JJ csirt-divd-nl-68 39 10 that that IN csirt-divd-nl-68 39 11 after after IN csirt-divd-nl-68 39 12 their -PRON- PRP$ csirt-divd-nl-68 39 13 patch patch NN csirt-divd-nl-68 39 14 the the DT csirt-divd-nl-68 39 15 system system NN csirt-divd-nl-68 39 16 is be VBZ csirt-divd-nl-68 39 17 as as RB csirt-divd-nl-68 39 18 secure secure JJ csirt-divd-nl-68 39 19 as as IN csirt-divd-nl-68 39 20 possible possible JJ csirt-divd-nl-68 39 21 , , , csirt-divd-nl-68 39 22 to to TO csirt-divd-nl-68 39 23 avoid avoid VB csirt-divd-nl-68 39 24 a a DT csirt-divd-nl-68 39 25 repeat repeat NN csirt-divd-nl-68 39 26 of of IN csirt-divd-nl-68 39 27 this this DT csirt-divd-nl-68 39 28 scenario scenario NN csirt-divd-nl-68 39 29 . . . csirt-divd-nl-68 40 1 Therefore therefore RB csirt-divd-nl-68 40 2 we -PRON- PRP csirt-divd-nl-68 40 3 do do VBP csirt-divd-nl-68 40 4 not not RB csirt-divd-nl-68 40 5 feel feel VB csirt-divd-nl-68 40 6 the the DT csirt-divd-nl-68 40 7 need need NN csirt-divd-nl-68 40 8 to to TO csirt-divd-nl-68 40 9 lay lay VB csirt-divd-nl-68 40 10 down down RP csirt-divd-nl-68 40 11 any any DT csirt-divd-nl-68 40 12 kind kind NN csirt-divd-nl-68 40 13 of of IN csirt-divd-nl-68 40 14 deadline deadline NN csirt-divd-nl-68 40 15 for for IN csirt-divd-nl-68 40 16 full full JJ csirt-divd-nl-68 40 17 disclosure disclosure NN csirt-divd-nl-68 40 18 at at IN csirt-divd-nl-68 40 19 this this DT csirt-divd-nl-68 40 20 point point NN csirt-divd-nl-68 40 21 in in IN csirt-divd-nl-68 40 22 time time NN csirt-divd-nl-68 40 23 . . . csirt-divd-nl-68 41 1 A a DT csirt-divd-nl-68 41 2 properly properly RB csirt-divd-nl-68 41 3 patched patch VBN csirt-divd-nl-68 41 4 and and CC csirt-divd-nl-68 41 5 secure secure VB csirt-divd-nl-68 41 6 Kaseya Kaseya NNP csirt-divd-nl-68 41 7 VSA VSA NNP csirt-divd-nl-68 41 8 is be VBZ csirt-divd-nl-68 41 9 in in IN csirt-divd-nl-68 41 10 the the DT csirt-divd-nl-68 41 11 best good JJS csirt-divd-nl-68 41 12 interest interest NN csirt-divd-nl-68 41 13 of of IN csirt-divd-nl-68 41 14 security security NN csirt-divd-nl-68 41 15 of of IN csirt-divd-nl-68 41 16 Kaseya Kaseya NNP csirt-divd-nl-68 41 17 customers customer NNS csirt-divd-nl-68 41 18 and and CC csirt-divd-nl-68 41 19 the the DT csirt-divd-nl-68 41 20 internet internet NN csirt-divd-nl-68 41 21 at at IN csirt-divd-nl-68 41 22 large large JJ csirt-divd-nl-68 41 23 . . . csirt-divd-nl-68 42 1 The the DT csirt-divd-nl-68 42 2 vulnerabilities vulnerability NNS csirt-divd-nl-68 42 3 We -PRON- PRP csirt-divd-nl-68 42 4 notified notify VBD csirt-divd-nl-68 42 5 Kaseya Kaseya NNP csirt-divd-nl-68 42 6 of of IN csirt-divd-nl-68 42 7 the the DT csirt-divd-nl-68 42 8 following follow VBG csirt-divd-nl-68 42 9 vulnerabilities vulnerability NNS csirt-divd-nl-68 42 10 : : : csirt-divd-nl-68 42 11 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 42 12 - - HYPH csirt-divd-nl-68 42 13 30116 30116 CD csirt-divd-nl-68 42 14 - - HYPH csirt-divd-nl-68 42 15 A a DT csirt-divd-nl-68 42 16 credentials credential NNS csirt-divd-nl-68 42 17 leak leak NN csirt-divd-nl-68 42 18 and and CC csirt-divd-nl-68 42 19 business business NN csirt-divd-nl-68 42 20 logic logic NN csirt-divd-nl-68 42 21 flaw flaw NN csirt-divd-nl-68 42 22 , , , csirt-divd-nl-68 42 23 resolution resolution NN csirt-divd-nl-68 42 24 in in IN csirt-divd-nl-68 42 25 progress progress NN csirt-divd-nl-68 42 26 . . . csirt-divd-nl-68 43 1 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 43 2 - - HYPH csirt-divd-nl-68 43 3 30117 30117 CD csirt-divd-nl-68 43 4 - - HYPH csirt-divd-nl-68 43 5 An an DT csirt-divd-nl-68 43 6 SQL SQL NNP csirt-divd-nl-68 43 7 injection injection NN csirt-divd-nl-68 43 8 vulnerability vulnerability NN csirt-divd-nl-68 43 9 , , , csirt-divd-nl-68 43 10 resolved resolve VBN csirt-divd-nl-68 43 11 in in IN csirt-divd-nl-68 43 12 May May NNP csirt-divd-nl-68 43 13 8th 8th JJ csirt-divd-nl-68 43 14 patch patch NN csirt-divd-nl-68 43 15 . . . csirt-divd-nl-68 44 1 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 44 2 - - HYPH csirt-divd-nl-68 44 3 30118 30118 CD csirt-divd-nl-68 44 4 - - HYPH csirt-divd-nl-68 44 5 A a DT csirt-divd-nl-68 44 6 Remote Remote NNP csirt-divd-nl-68 44 7 Code Code NNP csirt-divd-nl-68 44 8 Execution Execution NNP csirt-divd-nl-68 44 9 vulnerability vulnerability NN csirt-divd-nl-68 44 10 , , , csirt-divd-nl-68 44 11 resolved resolve VBN csirt-divd-nl-68 44 12 in in IN csirt-divd-nl-68 44 13 April April NNP csirt-divd-nl-68 44 14 10th 10th NN csirt-divd-nl-68 44 15 patch patch NN csirt-divd-nl-68 44 16 . . . csirt-divd-nl-68 45 1 ( ( -LRB- csirt-divd-nl-68 45 2 v9.5.6 v9.5.6 NNP csirt-divd-nl-68 45 3 ) ) -RRB- csirt-divd-nl-68 45 4 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 45 5 - - HYPH csirt-divd-nl-68 45 6 30119 30119 CD csirt-divd-nl-68 45 7 - - HYPH csirt-divd-nl-68 45 8 A a NN csirt-divd-nl-68 45 9 Cross Cross NNP csirt-divd-nl-68 45 10 Site Site NNP csirt-divd-nl-68 45 11 Scripting Scripting NNP csirt-divd-nl-68 45 12 vulnerability vulnerability NN csirt-divd-nl-68 45 13 , , , csirt-divd-nl-68 45 14 resolution resolution NN csirt-divd-nl-68 45 15 in in IN csirt-divd-nl-68 45 16 progress progress NN csirt-divd-nl-68 45 17 . . . csirt-divd-nl-68 46 1 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 46 2 - - HYPH csirt-divd-nl-68 46 3 30120 30120 CD csirt-divd-nl-68 46 4 - - HYPH csirt-divd-nl-68 46 5 2FA 2fa CD csirt-divd-nl-68 46 6 bypass bypass NN csirt-divd-nl-68 46 7 , , , csirt-divd-nl-68 46 8 resolution resolution NN csirt-divd-nl-68 46 9 in in IN csirt-divd-nl-68 46 10 progress progress NN csirt-divd-nl-68 46 11 . . . csirt-divd-nl-68 47 1 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 47 2 - - HYPH csirt-divd-nl-68 47 3 30121 30121 CD csirt-divd-nl-68 47 4 - - HYPH csirt-divd-nl-68 47 5 A a DT csirt-divd-nl-68 47 6 Local Local NNP csirt-divd-nl-68 47 7 File File NNP csirt-divd-nl-68 47 8 Inclusion Inclusion NNP csirt-divd-nl-68 47 9 vulnerability vulnerability NN csirt-divd-nl-68 47 10 , , , csirt-divd-nl-68 47 11 resolved resolve VBN csirt-divd-nl-68 47 12 in in IN csirt-divd-nl-68 47 13 May May NNP csirt-divd-nl-68 47 14 8th 8th JJ csirt-divd-nl-68 47 15 patch patch NN csirt-divd-nl-68 47 16 . . . csirt-divd-nl-68 48 1 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 48 2 - - HYPH csirt-divd-nl-68 48 3 30201 30201 CD csirt-divd-nl-68 48 4 - - HYPH csirt-divd-nl-68 48 5 A a DT csirt-divd-nl-68 48 6 XML XML NNP csirt-divd-nl-68 48 7 External External NNP csirt-divd-nl-68 48 8 Entity Entity NNP csirt-divd-nl-68 48 9 vulnerability vulnerability NN csirt-divd-nl-68 48 10 , , , csirt-divd-nl-68 48 11 resolved resolve VBN csirt-divd-nl-68 48 12 in in IN csirt-divd-nl-68 48 13 May May NNP csirt-divd-nl-68 48 14 8th 8th JJ csirt-divd-nl-68 48 15 patch patch NN csirt-divd-nl-68 48 16 . . . csirt-divd-nl-68 49 1 Timeline Timeline NNP csirt-divd-nl-68 49 2 Date Date NNP csirt-divd-nl-68 49 3 Description Description NNP csirt-divd-nl-68 49 4 01 01 CD csirt-divd-nl-68 49 5 Apr Apr NNP csirt-divd-nl-68 49 6 2021 2021 CD csirt-divd-nl-68 49 7 Research Research NNP csirt-divd-nl-68 49 8 start start NN csirt-divd-nl-68 49 9 02 02 CD csirt-divd-nl-68 49 10 Apr Apr NNP csirt-divd-nl-68 49 11 2021 2021 CD csirt-divd-nl-68 49 12 DIVD DIVD NNP csirt-divd-nl-68 49 13 starts start VBZ csirt-divd-nl-68 49 14 scanning scanning NN csirt-divd-nl-68 49 15 internet internet NN csirt-divd-nl-68 49 16 - - HYPH csirt-divd-nl-68 49 17 facing face VBG csirt-divd-nl-68 49 18 implementations implementation NNS csirt-divd-nl-68 49 19 . . . csirt-divd-nl-68 50 1 04 04 CD csirt-divd-nl-68 50 2 Apr Apr NNP csirt-divd-nl-68 50 3 2021 2021 CD csirt-divd-nl-68 50 4 Start Start NNP csirt-divd-nl-68 50 5 of of IN csirt-divd-nl-68 50 6 the the DT csirt-divd-nl-68 50 7 identification identification NN csirt-divd-nl-68 50 8 of of IN csirt-divd-nl-68 50 9 possible possible JJ csirt-divd-nl-68 50 10 victims victim NNS csirt-divd-nl-68 50 11 ( ( -LRB- csirt-divd-nl-68 50 12 with with IN csirt-divd-nl-68 50 13 internet internet NN csirt-divd-nl-68 50 14 - - HYPH csirt-divd-nl-68 50 15 facing face VBG csirt-divd-nl-68 50 16 systems system NNS csirt-divd-nl-68 50 17 ) ) -RRB- csirt-divd-nl-68 50 18 . . . csirt-divd-nl-68 51 1 06 06 CD csirt-divd-nl-68 51 2 Apr Apr NNP csirt-divd-nl-68 51 3 2021 2021 CD csirt-divd-nl-68 51 4 Kaseya Kaseya NNP csirt-divd-nl-68 51 5 informed inform VBD csirt-divd-nl-68 51 6 . . . csirt-divd-nl-68 52 1 10 10 CD csirt-divd-nl-68 52 2 Apr Apr NNP csirt-divd-nl-68 52 3 2021 2021 CD csirt-divd-nl-68 52 4 Vendor Vendor NNP csirt-divd-nl-68 52 5 starts start VBZ csirt-divd-nl-68 52 6 issuing issue VBG csirt-divd-nl-68 52 7 patches patch NNS csirt-divd-nl-68 52 8 v9.5.5 v9.5.5 NNP csirt-divd-nl-68 52 9 . . . csirt-divd-nl-68 53 1 Resolving Resolving NNP csirt-divd-nl-68 53 2 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 53 3 - - HYPH csirt-divd-nl-68 53 4 30118 30118 CD csirt-divd-nl-68 53 5 . . . csirt-divd-nl-68 54 1 8 8 CD csirt-divd-nl-68 54 2 May May NNP csirt-divd-nl-68 54 3 2021 2021 CD csirt-divd-nl-68 54 4 Vendor Vendor NNP csirt-divd-nl-68 54 5 issues issue NNS csirt-divd-nl-68 54 6 another another DT csirt-divd-nl-68 54 7 patch patch VBP csirt-divd-nl-68 54 8 v9.5.6 v9.5.6 NNP csirt-divd-nl-68 54 9 . . . csirt-divd-nl-68 55 1 Resolving Resolving NNP csirt-divd-nl-68 55 2 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 55 3 - - HYPH csirt-divd-nl-68 55 4 30117 30117 CD csirt-divd-nl-68 55 5 , , , csirt-divd-nl-68 55 6 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 55 7 - - HYPH csirt-divd-nl-68 55 8 30121 30121 CD csirt-divd-nl-68 55 9 , , , csirt-divd-nl-68 55 10 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 55 11 - - HYPH csirt-divd-nl-68 55 12 30201 30201 CD csirt-divd-nl-68 55 13 . . . csirt-divd-nl-68 56 1 04 04 CD csirt-divd-nl-68 56 2 Jun Jun NNP csirt-divd-nl-68 56 3 2021 2021 CD csirt-divd-nl-68 56 4 DIVD DIVD NNP csirt-divd-nl-68 56 5 CSIRT CSIRT NNP csirt-divd-nl-68 56 6 hands hand NNS csirt-divd-nl-68 56 7 over over IN csirt-divd-nl-68 56 8 a a DT csirt-divd-nl-68 56 9 list list NN csirt-divd-nl-68 56 10 of of IN csirt-divd-nl-68 56 11 identified identify VBN csirt-divd-nl-68 56 12 Kaseya Kaseya NNP csirt-divd-nl-68 56 13 VSA VSA NNP csirt-divd-nl-68 56 14 hosts host VBZ csirt-divd-nl-68 56 15 to to IN csirt-divd-nl-68 56 16 Kaseya Kaseya NNP csirt-divd-nl-68 56 17 . . . csirt-divd-nl-68 57 1 26 26 CD csirt-divd-nl-68 57 2 Jun Jun NNP csirt-divd-nl-68 57 3 2021 2021 CD csirt-divd-nl-68 57 4 9.5.7 9.5.7 CD csirt-divd-nl-68 57 5 on on IN csirt-divd-nl-68 57 6 SaaS SaaS NNP csirt-divd-nl-68 57 7 Resolving Resolving NNP csirt-divd-nl-68 57 8 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 57 9 - - HYPH csirt-divd-nl-68 57 10 30116 30116 CD csirt-divd-nl-68 57 11 and and CC csirt-divd-nl-68 57 12 CVE-2021 CVE-2021 NNP csirt-divd-nl-68 57 13 - - HYPH csirt-divd-nl-68 57 14 30119 30119 CD csirt-divd-nl-68 57 15 . . . csirt-divd-nl-68 58 1 02 02 CD csirt-divd-nl-68 58 2 Jul Jul NNP csirt-divd-nl-68 58 3 2021 2021 CD csirt-divd-nl-68 58 4 DIVD DIVD NNP csirt-divd-nl-68 58 5 responds respond VBZ csirt-divd-nl-68 58 6 to to IN csirt-divd-nl-68 58 7 the the DT csirt-divd-nl-68 58 8 ransomware ransomware NN csirt-divd-nl-68 58 9 , , , csirt-divd-nl-68 58 10 by by IN csirt-divd-nl-68 58 11 scanning scan VBG csirt-divd-nl-68 58 12 for for IN csirt-divd-nl-68 58 13 Kaseya Kaseya NNP csirt-divd-nl-68 58 14 VSA VSA NNP csirt-divd-nl-68 58 15 instances instance NNS csirt-divd-nl-68 58 16 reachable reachable JJ csirt-divd-nl-68 58 17 via via IN csirt-divd-nl-68 58 18 the the DT csirt-divd-nl-68 58 19 Internet internet NN csirt-divd-nl-68 58 20 and and CC csirt-divd-nl-68 58 21 sends send VBZ csirt-divd-nl-68 58 22 out out RP csirt-divd-nl-68 58 23 notifications notification NNS csirt-divd-nl-68 58 24 to to IN csirt-divd-nl-68 58 25 network network NN csirt-divd-nl-68 58 26 owners owner NNS csirt-divd-nl-68 58 27 07 07 CD csirt-divd-nl-68 58 28 Jul Jul NNP csirt-divd-nl-68 58 29 2021 2021 CD csirt-divd-nl-68 58 30 Limited limited JJ csirt-divd-nl-68 58 31 publication publication NN csirt-divd-nl-68 58 32 ( ( -LRB- csirt-divd-nl-68 58 33 after after IN csirt-divd-nl-68 58 34 3 3 CD csirt-divd-nl-68 58 35 months month NNS csirt-divd-nl-68 58 36 ) ) -RRB- csirt-divd-nl-68 58 37 . . . csirt-divd-nl-68 59 1 Twitter twitter NN csirt-divd-nl-68 59 2   _SP csirt-divd-nl-68 59 3 Facebook facebook VB csirt-divd-nl-68 59 4   _SP csirt-divd-nl-68 59 5 LinkedIn linkedin NN