This incident has been resolved.
Jul 19, 14:43 BST
The Kaseya RMM system has now been brought back online.
Jul 19, 13:58 BST
We are continuing to work on a fix for this issue.
Jul 19, 13:16 BST
DCL have completed the hardening & patching processes to ensure the Kaseya server is fully up to date and safe from the recent attack vector. Our client and internal systems were unaffected by the vulnerability and subsequent malware attacks.
A number of changes to enhance security and limit access have been put in place so the Kaseya platform can continue to deliver a reliable, secure and effective service for clients going forwards.
DCL will bring the Kaseya RMM system back online at 14:00 today and our teams will continue to monitor the situation closely - Thanks for your patience during this incident.
If you have any questions or would like to find out more about the enhanced cyber security services we have available please reach out to your Service Delivery Manager or open a support ticket.
Jul 19, 13:16 BST
Yesterday evening we were alerted to a rapidly escalating security breach in the Kaseya software that we use to manage Windows servers on behalf of our clients. We immediately shut down the server hosting Kaseya and we are currently waiting for a patch from them to close the security vulnerability.
There is no evidence that our instance was breached.
We're sending out this notification to further amplify the incident through our clients who may use Kaseya internally, and to reassure our Windows customers that we have the situation in hand.
This will only affect you if we manage Windows servers for you and will not affect normal operation of the servers.
You can read further information at https://www.zdnet.com/article/kaseya-urges-customers-to-immediately-shut-down-vsa-servers-after-ransomware-attack/
and also https://helpdesk.kaseya.com/hc/en-gb/articles/4403440684689
If you need any further information, please contact us at firstname.lastname@example.org
Jul 3, 10:30 BST