Updates on the Kaseya ransomware incident.
Kaseya had expected that it would be able to patch and restore its VSA software-as-a-service product by today, but technical problems its developers encountered have blocked the rollout. As of 8:00 AM EDT today, the company was still working to resolve the issues it encountered.
Reuters quotes US President Biden as offering, yesterday, a relatively upbeat preliminary assessment of the consequences of the ransomware campaign: "It appears to have caused minimal damage to U.S. businesses, but we're still gathering information," Mr. Biden said, adding "I feel good about our ability to be able to respond."
That said, the US Government is continuing its investigation and is signalling an intention to do something about REvil and other gangs or privateers. Among other things, the US Administration said that it has communicated very clearly to Russian authorities that the US wants the REvil operators brought to book. CBS News reported yesterday that White House press secretary Psaki said that the US had been in touch with Russian officials about the REvil operation, and that if Russia doesn't take action against its ransomware gangs, "we will." TASS is, of course, authorized to disclose that Russia not only had nothing to do with the attack, and that it knew nothing about it, and that in fact Moscow had heard nothing from Washington about the matter.
The ransomware attack, coming as it did so soon after cybersecurity figured prominently in the Russo-American summit, has placed the US Administration under pressure to devise some effective retaliation that might deter such attacks. The Washington Post reports a growing sense that the US must "either win some public concessions from Russia quickly or punch back hard."
Fortune asks why major cyberattacks tend to happen around holidays, and gives the obvious answer: around holidays, people's minds tend to be elsewhere, people's bodies on vacation.
The CyberWire has more extensive coverage of the Kaseya ransomware incident on its website.