Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Report: Managed Service Providers Are New Frontier of Ransomware Attacks

Hackers are targeting IT service providers as a means of attacking dozens of organizations at once and potentially reaping bigger financial rewards.

Hackers are increasingly finding ways to target several organizations at once through attacking managed service providers (MSPs) that often provide IT services to small businesses.

Several recent attacks targeted MSPs, including malware that paralyzed hundreds of dental clinics and an incident that temporarily affected services in 22 Texas cities and towns. The providers are widely used because local governments, clinics and other small organizations do not want to take on the cost of hiring their own IT staff and therefore outsource their needs to contractors.

In turn, cybercriminals can target one service provider, particularly smaller ones with fewer resources and employees, and potentially reap the financial benefits from dozens of small businesses in one attack. ProPublica recently reported on the phenomenon as ransomware attacks continue to rise and have severe consequences for organizations.

Read more: Multitude of Ransomware Attacks Cause Lawmakers to Take Notice

Hackers have largely preyed on MSPs that have weak passwords or do not use two-factor authentication. ProPublica also found that attackers have exploited issues with “remote monitoring and management” software that businesses and governments had downloaded to install systems updates.

Remote management is often used to install updates and solve users’ problems right on their screens, but can also serve as “golden keys to immediately distribute ransomware,” said Kyle Hanslovan, the CEO of cybersecurity firm Huntress Labs.

“Just like how you’d want to push a patch at lightning speed, it turns out you can push out ransomware at lightning speed as well,” he told ProPublica.

Cyber criminals have leverage over the MSPs because they often serve many companies and government agencies that contain sensitive information and need access to the data as soon as possible. The providers are more likely to pay ransoms because they are often small businesses themselves and cannot handle the influx of needs from dozens of clients that were paralyzed by the attack, according to Chris Bisnett, the chief architect at Huntress.

‘It’s one thing if I have 50 computers that are ransomed and encrypted and I can fix them,” Bisnett said. “There’s no way I have time to go and do thousands of computers all at the same time when I’ve got all these customers calling and saying: ‘Hey, we can’t do any business, we’re losing money. We need to be back right now.’ So the likelihood of the MSP just saying, ‘Oh I can’t deal with this, let me just pay,’ goes up.”

The rapid growth of ransomware attacks does not seem to be slowing down any time soon, particularly as the insurance industry continues to incentivize hackers by paying the ransoms instead of doling out money for data recovery services.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.