{"id":5948,"date":"2021-07-09T19:58:39","date_gmt":"2021-07-09T23:58:39","guid":{"rendered":"https:\/\/www.millerthomson.com\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/"},"modified":"2026-03-18T12:49:05","modified_gmt":"2026-03-18T16:49:05","slug":"ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/","title":{"rendered":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact"},"content":{"rendered":"\n<p>Over the July long weekend, Canadian, American, and other international businesses were victims of a&nbsp;<a href=\"https:\/\/www.cbc.ca\/news\/world\/cyberattack-ransomware-kaseya-1.6089578\">far-reaching ransomware attack<\/a>. The REvil group, a ransomware syndicate also known as <i>Sodin<\/i> or <i>Sodinokibi,<\/i> are believed to be behind the attack. This gang\u2019s most prominent and recent attack targeted Kaseya, an IT management software service that operates within a supply chain system. It is believed that&nbsp;<a href=\"https:\/\/www.bbc.com\/news\/technology-57719820\">REvil is demanding a ransom<\/a>&nbsp;equal to the Bitcoin equivalent of $70 million dollars to decrypt all the affected systems. This recent international&nbsp;<a href=\"https:\/\/www.ctvnews.ca\/sci-tech\/scale-details-of-massive-kaseya-ransomware-attack-emerge-1.5496208\">cyberattack on Kaseya customers<\/a>&nbsp;highlights how vulnerable end-customer businesses such as retail chains can be to these attacks because a service providers\u2019 data breach trickles down throughout the supply chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The attack and ransom demands<\/h2>\n\n\n\n<p>Kaseya has indicated that it was infected only with respect to \u201con-premise\u201d servers. Cloud-based services were apparently not affected. Kaseya\u2019s customers, such as Swedish retail grocery chain CO-OP, were significantly impacted to the point where over 800 CO-OP stores had to be temporarily closed. This was due to the fact that the retailer\u2019s cash register software supplier was taken offline. These are examples of the downstream impact of cybersecurity incidents in the supply chain.<\/p>\n\n\n\n<p>According to&nbsp;<a href=\"https:\/\/www.kaseya.com\/press-release\/kaseya-responds-swiftly-to-sophisticated-cyberattack-mitigating-global-disruption-to-customers\/\">Kaseya\u2019s public statements<\/a>, approximately 50 of their clients were affected by the attack. The majority of Kaseya\u2019s affected clients were managed service providers (MSPs) who provide IT services to their own customers. It appears that at least&nbsp;<a href=\"https:\/\/www.reuters.com\/technology\/hackers-demand-70-million-liberate-data-held-by-companies-hit-mass-cyberattack-2021-07-05\/\">1,500 organizations were victims of ransomware<\/a>&nbsp;being deployed on their systems via a&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30116\">zero-day vulnerability in Kaseya\u2019s system<\/a>&nbsp;that was identified approximately 3 months before the attack occurred. Since 2015, a billing and customer support site had an&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-2862\">untreated vulnerability<\/a>, and Kaseya is currently analysing the&nbsp;<a href=\"https:\/\/krebsonsecurity.com\/2021\/07\/kaseya-left-customer-portal-vulnerable-to-2015-flaw-in-its-own-software\/\">2015 vulnerability\u2019s breach implications<\/a>.<\/p>\n\n\n\n<p>It is interesting to note, however, that some <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-victims-are-refusing-to-pay-after-flawed-kaseya-ransomware-attack\/\">victims are apparently <i>refusing<\/i> to pay the ransom<\/a> due to a lack of leverage the attackers were able to establish. Apparently, as devastating as the attacks are, data loss, access, and theft may have been less pervasive than in other and commonly seen \u201ctwo-pronged attack\u201d strategies of data encryption plus data exfiltration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can businesses protect themselves?<\/h2>\n\n\n\n<p>There are a number of precautions organizations can take. These include contractual safeguards, technical safeguards, as well as vendor due diligence. Businesses must also understand their contractual and legal obligations after a breach has impacted their data or operations.<\/p>\n\n\n\n<p>At every stage of the supply chain, appropriate contractual provisions must require prompt notifications to customers of data security incidents. Businesses should also consider using cyber insurance as a risk management tool. Type of coverage and quantum should be tailored and considered carefully.<\/p>\n\n\n\n<p>Having well-established and well-rehearsed incident response plans should be part of every organization\u2019s playbook, as should appropriate backups and business continuity plans. Organizations may wish to include consideration of how to handle ransom demands and what the starting position is on making these payments to criminals (knowing that some incidents can be successfully remediated with less effort than others).<\/p>\n\n\n\n<p>Another way to minimize risks is conducting due diligence when deciding which IT service providers to entrust with an organization\u2019s data and operations. This includes looking deeper into the supply chain and knowing which sub-contractors or sub-processors are being used. Continuous monitoring and auditing are a key part of vendor supply chain management. Technologies and attack vectors change and so do organizations and their risk profiles.<\/p>\n\n\n\n<p>An organization\u2019s own network must be secure as well. Here, the technical interfaces with suppliers should be heavily scrutinized and assessed.<\/p>\n\n\n\n<p>Lastly, businesses have legal and contractual responsibilities. Under the federal&nbsp;<em>Personal Information Protection and Electronic Documents Act,&nbsp;<\/em>for example, the organization \u201cin control\u201d must report to individuals or the federal regulator whenever an incident results in a personal data breach that carries a \u201creal risk of significant harm.\u201d This is often times the case in dual-extortion scenarios, but is certainly not always the case. There may also be contractual or reputational requirements to notify end-customers or other stakeholders, both internal and external, irrespective of whether personal information was accessed or taken.<\/p>\n\n\n\n<p>Organizations potentially impacted by the Kaseya or similar supply chain breaches would be well-advised to understand all known and potential future impacts on their organizations in such cases and consider any resulting obligations as well as future remediation.<\/p>\n\n\n\n<p>If you have any questions regarding your company\u2019s existing cybersecurity policies or would like to develop solutions for mitigating and responding to cyber threats, including ransomware, please feel free to reach out to any member of Miller Thomson\u2019s&nbsp;<a href=\"https:\/\/www.millerthomson.com\/en\/our-services\/focus-areas\/cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity team<\/a>&nbsp;for specific advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the July long weekend, Canadian, American, and other international businesses were victims of a&nbsp;far-reaching ransomware attack. The REvil group, a ransomware syndicate also known as Sodin or Sodinokibi, are believed to be behind the attack. This gang\u2019s most prominent and recent attack targeted Kaseya, an IT management software service that operates within a supply [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14345,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[531],"insight-format":[418],"class_list":["post-5948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"Over the July long weekend, Canadian, American, and other international businesses were victims of a&nbsp;far-reaching ransomware attack. The REvil group, a ransomware syndicate also known as Sodin or Sodinokibi, are believed to be behind the attack. This gang\u2019s most prominent and recent attack targeted Kaseya, an IT management software service that operates within a supply [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-09T23:58:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T16:49:05+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea\"},\"headline\":\"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact\",\"datePublished\":\"2021-07-09T23:58:39+00:00\",\"dateModified\":\"2026-03-18T16:49:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\",\"name\":\"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"datePublished\":\"2021-07-09T23:58:39+00:00\",\"dateModified\":\"2026-03-18T16:49:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg\",\"width\":1776,\"height\":994,\"caption\":\"person in hoodie looking at a computer screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson","og_description":"Over the July long weekend, Canadian, American, and other international businesses were victims of a&nbsp;far-reaching ransomware attack. The REvil group, a ransomware syndicate also known as Sodin or Sodinokibi, are believed to be behind the attack. This gang\u2019s most prominent and recent attack targeted Kaseya, an IT management software service that operates within a supply [&hellip;]","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2021-07-09T23:58:39+00:00","article_modified_time":"2026-03-18T16:49:05+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/"},"author":{"name":"admin","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea"},"headline":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact","datePublished":"2021-07-09T23:58:39+00:00","dateModified":"2026-03-18T16:49:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/","name":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","datePublished":"2021-07-09T23:58:39+00:00","dateModified":"2026-03-18T16:49:05+00:00","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/Insights_Cybersecurity_Post-Image.jpg","width":1776,"height":994,"caption":"person in hoodie looking at a computer screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/cybersecurity\/ransomware-trickles-down-into-your-supply-chain-kaseya-cyberattack-highlights-cybersecurity-risks-and-business-impact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware trickles down into your supply chain: Kaseya cyberattack highlights cybersecurity risks and business impact"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/3f9143e8aec04617923b89fecf6886ea","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2fb85dacd7d0cf6d162ec9c30c25b90c6e69a82dbe5ebe52991d2ec0d73e4890?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=5948"}],"version-history":[{"count":1,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5948\/revisions"}],"predecessor-version":[{"id":47971,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/5948\/revisions\/47971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/14345"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=5948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=5948"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=5948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}