Why Hackers Love MSPs and What We’re Gonna Do About It

29th July 2025 | Blog Why Hackers Love MSPs and What We’re Gonna Do About It

“Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100 networks!’”

Managed Service Providers (MSPs) have long been the unsung heroes of IT: patching systems at 2 a.m., juggling multiple client environments, and quietly saving the day (with barely a thank-you). But lately, MSPs are making headlines for a less flattering reason: they’ve become a top-tier target for cybercriminals.

Why? Simple. Why break into one company when you can break into one MSP and get 50?

Let’s dive into why MSPs have a target on their backs, and how we, as cybersecurity professionals, can help them fight back with style and strategy.

The Juicy Appeal: Why Hackers Are All-In on MSPs

Here’s the cold truth: MSPs are rich targets because they hold the keys to multiple kingdoms. With administrative access to many clients’ systems, one successful compromise can be the digital equivalent of a bank robber walking away with all the vaults.

But it’s not just about access. Let’s break down the hacker love affair with MSPs:

  1. Access Multipliers: One MSP account compromise can open doors to dozens of environments.
  2. Legacy Tech and Overload: Many MSPs juggle a lot of tools with too little time. Unfortunately, security can degrade over time for a variety of reasons.
    1. Clients refuse to upgrade aging equipment or refuse down-time.
    2. Clients introduce rogue equipment that isn’t monitored or manager.
    3. Staffing changes can lead to the loss of system expertise.
  3. Weak MFA Policies: Some still rely on SMS 2FA or (gasp) no MFA at all. That’s hacker heaven.
  4. Flat Network Structures: If one client gets popped, lateral movement is a cakewalk without good segmentation.
  5. Inconsistent Patching: With multiple client environments and multiple console toolsets, it is easy for patching to fall behind.

Real-World Wake-Up Calls

Cybercriminal groups like REvil and Black Basta have repeatedly targeted MSPs to deploy ransomware at scale. In some cases, attackers waited weeks or months after initial access, just to map out how many clients they could hit simultaneously.

And let’s not forget Kaseya’s VSA incident in 2021. Hackers exploited a zero-day to deploy ransomware across 1,500 downstream clients.

How We Fix This (Without Losing Our Minds)

Okay, we’ve painted the doom. Now let’s talk defense. If you’re advising or securing an MSP, here are the non-negotiables:

  1. Zero Trust or Zero Chance
    Move away from implicit trust. Assume every login, user, and process could be malicious until proven otherwise. Yes, even that one admin who says, “I don’t click weird links.”
  2. Embrace Passkeys with a Password Manager
    Ditch traditional usernames, passwords, and even MFA. Passkeys replace the entire login process with a faster, more secure method. They offer the same level of protection as a strong password and MFA combined, but without the hassle. Passkeys are the future of seamless, secure authentication, just be sure to store them in a secure password manager.
  3. Segmentation is Sexy
    Client environments should be siloed. Lateral movement should be harder than getting Taylor Swift tickets. Bonus: use VLANs, dedicated firewalls, and identity-based access policies.
  4. Monitor Like a Hawk
    Use endpoint detection and response (EDR or XDR), SEIMs, and automated alerts. If your systems aren’t screaming at you when something’s off, it’s time for new tools.
  5. Security Awareness Training (SAT)
    Train your clients’ users like their jobs depend on it, because, well… they kinda do. Phishing simulations, policy education, and gamified learning can go a long way.  Bonus Benefit: if you have fewer nights and weekends where your highest paid engineers are helping clients recover from a ransomware attack, they have better quality of life, and are more likely to stick around at your MSP!
  6. Backups That Actually Work
    Immutable. Encrypted. Tested. If you haven’t restored from a backup lately, it might as well not exist.
  7. Vendor Due Diligence
    Your own vendors (like RMM or PSA platforms) could be the weak link. Vet them. Monitor them. Make them sign security addendums that make them sweat a little.

The Balancing Act

Being an MSP means walking a tightrope between operational efficiency and airtight security. But here’s the thing, security is now part of your value proposition. If you don’t prioritize it, your clients will walk… or worse, they’ll sue.

Cybersecurity isn’t about scaring people into buying products. It’s about protecting trust, and MSPs sit at the very heart of that trust web.

Final Thoughts: Hackers Are Evolving, So Should We

Let’s be real. Cybercriminals are getting smarter, faster, and more coordinated. But so are we. With the right tools, strategies, and mindset, we can flip the script.
MSPs are not the weakest link when they focus on cybersecurity in everything they do. They must be the strongest node in the entire information technology network and program.

So suit up, train clients on cyber literacy, lock down those endpoints, and remember: in cybersecurity, resilience is the real flex.

 

Sources and Additional Reading:


Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more
Your WiFi Might Be Watching You… Sort Of

Your WiFi Might Be Watching You… Sort Of

As smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...

Read more