Argentinian Telecom Company is the Latest Victim of REvil Ransomware, with 18,000 Endpoints Infected

Stu Sjouwerman | Jul 23, 2020

telecom ransomware attackThe ransom in excess of $7.5 Million is only one of many remediation issues Argentina’s largest ISP has to address, with it appearing that the entire network was compromised in the process.

It appears that Telecom Argentina definitely wasn’t prepared for this type of attack. REvil ransomware has been around since mid-2019 and the tactics used by this cybercriminal group are relatively well-known. According to reports from ZD Net, Telecom Argentina was running a Citrix VPN with a known security vulnerability whose patch had been issued months ago. Additionally, internal sources stated employees were being warned not to “open emails containing archive files”, indicating the potential use of phishing as another possible attack vector.

Once compromised access was achieved, reports indicate that the REvil gang were able to gain control over an Active Directory account with Domain Admin rights and used this account to spread their ransomware installer to the massive number of infected endpoints.

Seeing as REvil is known for also stealing victim data – either threating to release it to extort the ransom or auction it off to the highest bidder – it’s likely that sensitive Telecom Argentina data has already been exfiltrated, although REvil hasn’t taken any actions to confirm this is the case.

This ransomware attack demonstrates how the planning of a defensive strategy against a ransomware attack is the only strategy warranted. Sure, you can recover your data afterwards, but the damage is done and it will take months for Telecom Argentina to truly believe they are back to a known-secure state.

Lessons to be learned from this attack include:

  • Patch everything, immediately. Adding in vulnerability scanning would give you a leg up on just simple patch management.
  • Monitor/manage use of privileged accounts, restricting who can access them, from where, etc.

Include your users into the security strategy by putting them through continual Security Awareness Training that keeps phishing emails from becoming a viable initial attack vector for ransomware or any other cyberattack.

Topics: Ransomware

Ransomware Simulator

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.