Argentinian Telecom Company is the Latest Victim of REvil Ransomware, with 18,000 Endpoints Infected



telecom ransomware attackThe ransom in excess of $7.5 Million is only one of many remediation issues Argentina’s largest ISP has to address, with it appearing that the entire network was compromised in the process.

It appears that Telecom Argentina definitely wasn’t prepared for this type of attack. REvil ransomware has been around since mid-2019 and the tactics used by this cybercriminal group are relatively well-known. According to reports from ZD Net, Telecom Argentina was running a Citrix VPN with a known security vulnerability whose patch had been issued months ago. Additionally, internal sources stated employees were being warned not to “open emails containing archive files”, indicating the potential use of phishing as another possible attack vector.

Once compromised access was achieved, reports indicate that the REvil gang were able to gain control over an Active Directory account with Domain Admin rights and used this account to spread their ransomware installer to the massive number of infected endpoints.

Seeing as REvil is known for also stealing victim data – either threating to release it to extort the ransom or auction it off to the highest bidder – it’s likely that sensitive Telecom Argentina data has already been exfiltrated, although REvil hasn’t taken any actions to confirm this is the case.

This ransomware attack demonstrates how the planning of a defensive strategy against a ransomware attack is the only strategy warranted. Sure, you can recover your data afterwards, but the damage is done and it will take months for Telecom Argentina to truly believe they are back to a known-secure state.

Lessons to be learned from this attack include:

  • Patch everything, immediately. Adding in vulnerability scanning would give you a leg up on just simple patch management.
  • Monitor/manage use of privileged accounts, restricting who can access them, from where, etc.

Include your users into the security strategy by putting them through continual Security Awareness Training that keeps phishing emails from becoming a viable initial attack vector for ransomware or any other cyberattack.


Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews