
Chile’s Grupo GTD warns {that a} cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting on-line companies.
Grupo GTD is a telecommunications firm providing companies all through Latin America, with a presence in Chile, Spain, Columbia, and Peru. The corporate offers numerous IT companies, together with web entry, cell and landline phone, and information middle and IT managed companies.
On the morning of October twenty third, GTD suffered a cyberattack that impacted quite a few companies, together with its information facilities, web entry, and Voice-over-IP (VoIP).
“We perceive the significance of proactive and fluid communication within the face of incidents, subsequently, in accordance with what we beforehand mentioned on the telephone, I wish to inform you that we’re experiencing a partial affect on companies on account of a cybersecurity incident,” reads a GTD safety incident notification.
“This affect is restricted to a part of our laas platform and a few shared companies (IP telephony companies, VPNs and OTT tv system). Our communication COR, in addition to our ISP, are working usually.”
To forestall the assault’s unfold, the corporate disconnected its IaSS platform from the web, main to those outages.
At present, Chile’s Pc Safety Incident Response Group (CSIRT) confirmed that GTD suffered a ransomware assault.
“The Pc Safety Incident Response Group (Authorities CSIRT) of the Ministry of the Inside and Public Safety was notified by the corporate GTD a few ransomware that affected a part of its IaaS platforms in the course of the morning of Monday, October 23,” reads a machine-translated assertion on the CSIRT web site.
“As a consequence, some public companies in our nation have introduced unavailability on their web sites.”
The CSIRT is requiring all public establishments who’re using GTD’s IaaS companies to inform the federal government underneath decree No. 273, which requires all State companies to report when a cybersecurity incident could affect them.
Ransomware IOCs launched
Whereas CSIRT has not disclosed the identify of the ransomware operation behind the assault on GTD, BleepingComputer has discovered that it concerned the Rorschach ransomware variant beforehand seen utilized in an assault on a US firm.
Rorschach ransomware (aka BabLock) is a comparatively new encryptor seen by Examine Level Analysis in April 2023. Whereas the researchers couldn’t hyperlink the encryptor to a specific ransomware gang, they warned that it was each subtle and really quick, capable of encrypt a tool in 4 minutes and 30 seconds.
In a report on the GTD assault seen by BleepingComputer, the menace actors are using DLL sideloading vulnerabilities in legit Development Micro, BitDefender, and Cortex XDR executables to load a malicious DLL.
This DLL is the Rorschach injector, which can inject a ransomware payload referred to as “config[.]ini” right into a Notepad course of. As soon as loaded, ransomware will start encrypting recordsdata on the machine.
CSIRT has shared the next IOCs associated to the assault on GTD beneath, with u.exe and d.exe being legit TrendMicro and BitDefender executables used within the assault and the DLLs containing the malware.
| SHA256 | File Title | Description |
| 58c20b0602b2e0e6822d415b5e8b53c348727d8e145b1c096a6e46812c0f0cbc | log.dll | DLL Ransomware |
| 5822b7c0b07385299ce72788fd058ccadc5ba926e6e9d73e297c1320feebe33f | TmDbgLog.dll | DLL Ransomware |
| 43a3fd549edbdf0acc6f00e5ceaa54c086ef048593bfbb9a5793f52a7cc57d1c | u.exe | Execution Vector (TrendMicro AirSupport) |
| 3476f0e0a4bd9f438761d9111bccff7a7d71afdc310f225bfebfb223e58731e6 | d.exe | Execution Vector (BitDefender Replace Downloader) |
Chile’s CSIRT recommends that each one organizations related to GTD’s IaaS undergo the next steps to substantiate they weren’t breached within the assault:
- Carry out a whole scan of your infrastructure with antivirus.
- Confirm that there is no such thing as a suspicious software program in your techniques.
- Evaluate present accounts in your server and make sure that no new accounts have been created.
- Analyze processing and onerous drive efficiency to make sure it’s not altered.
- Examine if there’s any kind of variation within the data or information leak of the corporate and its databases.
- Examine your community site visitors.
- Keep an up-to-date report of your techniques to make sure efficient monitoring.
- Prohibit entry by way of SSH to servers, provided that strictly needed.
Earlier this yr, the Chilean army suffered a Rhysida ransomware assault, the place BleepingComputer was advised that the menace actors launched 360,000 paperwork stolen from the federal government.
BleepingComputer reached out to Grupo GTD with additional questions in regards to the assault this morning however didn’t obtain a response.