Chilean telecom GTD reports ransomware attack by the Rorschach gang
Learn More
Chile's telecommunications company, Grupo GTD, has reported that it was a victim to a cyberattack that affected its Infrastructure as a Service (IaaS) platform, causing disruptions to various online services. The company, experienced outages in its data centers, internet access, and Voice-over-IP (VoIP) services following the attack.
Grupo GTD revealed that the adverse effects were confined mainly to their IaaS platform and a few shared services, such as IP telephony, VPNs, and the OTT television system. As a precautionary measure, the company temporarily severed its IaaS platform's internet connection.
Chile’s Computer Security Incident Response Team (CSIRT) later verified that the disruptions at GTD were the result of a ransomware attack. While the CSIRT remained silent on the identity of the cybercriminal group behind the attack, the perpetrators are identified the perpetrators as the Rorschach ransomware gang.
CSIRT shared several Indicators of Compromise (IOCs) associated with the attack, warning of the ransomware hidden in certain DLLs and pointing out legitimate security software executables manipulated during the attack.
CSIRT has shared the following IOCs related to the attack on GTD below, with u.exe and d.exe being legitimate TrendMicro and BitDefender executables used in the attack and the DLLs containing the malware.
| SHA256 | File Name | Description |
| 58c20b0602b2e0e6822d415b5e8b53c348727d8e145b1c096a6e46812c0f0cbc | log.dll | DLL Ransomware |
| 5822b7c0b07385299ce72788fd058ccadc5ba926e6e9d73e297c1320feebe33f | TmDbgLog.dll | DLL Ransomware |
| 43a3fd549edbdf0acc6f00e5ceaa54c086ef048593bfbb9a5793f52a7cc57d1c | u.exe | Execution Vector (TrendMicro AirSupport) |
| 3476f0e0a4bd9f438761d9111bccff7a7d71afdc310f225bfebfb223e58731e6 | d.exe | Execution Vector (BitDefender Update Downloader) |
To ensure security and thwart potential breaches, Chile’s CSIRT has outlined a series of preventive measures for organizations associated with GTD’s IaaS. These include:
- rigorous antivirus scans,
- close monitoring of software and server accounts,
- hard drive and cpu load and processing trends
- limiting SSH access to servers.
- data leak and unexpected network traffic indicators