Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
SEVERITY: Medium
CATEGORY: Informative Updates
ANALYSIS SUMMARY
A set of commands have been retrieved from memes posted on a hacker-controlled Twitter account, containing malware controlled by hackers. The new threat is detected as (TROJAN.MSIL.BERBOMTHUM.AA), a malicious Trojan received via legitimate service of Twitter. The BERBOMTHUM malware checks the Twitter account used by the attackers, downloads and scans meme files, and extracts the commands they include.
Attackers hid the “/print” command in the memes, which allows them to take screenshots of the infected machine and send them back to a C&C server whose address is obtained through a hard-coded URL on pastebin.com. Following commands were retrieved from the memes.
Commands
/print (Screen capture)
/processos (Retrieve list of running processes)
/clip (Capture clipboard content)
/username (Retrieve username from infected machine)
/docs (Retrieve filenames from a predefined path such as (desktop, %AppData% etc.))
The malware can only be disabled by deletion of the malicious Twitter account.
IMPACT
Command execution on target device.
AFFECTED PRODUCTS
REMEDIATION
Do not download or click on attachments or links that are unexpected and do not seem to be coming from legitimate and verified sources.