• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – McAfee Total Protection (MTP) privilege escalation
December 3, 2020
Rewterz Threat Alert – Active Lokibot Malware IOCs
December 3, 2020

Rewterz Threat Alert – Active Phishing URLs

December 3, 2020

Severity

Medium

Analysis Summary

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details. This is done by disguising oneself as trustworthy communication to obtain information which can be used against the user. Phishing activities are almost ongoing across the world and is the most common source of attack used against the victims to lure them to click on the malicious attachments. The URLs, email subjects, filenames are made in such manner where the user would feel the domain is legitimate and has no hesitation clicking on the attachment. This would lead the victim to land on the phishing page where the threat actor would gather the information and later on use against the victim.

Impact

  • Credential theft
  • Exposure of sensitive data

Indicators of Compromise

URL

  • https[:]//oronge[.]digital/personal/e/authID=wytmJ/
  • https[:]//loginspaces[.]webnode[.]be/
  • https[:]//mobileconnectsosh888[.]webador[.]com/
  • https[:]//intrologins[.]webnode[.]be/
  • https[:]//espacespacks[.]webnode[.]cr/

Remediation

  • Block all threat indicators at your respective controls. 
  • Always be suspicious about emails sent by unknown senders. 
  • Never click on links/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.