Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A number of malicious code attacks that were targeted at Android users in South Korea. The attacker induced the victim to install and use the malicious Android application by disguising it as a common mobile application in South Korea. After analysis, it was found that the attack activity is consistent with the KONNI Android Trojan disclosed by ESTsecurity, both in terms of attack methods and Trojan horse framework.
Fake download page of GooglePlay
After the APK Trojan is executed, it will request “http: // [C2] /manager/files/To_[IMEI].txt ” every 3 seconds , and then execute the instructions issued by the attacker based on the returned data, and then execute the The result is transmitted back to the server through the upload interface; when the Trojan starts, it will upload the phone information, SDCard file directory, and the list of installed applications to the C2 server.
Exposure of sensitive information
MD5