Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
AP15 threat actor group – aka Ke3chang, Mirage, Vixen Panda, and Playful Dragon – has been active since at least 2010. The group is primarily known for targeting organizations in the Middle East, specifically in Saudi Arabia, with a focus on government and military entities. The group is believed to be based in China and has been associated with a variety of tools and techniques. The group is known for using sophisticated malware and targeted spear-phishing campaigns to gain initial access to targeted networks. Once inside a network, the group uses a variety of tools to move laterally and exfiltrate sensitive data. The group has been known to focus on a wide range of sectors, including government, defense, aerospace, telecommunications, and high-tech industries.
APT15 has been known for using various infrastructure and tools to evade detection, including using legitimate third-party tools and services, custom malware and backdoors, and the use of encrypted communication channels. The group has been also known for using a variety of tools to maintain persistence on compromised systems and to hide their activity.