Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
Over the past year, the Astaroth infostealer trojan has evolved into one of today’s stealthiest malware strains, containing a slew of anti-analysis and anti-sandbox checks to prevent security researchers from detecting and analyzing its operations. Different types of lures, including COVID-19, are being used to trick victims into installing Astaroth, an information stealing malware package. The variation of Astaroth being deployed includes complex obfuscation, anti-analysis, and evasion techniques to avoid detection and analysis. Another feature of this variation of Astaroth is its use of encoded/encrypted YouTube channel descriptions for communication with its command and control servers. The infection vector in this campaign is emails written in Portuguese targeting Brazilian users at the moment. The email uses a number of different lures to entice the user into clicking the URL embedded in the body. Once clicked, the victim is taken to an attacker owned server where the initial payload is a ZIP file is downloaded from a Google-based server.