Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A new Android malware leveraging a COVID-19 theme to infect devices and steal victim data. The distribution method used by this malware is not currently known, but it cannot be found in the official Google Play Store, so the apps must be side-loaded by users. Various icons are used for the application but consistent across the samples is the package name “DZ.Eagle.Master” and the application label “Covid.” Once installed on the device, the malware checks in to the C2 server while simultaneously providing it with device information, such as the network operator, model, manufacturer, and IP address. In response, the C2 server provides the malware with a configuration file, “settings.xml.” The C2 server can also issue one of several commands. These commands include closing the malware, displaying messages, and exfiltrating the contact list, phone calls, device information, and SMS messages. The location of the C2 server combined with the package name indicates that Algerian users are likely being targeted. Notably, this malware is using an old, compromised code signing certificate.