Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A WordPress malware campaign is leveraging various HTML features to obscure the scripts being injected into victim websites. Sucuri has published a blog post analyzing the different methods used in this campaign. In both versions of the campaign analyzed by researchers, the script executed on comprised websites redirects visitors to push notification scam sites. The first identified script abuses the data URL notation functionality of HTML. Using this method, the attackers can place their scripts inline with the data:text/javascript type in the src parameter instead of between source tags. This makes the script less detectable as it is not situated where most injected scripts usually are. In order to further obfuscate their script and decrease detection, the attackers evolved their campaign to additionally leverage HTML entities. The scripts are modified by replacing various characters with their entity names or numbers, which makes the content less readable and thus, less detectable. To inject this code into the sites, various vulnerabilities in WordPress themes and plugins are being exploited.
Exposure of sensitive information
WordPress