Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
An elusive ransomware package found and dubbed “Sodinokibi”. The Sodinokibi authors have been linked to the now retired GandCrab ransomware, which accounted for about 40% of all ransomware infections in its day. This may give some indications and warnings about the potential of Sodinokibi. First discovered in Asia, Sodinokibi has now spread to parts of Europe. Initial infections were from server vulnerabilities being exploited. Currently, infections are spreading through phishing attacks and exploit kits. URLs are provided in the phishing emails that downloads Sodinokibi.zip. Should the user click on the obfuscated JavaScript file in the ZIP archive, WScript (legitimate Windows application for running JavaScript) begins executing it. The JavaScript deobfuscates a PowerShell script embedded in the its code. Variations of Sodinokibi will sometimes download this PowerShell script instead of having it embedded in the JavaScript. This PowerShell script, in turn, decodes yet another script that, combined with a .NET module, is executed. If the privileges of the victim are not high enough, this last script will attempt to bypass the UAC (User Access Controls) to elevate its permissions. Once high enough privileges are acquired, infection begins. Sodinokibi actively searches for a South Korean anti-virus package called “Ahnlab V3 Lite”. If it exists, Sodinokibi attempts to inject itself in the Ahnlab process. If not, a separate instance of the current PowerShell becomes the injection target. Sodinokibi contains a list of languages to exclude from infection. If the current system is configured with one from this set, the malware shuts down. If the system is not saved by the default language, Sodinokibi begins to delete the shadow files to make recovery more difficult. Next comes the encryption of the files on the system, recursively searching each directory. Each directory with files encrypted receives its own copy of the ransom note. When complete, the desktop is modified to inform the victim of the attack.
File encryption
Malware Hash (MD5/SHA1/SH256)