Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Executives at high-profile companies are being targeted by a fake voicemail campaign hunting for Office 365 credentials. Using Audio Voicemail Recordings, attackers convince targets that they need to login to hear the full recording. Three different malicious kits have been found so far. These campaigns pretend to be from Microsoft Office 365 and state that a call was missed and that the caller left a voicemail. An example of one of these phishing emails can be seen below.
Attached to the above email is an HTML attachment that when opened will automatically play an audio recording that pretends to be a partial voicemail saying hello.
This fake voicemail is autoplayed through an embedded .wav file in the HTML email. Users are then asked for their credentials.
When credentials are entered, users are redirected to legitimate office.com site and the information is exfiltrated to a C2 server. The campaign targets the following wide range of business types.
The following data is harvested from the victims and emailed to the owner of the phishing site:
Filename
URL