Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The Gustuff Banking Trojan is now coming with the addition of a “poor man scripting engine” based on JavaScript that provides the operator with the ability to execute scripts while using its own internal commands backed by the power of JavaScript language. The actors have eventually disabled the C2. Campaigns have been detected running via Instagram, Facebook and SMS that aimed to deploy the Gustuff Trojan. The malware is targeting financial institutions in Australia. In addition the malware uses useless targets to send propagation SMS messages. Each target is requested to send SMSs at a rate of 300 per hour. The list of anti-virus/anti-malware software that Gustuff blocks as a self-defense mechanism is now also loaded during the activation cycle, as below.
The threat actors are targeting Australian banks and digital currency wallets. This new version seems to target hiring sites’ mobile apps. It comes with dynamic loading of webviews. It can receive a command to create a webview targeting specific domains, while fetching the necessary injections from a remote server. It also appears to be targeting credentials used on the official Australian government’s web portal.
During the activation cycle, the malware now asks the user to update their credit card information without immediately showing a panel for the user to provide the information. Instead, it will wait for the user to do it and — leveraging the Android Accessibility API — will harvest it.
Domain Name
Source IP