Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Hawkeye is exploiting an 18-year-old vulnerability in Microsoft Office products using malicious office documents. The HawkEye malware kit and information-stealer has been spotted in a newfound slew of campaigns after a recent ownership change. It comes with special key-logging abilities and anti-detection features. The exploited flaw was discovered and manually fixed by Microsoft in 2017.
CVE-2017-11882
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka “Microsoft Office Memory Corruption Vulnerability”.
The threat group uses NirSoft utilities to collect credentials. The recent Rattlesnake attack on Pakistan Navy also exploited this vulnerability, indicating that users are still running unpatched versions of the affected products. The vulnerability was also exploited by the Cobalt hackers last year.
Domain Name
chandelawestafricanltd[.]com
MD5
SH256
SHA1
Source IP
URL
hxxp[:]//chandelawestafricanltd[.]com/image/obo/obxi[.]exe