Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity: High
Analysis Summary
A set of highly evasive malware with advanced capabilities has been retrieved in attacks launched against financial organizations. The attack mechanism closely resembles that of the North Korean APT group called Lazarus or Hidden Cobra. The attacks are specifically aimed at targeting banks, ATM switching networks and schemes, using variants of the earlier malware associated with this group. The campaign starts with a social-engineering attack impersonating reputable personalities from financial institutions. The victim is first approached over social media networks like LinkedIn and is invited to personal Gmail and Skype for the interview, subsequently sharing the fake job app that works as a malware dropper.
‘ApplicationPDF.exe’ is a malware dropper which is typically shared by the attacker on Skype or email with the victim. This malicious file performs the following set of activities: • Downloads a PowerShell script REG_TIME.ps1 after making a connection with a C2 domain ecombox.store • The script is stored at C:\users\public\REG_TIME.ps1 • Executes the following malicious scripts and deletes after 5 seconds REG_TIME.ps1 (Stage 1): • Contains PowerRatankba DES-encrypted payload • Decodes and decrypts the encrypted payload and executes it REG_TIME.ps1 (Stage 2): • Stage two Heavily utilizes WMI to gather information about the targets machine and AD domain • Gathers the following information from the victim’s machine: Victims IP and MAC address Details of operating system Logged in user Running processes State of TCP ports 139, 445 and 3389 It then allows the attacker to upload tools and run commands on the compromised machine to pivot to other machines on the network.
Impact
Malware Infection
Information Disclosure
Network-wide infection
Indicators of Compromise
IP(s) / Hostname(s)
Remediation
Block the Threat Indicators at their respective controls.
Spread awareness about such scams and how to handle them
Automated page speed optimizations for fast site performance