Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Analysis Summary
Over the past few months, a new malware loader called JasperLoader has emerged that targets Italy and other European countries with banking trojans such as Gootkit. The Jasperloader malware is under continued development and newer updates show signs of antivirus and sandbox evasion techniques. Initial infection vector sources from phishing emails in Italian. These emails contain .zip files with .vbs (Visual Basic Scripting) files inside them. The .vbs file contains highly obfuscated code that utilizes PowerShell to retrieve and execute additional stages of malware for the campaign. The final stage includes installing persistence mechanisms such as .lnk files in the windows startup folder and scheduling of tasks to reinstall/re-infect the target machine. Additional features of the malware include “Geofencing” to limit the infections to a specific geographical area.
Impact
Loss of sensitive information
Indicators of Compromise
URLs
Malware Hash (MD5/SHA1/SH256)
Remediation