Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The Emergency Response Team of Ukraine has warned about phishing attacks that use the information-stealing malware Jester Stealer on compromised computers. The subject line of the bulk email campaign appears to be a “chemical attack”. These emails contain a link to a macro-laced Microsoft Excel file which leads to computers getting infected with Jester Stealer after opening. In this campaign, the attack operates by downloading and running an .EXE file obtained from compromised web resources, which needs prospective victims to allow macros after viewing the document.
Jester Stealer is an information stealer first analyzed by researchers when it surfaced on hacker forums back in July 2021. This malicious program is designed to steal a wide range of sensitive data from infected machines. Browsing data, account passwords, and financial and banking information theft are all the primary targets of this malware. It also collects information stored in browsers, such as account passwords, email messages, IM app chats, and cryptocurrency wallet information. This stolen information is then transferred to a remote server, where threat actors gather it to use in future attacks or sell it on dark web markets. The info-stealer has anti-analysis capabilities (anti-VM/debug/sandbox), but doesn’t implement any persistence method. Threat actors exfiltrate data through Telegram using statically configured proxy addresses.