Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
An APT campaign targeting Malaysian users that they believe is being carried out by the Leviathan APT (aka ITG09, APT40). The initial lure document, likely sent via spear phishing emails. When opened, a remote template is downloaded in the background. The remote template, in turn, executes VBA macro code that is responsible for unpacking and executing two DLLs. The first DLL downloads a benign executable and a malicious DLL. The second DLL dropped by the VBA code runs the benign executable, which leads to the malicious DLL being executed due to DLL search order hijacking. The side-loaded DLL is a first-stage backdoor that downloads an additional file, decrypts it, executes it in memory, and deletes the downloaded file. Once running in memory, this additional file acts as a second-stage backdoor providing various capabilities, such as anti-debug checks, file discovery, upload, and download, establishing persistence, and command line execution. The C2 server is operated via dynamic DNS. Both the TTPs and string similarities within the payloads leads the researchers to believe this activity is being carried out by Leviathan.