Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
MassLogger was first reported in late April or early May. It is a modular keylogger and infostealer that researchers describes as having more features than other similar malware. Its features include the ability to spread itself by infecting inserted USB storage devices, anti-VM techniques, and the ability to exclude itself from Windows Defender checks. It is being distributed in malspam campaigns that mainly use various types of archive files or documents attached to the emails. The malicious documents use VisualBasic macros and include an exploit for the Equation Editor vulnerability (CVE-2017-11882) in MS Office, which was patched in November 2017. The payload is downloaded from a remote source. When the infection vector is an archive file, the payload is obfuscated and contained within the archive. MassLogger will attempt to obtain user data from a number of applications including Discord, Chromium Recovery, FileZilla, FireFox, Foxmail, NordVPN, Outlook, Pidgin, QQ, Telegram, and Thunderbird. Keystrokes are logged and other information is obtained, all of which is sent to the C&C server. Persistence is achieved through the creation of scheduled tasks.