Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
Mekotio is a family of Latin American banking Trojans. According to researchers, one of the notable features in recent versions of Mekotio is the ability to use an SQL database as a C&C server. Either the SQL database or a protocol based on Delphi_Remote_Access_PC are used for C&C communications. Mekotio is mainly delivered in spam emails targeting victims in Latin America. Once installed on a victim system, Mekotio provides its operators with fairly typical backdoor functionality that includes being able to delete all files and folders from the Windows directory. Another interesting feature is that Mekotio disables Internet Explorer’s AutoComplete feature which forces the victim to enter their credentials and information rather than being able to use saved information. Fake popup windows are also used to extract information from victims. Some versions also hijack cryptocurrency transactions by replacing the wallet address in a transaction with one controlled by the Mekotio operators. A number of infection chains have been used by Mekotio.