Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Threat actors have initiated a campaign known as DB#JAMMER, exploiting poorly secured Microsoft SQL (MS SQL) servers to deploy both Cobalt Strike and a ransomware strain identified as FreeWorld. A Cybersecurity firm has detailed this campaign, highlighting its unique approach to utilizing tools and infrastructure.
The campaign encompasses various tools, such as enumeration software, Remote Access Trojan (RAT) payloads, exploitation and credential-stealing software, and ransomware payloads. Of note, the attackers have shown a preference for a newer variant of the Mimic ransomware known as FreeWorld.
The initial access to victim hosts involves brute-forcing the MS SQL server, followed by database enumeration. The attackers leverage the xp_cmdshell configuration option to execute shell commands and perform reconnaissance. Subsequently, they manipulate the system firewall, establish persistence, and transfer files to and from the victim system via a remote SMB share. Malicious tools, including Cobalt Strike, are then installed to facilitate further actions.
The final step in this campaign involves distributing AnyDesk software and deploying the FreeWorld ransomware. A lateral movement phase is conducted before these actions. The threat actors have also attempted to establish Remote Desktop Protocol (RDP) persistence through Ngrok, although unsuccessfully.
The researchers emphasize that this attack initially succeeded due to a brute force attack on an MS SQL server, highlighting the critical importance of strong passwords, particularly for publicly exposed services.
This campaign emerges as the operators of Rhysida ransomware have claimed 41 victims, with a significant portion located in Europe. Rhysida is a relatively new ransomware strain that encrypts and exfiltrates sensitive data, threatening to release it if victims refuse to pay.
Additionally, a free decryptor has been released for the Key Group ransomware, which exploits cryptographic errors in the program. However, this script only works on samples compiled after August 3, 2023.
The year 2023 has witnessed a substantial increase in ransomware attacks compared to the previous year. Notably, the percentage of incidents resulting in ransom payment has decreased to a record low of 34%, while the average ransom amount paid has risen to $740,144, representing a 126% increase from Q1 2023.
This shifting landscape is accompanied by ransomware threat actors evolving their tactics, including sharing details of their attack techniques to invalidate cyber insurance claims, thereby pressuring victims to pay.
gelsd.com
45.148.122.63