Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The Evil Corp group has been active since at least 2011 and has extensively used the Dridex banking Trojan and the BitPaymer ransomware. Researchers are reporting that in May 2020, the Evil Corp group began using a new ransomware package named WastedLocker. The group is selective in their targeting and typically target cloud environments, database services, file servers, and virtual machines. These types of targets have the potential of a higher financial return than targeting consumers. The distribution method used by the group has not changed and they continue to use the SocGholish fake update framework which delivers a CobaltStrike loader. A custom crypter named CryptOne is used to protect WastedLocker and it is also used by other malware families. When WastedLocker is executed, if it is not running with administrative rights, it will attempt to elevate its privileges using a UAC bypass technique. It will encrypt files on fixed, remote, removable, and shared drives. Rather than the common list of file types to encrypt, WastedLocker uses an exclusion list of directories and files which are not to be encrypted.
File encryption
Block all threat indicators at your respective controls.
Search for IOCs in your environment.