Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Analysis Summary
A new variant of Mirai exploiting a large number of vulnerabilities. This variant leveraged 13 different vulnerabilities targeting routers, surveillance products, and other IoT devices. Though all of these vulnerabilities have been seen in various Mirai variants, this is the first variant containing exploits for all 13. Once exploited, a victim device connects to both its C2 and a few downloader/dropper URLs. It then spreads to other devices on the network by scanning for and exploiting detected vulnerabilities or performing brute force attacks.
Indicators of Compromise
URLs
Malware Hash (MD5/SHA1/SH256)
Remediation