Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A new infection chain and obfuscation techniques used by njRAT in recent campaigns. The first method discussed is packaging the payload inside installers for legitimate software. Although the legitimate software is installed on the system, to avoid raising the suspicions of the victim, an infection chain is also kicked off. First a VBS file is dropped that maintains persistence via the Startup folder. This script is responsible for the execution of a series of PowerShell scripts that ultimately download and run the njRAT payload from a legitimate cloud hosting service, such as OneDrive. In another case, PowerShell scripts, masquerading as image files, are downloaded with the final payload being loaded via process injection. These newer samples of njRAT include additional obfuscation, such as the use of ConfuserEx, and anti-analysis techniques, such as detecting VM and debugging software. Once installed on the system, njRAT provides the attacker with the ability to obtain system information and process commands received from its C2 server.
Block all threat indicators at your respective controls.