Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A recent version of the Ursnif Trojan (aka Dreambot, Gozi, and ISFB) which was discovered when a number of malicious Word documents were captured in the wild. The documents in this particular campaign used a common format for file names “info_[date].doc” and the provided example of “info_07.25.doc”. The documents attempt to trick the victim into enabling macros, which are required for the infection process to complete. If the victim enables macros, VBA code is used to which in turn generates PowerShell code that downloads the Ursnif payload. There are some anti-analysis techniques utilized in an attempt to make analysis more difficult. Once the infection process is complete, Ursnif will begin to communicate with its C&C server. The goal of Ursnif is to steal information from the victim. FortiGuard describes this campaign as an active and “currently expanding threat”.
Information theft
URLs
Filename
info_07.25.doc