Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A new cyber threat group known as “NewsPenguin” has been linked to a phishing attack aimed at marine-related entities in Pakistan and using the PIMEC-23 maritime expo as a lure.
According to the researchers, NewsPenguin has launched a phishing campaign targeting Pakistani entities by leveraging the upcoming PIMEC-23, an international maritime expo organized by the Pakistan Navy.
“The attacker sent out targeted phishing emails with a weaponized document attached that purports to be an exhibitor manual for PIMEC-23. The document utilizes a remote template injection technique and embedded malicious Visual Basic for Applications (VBA) macro code to deliver the next stage of the attack, which leads to the final payload execution.”
PIMEC is a Pakistan Navy initiative organized under the auspices of the Ministry of Maritime Affairs. It gives the marine industry, both public and private, the opportunity to showcase products and create business relationships. The event would also highlight Pakistan’s marine potential and offer a boost to national economic growth.
The method employed in the attack, known as remote template injection, is a technique that allows attackers to fetch the next-stage payload from a server controlled by the attacker. This technique is often used to avoid detection by the security software, as the payload is only delivered if the request is sent from a specific location, in this case, an IP address located in Pakistan.
The server was found to be hosting two ZIP archive files which contained a Windows executable (updates.exe) that functions as a covert spying tool capable of bypassing sandboxes and virtual machines. The backdoor was encrypted using the XOR encryption algorithm with the key “penguin”, hinting at the name of the threat actor.
“The final payload is an advanced espionage tool that is XOR encrypted with a “penguin” encryption key. The content-disposition response header name parameter is set to “getlatestnews” during the HTTP response.”
The domain hosting the payloads was registered since June 30, 2022, suggesting that the attack was planned in advance. The timeframe and planning for this campaign by the threat actor demonstrate that the attacker is constantly enhancing the tools they use to infiltrate target systems. It is rare for criminal organizations to plan ahead and create network infrastructure months before an event.
“As the target is an event run by the Pakistan Navy, it implies that the threat actor is actively targeting government organizations, rather than this being a financially motivated attack.”
It is crucial for individuals and organizations to be vigilant when receiving emails with attachments, especially when they appear to be from unfamiliar or unexpected sources. Before opening any attachments, it is recommended to verify the identity of the sender and to scan the file with updated antivirus software. In addition, organizations should have strong security protocols in place to prevent and detect phishing attacks, including implementing multi-factor authentication, regularly training employees on security best practices, and having a incident response plan in place.