Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A new phishing campaign is targeting a number of United Nations entities and humanitarian organizations with copies of their login portals hosted on copycat domains. According to Lookout’s report on this campaign, the phishing sites are mobile aware in order to display more legitimate-looking content. JavaScript code within the malicious webpage attempts to identify whether the site is being loaded on a mobile device. If so, the page is loaded in a mobile-friendly view, which also unintentionally truncates the URL it is hosting on, making it appear even more legitimate. Along with the traditional method of gathering submitted credentials and exfiltrating them to the attacker, these phishing sites also contain code to perform keylogging so that even if the user does not actually hit the submit button, data typed into the page is still collected. The two domains used in this campaign, and their associated subdomains, all used valid SSL certificate so that users were not presented with a warning by browsers, again furthering the legitimacy of the site. The researchers note that the while many of the SSL certificates that were in use have expired, some of the domains are still live and with valid certificates. Additionally, while analyzing the infrastructure hosting these sites, it was discovered that the ASN of the IPs the domains resolved to is known to have hosted malware in the past.
URL