Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
ProLock actors encrypt the files on the victim’s network using RSA-2048 algorithm. After encrypting a victim’s files, ProLock actors leave a .txt extension file as a ransom note on the victim computer. The ransom note instructs the victims to visit a TOR page and log in using a unique ID included in the ransom note. The TOR page then displays the ransom price and wallet address for the ransom payment. The ransom note indicates the decryption keys will be stored for one month. The ProLock actors provide an email address victims can use to contact the ProLock actors if the victim cannot connect to the TOR page. |
File encryption |
MD5
c579341f86f7e962719c7113943bb6e4
7f5e4679edcfae6068ffa2051c4010fa
SHA-256
a6ded68af5a6e5cc8c1adee029347ec72da3b10a439d98f79f4b15801abd7af0
8ef5c9aed65c4561a0e30f9b579cd96c6b97b385b9f1d57d6dab5a9f2bcf9e6f
SHA1
e2a961c9a78d4c8bf118a0387dc15c564efc8fe9
dd7af4dfd19a62982a0d5de8b35e331a481a6aad
Block all threat indicators at your respective controls. Always be suspicious about emails sent by unknown senders. Never click on the links/attachments sent by unknown senders |