Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Active since early 2019, the Raccoon infostealer has gained a large following of cybercriminal customers to a Malware-as-a-Service model. According to a Cofense report, it is now being used in a campaign that targeted a financial organization. The email that was analysed for the report is similar to many BEC emails in that it refers to a wire transfer and asks the recipient to view the attached file for details. Cofense speculate that the email may have been sent from a compromised account. The file itself is a .IMG file hosted on Dropbox. If the file is executed, it installs Raccoon on the victim system. Communications with the Raccoon C&C servers is carried out over HTTP. Raccoon has become popular for many reasons including that the license to use for a month costs only $200, features 24/7 customer support provided in both the English and Russian languages, and is available in both 32 and 64 bit versions.
Exposure of sensitive information
IP
34[.]89[.]185[.]248
MD5
SHA-256
SHA1
URL