Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
RedEnergy is a newly discovered cyber threat known as a “Stealer-as-a-Ransomware” that has been specifically deployed in targeted attacks against energy utilities, oil, gas, telecom, and machinery sectors. This sophisticated malware enables the attackers to extract sensitive information from different web browsers and possesses the ability to function as ransomware.
In the analysis, researchers highlights that the RedEnergy malware employs a deceptive campaign known as “FAKEUPDATES” to trick victims into updating their web browsers. Once inside the system, the malware stealthily extracts sensitive information and proceeds to encrypt the compromised files. The threat actors behind RedEnergy have been using reputable LinkedIn pages to target victims, including a machinery manufacturing company in the Philippines and multiple organizations in Brazil.
The attack chain of RedEnergy involves multiple stages. It begins with users clicking on links to visit the targeted company’s website through their LinkedIn profiles. These users are then redirected to a rogue website that instructs them to install what appears to be a legitimate browser update. However, the downloaded file, known as RedStealer, is actually a malicious executable.
One notable aspect of this threat campaign is the use of a deceptive download domain called “www[.]igrejaatos2[.]org.” This domain disguises itself as a ChatGpt site to lure victims into downloading a fake offline version of ChatGpt. However, the victims unknowingly obtain the same malicious executable mentioned earlier when they download the purported ChatGpt zip file.
The RedEnergy malware sample analyzed by researchers is written in .NET and possesses advanced evasion techniques and anti-analysis features. It communicates with its command and control servers using HTTPS, ensuring encrypted communication. To maintain persistence, the malware stores files in the Windows startup directory and creates an entry within the start menu.
Researchers also observed suspicious activity involving File Transfer Protocol (FTP), suggesting that threat actors may have used this protocol for data exfiltration. In the final stage of the attack, the malware utilizes ransomware modules to encrypt the user’s data, appending the “.FACKOFF!” extension to encrypted files and deleting backups. A ransom note is dropped, demanding payment in exchange for decrypting the files.
The analysis concludes by emphasizing the evolving and highly sophisticated nature of cyber threats targeting various industries. It underscores the critical importance of implementing robust security measures, promoting user awareness, and ensuring prompt incident response to effectively mitigate the impact of such attacks. By remaining vigilant and implementing comprehensive cybersecurity strategies, businesses can better protect themselves against these malicious campaigns and safeguard their valuable data.
“It is crucial for individuals and organizations to exercise utmost caution when accessing websites, especially those linked from LinkedIn profiles. Vigilance in verifying the authenticity of browser updates and being wary of unexpected file downloads is paramount to protect against such malicious campaigns.”, the researchers added.
2no.co