Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Analysis Summary
The infection process is almost identical to the previous malspam campaign. The only difference is that the previous campaign had a ZIP archive attached to the malspam email, whereas this new campaign uses a link in a PDF attachment to retrieve the ZIP archive. Within the downloaded ZIP archive is a JavaScript file that infects vulnerable hosts with the Shade ransomware. Files are encrypted by the ransomware and payment via TOR is demanded in exchange for decryption.
Impact
File encryption.
Indicators of Compromise
IP(s) / Hostname(s)
74.220.207.61
62.212.69.227
URLs
Email Address
pilotpilot088[@]gmail.com
Malware Hash (MD5/SHA1/SH256)
Remediation
Block the threat indicators at their respective controls.
Always be suspicious of unsolicited email.
Never click/ download any attachments sent from unrecognized senders.