Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A spam campaign that was using an infostealer called LokiBot that appears to have been freshly compiled for the campaign. The campaign was against a large US manufacturing company and targeted their sales email address. The body of the email attempts to emulate a Request for Quotation document, with the malicious payload as an attachment. The attachment is a ZIP archive with the LokiBot malware contained within. Once opened, the infection process begins. LokiBot captures FTP credentials, stored email passwords, passwords stored in browsers, as well as other credentials to send back to its command and control servers.
URLs
Malware Hash (MD5/SHA1/SH256)