Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The Sunburst malware, also known as Solorigate or SolarWinds malware, is a highly sophisticated and advanced persistent threat (APT) that was discovered in December 2020. The malware was used in a supply chain attack that targeted the SolarWinds Orion network management software.
The malware is believed to have been developed by a state-sponsored group operating out of Russia, and it is one of the most significant cyber threats to have been discovered in recent years. The malware is distributed via a software update to the SolarWinds Orion platform, which is used by thousands of organizations worldwide. Once it gains access to a target network, it establishes a foothold, and then uses a variety of techniques to move laterally across the network, collecting data and exfiltrating it to the attackers’ command-and-control server.
The malware uses a number of sophisticated techniques to evade detection, including the use of legitimate tools and software, the use of multiple layers of encryption, and the use of a custom-built, encrypted protocol for communication with the command-and-control server. The malware is also able to persist on the network even after the initial compromise has been detected and cleaned up.
The impact of the Sunburst malware is still being assessed, but it is believed that the attackers were able to gain access to a large number of organizations, including government agencies and private companies, and that they were able to steal sensitive data and intellectual property. The malware is still active, and it is likely that new variants and attacks will be discovered in the future.
It is important to note that this is a summary of the analysis of the Sunburst malware, it is highly sophisticated and continues to evolve, so it is important to stay informed and follow the best practices and guidance provided by cybersecurity experts.