Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Researchers found that the Tellyouthepass ransomware variant was active during the routine risk file investigation. The attacker uses the compression tool to package the exe, and integrates the ms16-032 kernel privilege escalation vulnerability exploit module and the Eternal Blue intranet spread module into the ransomware attack package to achieve intranet worm-like virus transmission.
The complete exploit package is an exe executable program packaged with a compression tool. After running, the run_update.bat script in the package will be executed first.
The run_update.bat script further starts the other two modules with awindows_privedge.exe as the parent process
awindows_privedge.exe is an exploit program for the ms16-032 kernel privilege escalation vulnerability. The attacker tries to execute other attack modules with SYSTEM privileges, so as to achieve a wider coverage of ransomware encrypted files and a more stable intranet spread attack process.
After the encryption is completed, the files are all added with the .locked extension suffix, and a ransom note named README.html is left.
File encryption
Block all threat indicators at your respective controls.
Search for IOCs in your environment.