Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Tycoon, a multi-platform Java-based ransomware which targets Windows and Linux has been seen in the wild since December of 2019. Tycoon ransomware attempts to infiltrate small to medium sized companies and institutions in education and software industries. As with other ransomware software and threat actors, encrypting data in order to extort payment for the return of the stolen data to a victim is the primary mission. Initial infection of Tycoon involves the attack of Internet-facing RDP jump-servers. Persistence is gained through a technique called Image File Execution Options (IFEO) injection which are stored in the Windows registry. Usage of a backdoor as well as the Microsoft Windows On-Screen Keyboard allowed for quick access to infected systems. Attackers also disable any anti-malware solutions using the ProcessHacker utility as well as changing the passwords of Active Directory servers thus blocking the victim from accessing to their own servers.
The last step in the infection process involves the execution of the Java ransomware module which encrypts all file servers including backup systems connected to the networks. Finally, analysts have suggested, that due to the overlap of email addresses and naming conventions of encrypted files, there could be a connection between Tycoon and Dharma/CrySIS ransomware.
File encryption