Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
A file named notepad.exe has been detected which is weaponized by threat actor to perform attack. Such software can be termed as Trojanized open-source software and it is hard to detect as open source software source code is available publicly. The weaponized notepad.exe is being dropped through Windows NT operating system kernel executable (ntoskrnl.exe) by exploiting ntoskrnl.exe or via network shares. The Notepad.exe will call executables ipconfig.exe, net.exe, reg.exe, systeminfo.exe, tasklist.exe. Besides, malicious notepad will search for Config.dat located in C:\Windows\Debug folder which legitimate Notepad will not. The malicious Notepad has additional code to load an encrypted blob file which is Config.dat to decrypt the code and executes it in the memory to ensure persistence of the backdoor.
Unauthorized Code Execution