Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
An overlapping attack activity carried by ITG013 (also known as “APT34” or “Oilrig”) and an unknown, probably Iranian cyber group targeting the energy sector in the Middle East. Further, it is assessed that access to at least one targeted environment was used to conduct a destructive attack using newly identified disk wiper malware, ZeroCleare. The attack timeline may have begun as early as Autumn of 2018 with reconnaissance scanning from various low cost/free VPN providers and gaining access to one of the accounts that was later involved in the attack. Then, in the Summer of 2019, the attackers used a password spray from a system on the local network to gain access to additional accounts, install ASPX webshells, and gain domain administration privileges. Finally, unknown actors spread a destructive wiper ZeroCleare across the target network and executed it. The ZeroCleare disk wiper malware had both x86 and x64 versions to execute across 32-bit and 64-bit operating systems. Interestingly, this malware incorporated the Eldos RawDisk driver, which was previously used in each of the Shamoon attacks, reportedly perpetrated by Iranian-linked threat actors.
Wipe out data from the infected host
IP
193[.]111[.]152[.]13
MD5