Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Recently, researchers reported that the notorious Cyclops ransomware gang has started offering a Go-based info stealer to other cybercriminals. This tool can be used to steal sensitive information such as login credentials, credit card details, and other personal data from infected hosts.
“The threat actor behind this RaaS promotes its offering on forums. There it requests a share of profits from those engaging in malicious activities using its malware.” said in a report
The group is known for using advanced techniques to evade detection and encryption to lock victims’ files. With this new offering, the Cyclops gang is expanding its reach and potentially increasing the number of victims it can target.
Cyclops ransomware is a notable threat that targets multiple operating systems, including Windows, macOS, and Linux. Its cross-platform capability allows it to infect and encrypt files on a wide range of systems, potentially impacting users across different environments.
One aspect of Cyclops ransomware is its use of Golang, or the Go programming language, for the macOS and Linux versions. Golang is known for its efficiency and cross-platform support, making it an attractive choice for developing malware that can target multiple operating systems.
The Go-based stealer associated with the Cyclops ransomware is specifically designed to target both Windows and Linux systems. It aims to gather various system-related details such as the operating system information, computer name, and the number of running processes. Additionally, it focuses on capturing files that match specific extensions of interest.
The targeted file extensions include .TXT (text files), .DOC (Microsoft Word documents), .XLS, .PDF, .JPEG and .JPG, and .PNG. These file types often contain valuable and sensitive information. Once the data has been harvested, the Go-based stealer proceeds to upload the collected files to a remote server. This allows the threat actors to access the stolen data from an admin panel.
The information stealer component of the Cyclops ransomware designed to be accessed by the threat actors’ customers through an admin panel, suggests a possible ransomware-as-a-service (RaaS) model.
The emergence of this information stealer highlights the increasing sophistication and diversification of cyber threats. Organizations and individuals should remain vigilant, maintain up-to-date security measures, and employ best practices to protect their systems and data from such malicious activities.
By incorporating these measures into an organization’s security strategy, the risk of successful attacks, including those involving the Cyclops ransomware gang and information stealers, can be significantly reduced.