• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – MuddyWater Adds Exploits to their Arsenal
June 10, 2019
Rewterz Threat Alert – New MuddyWater Activities Uncovered
June 11, 2019

Rewterz Threat Alert – Bitcoin Extortion Attempts Observed Through Social Engineering

June 11, 2019

Severity

Medium

Analysis Summary

Several users have reported observing several Bitcoin extortion emails with the subject “[redacted name] : [redacted pw]” and “I hacked your device [email address] and you have a problem now…”. in a new wave of social engineering attacks. 

Social engineering is the most effective way of observing the details of the target user and gather information through different social media platforms to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Impact

Bitcoin extortion

Indicators of Compromise

Email Address

  • yciyzioqx[@]veite[.]com
  • x[@]kyih[.]com
  • iouokis[@]yze[.]com
  • yn[@]jdb[.]com
  • ceicolupb[@]auze[.]com
  • zupued[@]xran[.]com
  • seni[@]wf[.]com
  • vur[@]biu[.]com
  • ryteawyw[@]vvi[.]com
  • euabufwaq[@]qo[.]com
  • te[@]raaw[.]com
  • azuaazgoe[@]he[.]com
  • z[@]jai[.]com
  • gijsuzrsm[@]qa[.]com
  • xaxz[@]lez[.]com
  • jiqd[@]ta[.]com
  • ya[@]kle[.]com
  • qowgagaoc[@]upuu[.]com
  • dazygcqyc[@]cyoj[.]com
  • ijeora[@]nuil[.]com
  • xraxkakaa[@]xel[.]com
  • bxiieygiy[@]eome[.]com
  • u[@]kb[.]com
  • oiqwufi[@]yi[.]com
  • xpowsaj[@]ttjy[.]com
  • euwaux[@]guiajc[.]com
  • yotvwaggu[@]pai[.]com
  • xuirirmoq[@]x[.]com
  • vrawrynuy[@]xr[.]com
  • ewuj[@]fmy[.]com
  • brekyzfvh[@]seb[.]com
  • ysp[@]gfed[.]com
  • dammkymd[@]nica[.]com
  • x[@]je[.]com
  • leanorapenny[@]mchzwf.moskovskayagruppa[.]xyz
  • mhfzyp[@]icuy[.]com
  • ahaxt[@]ule[.]com
  • trula-newcomb[@]gkwbeu.anonimnost[.]xyz
  • knumolk[@]sh[.]com
  • oraxexao[@]bokeo[.]com
  • marilynmesser[@]gkwbeu.anonimnost[.]xyz
  • jikyho[@]wxop[.]com
  • ik[@]rudy[.]com
  • wiv[@]hook[.]com
  • pyjye[@]kacy[.]com
  • dianiv[@]esy[.]com
  • waolg[@]cf[.]com
  • ykqoj[@]uq[.]com
  • berifauux[@]fjao[.]com
  • yxwmuyre[@]hivici[.]com

Email Subject

  • I hacked your device [email address] and you have a problem now…”

Remediation

Block all threat indicators at your respective controls.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.