• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2019-13523 – ICS: Honeywell Performance IP Cameras and Performance NVRs Information Disclosure Vulnerability
September 18, 2019
Rewterz Threat Advisory – CVE-2019-12922 – phpMyAdmin Cross Site Request Forgery Vulnerability
September 18, 2019

Rewterz Threat Alert – Spam Campaign Utilizing LokiBot For their Gain

September 18, 2019

Severity

Medium

Analysis Summary

A spam campaign that was using an infostealer called LokiBot that appears to have been freshly compiled for the campaign. The campaign was against a large US manufacturing company and targeted their sales email address. The body of the email attempts to emulate a Request for Quotation document, with the malicious payload as an attachment. The attachment is a ZIP archive with the LokiBot malware contained within. Once opened, the infection process begins. LokiBot captures FTP credentials, stored email passwords, passwords stored in browsers, as well as other credentials to send back to its command and control servers.

Impact

  • Exposure of sensitive information
  • Credential theft

Indicators of Compromise

URLs

  • http[:]//palikyu[.]ml/alpha/fre[.]php

Malware Hash (MD5/SHA1/SH256)

  • 176c61b6220854995af271f3ba82bbd7960aacc20e070a3476d8fbac5ab0c2d8
  • 691c65e4fb1d19f82465df1d34ad51aaeceba14a78167262dc7b2840a6a6aa87

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the link/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.