Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
TA505 is sending email campaigns that attempt to deliver and install Get2, a new downloader. It later downloads FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. TA505 continues to focus on targeting financial institutions. New Microsoft Office macros are used specifically with the Get2 downloader. Tens of thousands of emails attempting to deliver Microsoft Excel attachments with English and Greek lures have been detected in October 2019. These emails targeted financial institutions in Greece, Singapore, United Arab Emirates, Georgia, Sweden, Lithuania, and a few other countries.
The new Get2 loader works in conjunction with a new Microsoft Excel macro. Get2 is embedded into the Microsoft Excel file as an object, which can be found as an image icon by scrolling through the document. The downloader collects basic system information and sends it via an HTTP POST request to a hardcoded command and control (C&C) server. It then downloads SDBbot which is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. It also makes use of application shimming for persistence.
Domain Name
Email Subject
MD5
SH256