

Rewterz Threat Advisory – Multiple Netgear Nighthawk WiFi6 Router Vulnerabilities
March 14, 2023
Rewterz Threat Advisory – ICS: Multiple Siemens RUGGEDCOM CROSSBOW Vulnerabilities
March 15, 2023
Rewterz Threat Advisory – Multiple Netgear Nighthawk WiFi6 Router Vulnerabilities
March 14, 2023
Rewterz Threat Advisory – ICS: Multiple Siemens RUGGEDCOM CROSSBOW Vulnerabilities
March 15, 2023Severity
High
Analysis Summary
Meterpreter – a trojan-type program – enables attackers to take control of affected machines remotely. This malware injects itself into compromised processes rather than creating new ones. Meterpreter can be utilize to send and receive files, launch executable files, perform command shell operations, capture screenshots, and record keystrokes. The main objective of its distribution is either to generate revenue or infect devices with additional malware. Infected email attachments, malicious online advertisements, and social engineering are some of its distribution methods. Threat actors can infect victims’ systems with more malware, such as ransomware, by sending, receiving, and executing files using Meterpreter. Ransomware encrypts data, making it impossible for victims to use or access it unless they acquire decryption tools from the program’s creators. Identity theft, banking information, and password theft are the main impact of this trojan.
Impact
- Information theft
- Unauthorized Access
Indicators of Compromise
MD5
- 4ae0f0b7c5658780ab5effc53ca928d0
- 1a757863137e79a69e98a3a9476bc631
- 194da3d71c49efe53b59af798f313efb
- 6bf359f7ae51aab5b7713813edd33172
SHA-256
- 2e6f77989f02436fe4ba89ef6a8ec755b2f837304609f2f44b4ebff34c46418f
- 83004a359ed78f2ed04cb7c3090ecf8bc78a86dc4ecf075d2780e14524c8bf8d
- b118f4effbde3252cb3eca71641d2f45c8e67cb3d7c77799aa41b85856abf029
- fde583b9745cb25492b27659a9e0b4ca38bde9505f8e3d1501a9c3a0cc6aba64
SHA-1
- 75345d5e38949963bb88c86e702fda2ca5258385
- 3fcd5c42fe2c5a75cc0ed5f16662bb92209cb2f3
- 0ca59039ded4c7fb8688dc2f5091fb477060837a
- ad236b9b8dd7ec0b34d8a7c7165895787e49f8fc
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.