» » ‘Raspberry Robin’ Windows Worm Abuses QNAP Devices

‘Raspberry Robin’ Windows Worm Abuses QNAP Devices

‘Raspberry Robin’ Windows Worm Abuses QNAP Devices

Residence › Virus & Threats

‘Raspberry Robin’ Home windows Worm Abuses QNAP Gadgets

By Ionut Arghire on July 11, 2022

Tweet

A not too long ago found Home windows worm is abusing compromised QNAP network-attached storage (NAS) units as stagers to unfold to new programs, in line with Cybereason.

Dubbed Raspberry Robin, the malware was initially noticed in September 2021, spreading primarily by way of detachable units, equivalent to USB drives.

In a Might 2022 report, Crimson Canary famous that the malware primarily depends on msiexec.exe – the authentic executable program of the Home windows Installer – to speak with its infrastructure, utilizing HTTP requests. It additionally makes use of Tor exit notes for command and management (C&C).

Raspberry Robin was noticed primarily in organizations associated to the know-how and manufacturing sectors, however Crimson Canary safety researchers couldn’t establish different hyperlinks among the many victims and stated that the aim of the assaults remained unsure.

In a brand new technical report on Raspberry Robin’s an infection course of, Cybereason researchers famous that the malware additionally spreads by way of file archives and ISO recordsdata, along with USB drives.

The an infection course of begins with two recordsdata in the identical listing, particularly a LNK shortcut containing a Home windows shell command, and a BAT file. On the first stage, msiexec.exe is named to fetch a malicious DLL from a compromised QNAP NAS system.

The malware injects itself into three authentic Home windows system processes operating on the sufferer system, particularly rundll32.exe, dllhost.exe and regsvr32.exe.

For persistence, Raspberry Robin creates a registry key, guaranteeing that the identical DLL downloaded from the exterior useful resource is injected into rundll32.exe when the system begins, after which the method injection stage begins.

“Because the malicious module is identical one as through the preliminary an infection course of, it shows the identical malicious actions involving course of injection and communication with Tor exit nodes,” Cybereason notes.

The researchers recognized different Raspberry Robin samples as properly, together with one the place the module is signed – utilizing the OmniContact code signing identify – however shouldn’t be verified by the Home windows platform. In roughly 75% of the noticed incidents, the malware was signed by OmniContact, the researchers say.

In keeping with Crimson Canary, one of many questions that continues to be unanswered is how Raspberry Robin infects the USB drives to unfold to new programs. Moreover, with out info on later-stage exercise, the corporate couldn’t establish the objective of the assaults.

Associated: Purple Fox Malware Squirms Like a Worm on Home windows

Associated: Ryuk Ransomware With Worm-Like Capabilities Noticed within the Wild

Associated: New Variant of the Houdini Worm Emerges

Get the Day by day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Related Eye Care Discloses Influence From 2020 Netgain Ransomware Assault
  • The Historical past and Evolution of Zero Belief
  • ‘Raspberry Robin’ Home windows Worm Abuses QNAP Gadgets
  • CEO Accused of Making Tens of millions by way of Sale of Pretend Cisco Gadgets
  • Musk Ditches Twitter Deal, Triggering Defiant Response
  • Cisco Patches Important Vulnerability in Enterprise Communication Options
  • New ‘HavanaCrypt’ Ransomware Distributed as Pretend Google Software program Replace
  • Fortinet Patches Excessive-Severity Vulnerabilities in A number of Merchandise
  • Election Officers Face Safety Challenges Earlier than Midterms
  • 10 Vulnerabilities Present in Broadly Used Robustel Industrial Routers

On the lookout for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By means of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Find out how to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Find out how to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles