• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft: raspberry robin worm key facilitator of lockbit, cl0p ransomware

Microsoft: Raspberry Robin worm key facilitator of LockBit, Cl0p ransomware

You are here: Home / General Cyber Security News / Microsoft: Raspberry Robin worm key facilitator of LockBit, Cl0p ransomware
October 28, 2022

Getty Pictures

Microsoft has printed its investigation into Raspberry Robin, locating considerable hyperlinks involving the worm and primary ransomware campaigns, as nicely as its key role in a wider malware ecosystem.

The existing primary ransomware marketing campaign, LockBit, has been demonstrated to be in aspect facilitated by the Raspberry Robin worm and the now-shuttered Cl0p ransomware, which was another of the most prolific campaigns of 2021 and 2022, also applied it to deploy payloads.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Researchers noticed gadgets contaminated with Raspberry Robin remaining set up with the FakeUpdates malware in July 2022, main to action attributed to the danger actor tracked as DEV-0243 – a ransomware-linked team whose steps overlap with these of the team tracked as EvilCorp by other security scientists.

Raspberry Robin-infected gadgets ended up very first found deploying LockBit ransomware payloads in November 2021 and has considering the fact that been noticed dropping samples of malware such as IcedID, Bumblebee, and Truebot too.

Furthermore, Microsoft observed in October 2022 Raspberry Robin currently being made use of in article-compromise exercise attributed to a further actor, DEV-0950. The broadly abused Cobalt Strike penetration testing tool was effectively dropped on victims after a Raspberry Robin an infection and this eventually also led to the deployment of Cl0p ransomware.

“DEV-0950 usually takes advantage of phishing to receive the the greater part of their victims, so this notable shift to applying Raspberry Robin enables them to produce payloads to current bacterial infections and go their campaigns far more speedily to ransomware phases,” claimed Microsoft.

Microsoft’s facts indicated that virtually 3,000 products in pretty much 1,000 organisations have found at least 1 Raspberry Robin payload-associated warn in the final 30 times.

Raspberry Robin was publicly disclosed in May well 2022 by security business Crimson Canary which branded it a extensively distributed worm. Due to the fact then, it is progressed into a person of the biggest malware distribution platforms currently active, Microsoft explained.

Microsoft also stated it’s achievable that the actors powering the Raspberry Robin-relevant malware strategies are shelling out the worm’s operators to set up malware that could lead to more attacks.

“Raspberry Robin’s infection chain is a complicated and sophisticated map of a number of infection details that can guide to several distinct results, even in eventualities where two hosts are contaminated concurrently,” mentioned Microsoft.

“There are many components involved differentiating them could be challenging as the attackers guiding the menace have gone to extreme lengths to shield the malware at every stage with sophisticated loading mechanisms. These attackers also hand off to other actors for some of the much more impactful attack levels, this sort of as ransomware deployment.”

Microsoft also explained it is really at present informed of and tracking at the very least 4 entry vectors utilized by Raspberry Robin to infect sufferer devices – vectors that were being linked to fingers-on-keyboard exercise from risk actors. The stop purpose of these steps was most probable the deployment of ransomware, it added.

The tech huge underlined that building a sturdy safety and detection tactic and investing in credential cleanliness, least privileges, and network segmentation are keys to stopping the impression of these complex threats.


Some parts of this report are sourced from:
www.itpro.co.uk

Previous Post: «researchers uncover stealthy techniques used by cranefly espionage hackers Researchers Uncover Stealthy Techniques Used by Cranefly Espionage Hackers
Next Post: UK police fails ethical tests with “unlawful” facial recognition deployments uk police fails ethical tests with "unlawful" facial recognition deployments»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks
  • How to Interpret the 2023 MITRE ATT&CK Evaluation Results
  • Iranian Nation-State Actor OilRig Targets Israeli Organizations
  • High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server
  • Apple Rushes to Patch 3 New Zero-Day Flaws: iOS, macOS, Safari, and More Vulnerable
  • Mysterious ‘Sandman’ Threat Actor Targets Telecom Providers Across Three Continents
  • Researchers Raise Red Flag on P2PInfect Malware with 600x Activity Surge
  • The Rise of the Malicious App
  • China Accuses U.S. of Decade-Long Cyber Espionage Campaign Against Huawei Servers
  • Cyber Group ‘Gold Melody’ Selling Compromised Access to Ransomware Attackers

Copyright © TheCyberSecurity.News, All Rights Reserved.