• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
raspberry robin malware upgrades with discord spread and new exploits

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

You are here: Home / General Cyber Security News / Raspberry Robin Malware Upgrades with Discord Spread and New Exploits
February 9, 2024

The operators of Raspberry Robin are now working with two new 1-day exploits to accomplish neighborhood privilege escalation, even as the malware continues to be refined and enhanced to make it stealthier than prior to.

This suggests that “Raspberry Robin has obtain to an exploit vendor or its authors acquire the exploits by themselves in a short time period of time,” Test Point explained in a report this week.

Raspberry Robin (aka QNAP worm), 1st documented in 2021, is an evasive malware household that is acknowledged to act as one particular of the prime preliminary accessibility facilitators for other malicious payloads, including ransomware.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Attributed to a risk actor named Storm-0856 (beforehand DEV-0856), it is really propagated by using various entry vectors, which include infected USB drives, with Microsoft describing it as section of a “advanced and interconnected malware ecosystem” with ties to other e-criminal offense teams like Evil Corp, Silence, and TA505.

Cybersecurity

Raspberry Robin’s use of a person-day exploits these kinds of as CVE-2020-1054 and CVE-2021-1732 for privilege escalation was beforehand highlighted by Look at Stage in April 2023.

The cybersecurity firm, which detected “massive waves of attacks” because Oct 2023, stated the risk actors have applied supplemental anti-evaluation and obfuscation approaches to make it tougher to detect and analyze.

“Most importantly, Raspberry Robin continues to use different exploits for vulnerabilities either just before or only a brief time following they have been publicly disclosed,” it pointed out.

“Those people just one-working day exploits had been not publicly disclosed at the time of their use. An exploit for a person of the vulnerabilities, CVE-2023-36802, was also made use of in the wild as a zero-day and was sold on the dark web.”

A report from Cyfirma late final year discovered that an exploit for CVE-2023-36802 was remaining marketed on dark web forums in February 2023. This was seven months ahead of Microsoft and CISA introduced an advisory on lively exploitation. It was patched by the Windows maker in September 2023.

Raspberry Robin Malware

Raspberry Robin is said to have begun making use of an exploit for the flaw someday in October 2023, the exact thirty day period a general public exploit code was manufactured available, as properly as for CVE-2023-29360 in August. The latter was publicly disclosed in June 2023, but an exploit for the bug did not look right until September 2023.

Cybersecurity

It truly is assessed that the risk actors obtain these exploits fairly than establishing them in-house owing to the fact that they are employed as an external 64-little bit executable and are not as seriously obfuscated as the malware’s core module.

“Raspberry Robin’s potential to immediately incorporate newly disclosed exploits into its arsenal further demonstrates a considerable menace level, exploiting vulnerabilities just before a lot of organizations have applied patches,” the company mentioned.

A single of the other sizeable improvements fears the first accessibility pathway alone, leveraging rogue RAR archive data files made up of Raspberry Robin samples that are hosted on Discord.

Also modified in the more recent variants is the lateral motion logic, which now takes advantage of PAExec.exe alternatively of PsExec.exe, and the command-and-handle (C2) interaction system by randomly deciding upon a V3 onion handle from a list of 60 hardcoded onion addresses.

“It commences with hoping to speak to reputable and properly-regarded Tor domains and checking if it gets any reaction,” Check Level discussed. “If there is no reaction, Raspberry Robin doesn’t try to converse with the genuine C2 servers.”

Identified this posting fascinating? Abide by us on Twitter  and LinkedIn to examine extra distinctive information we put up.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «moqhao android malware evolves with auto execution capability MoqHao Android Malware Evolves with Auto-Execution Capability
Next Post: Alert: New Stealthy “RustDoor” Backdoor Targeting Apple macOS Devices alert: new stealthy "rustdoor" backdoor targeting apple macos devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.