• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers warn of raspberry robin's worm targeting windows users

Researchers Warn of Raspberry Robin’s Worm Targeting Windows Users

You are here: Home / General Cyber Security News / Researchers Warn of Raspberry Robin’s Worm Targeting Windows Users
July 8, 2022

Cybersecurity researchers are drawing focus to an ongoing wave of attacks joined to a danger cluster tracked as Raspberry Robin that is powering a Windows malware with worm-like abilities.

Describing it as a “persistent” and “spreading” threat, Cybereason stated it noticed a number of victims in Europe.

The infections contain a worm that propagates around removable USB products that contains destructive a .LNK file and leverages compromised QNAP network-hooked up storage (NAS) equipment for command-and-control. It was very first documented by researchers from Red Canary in Could 2022.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Also codenamed QNAP worm by Sekoia, the malware leverages a reputable Windows installer binary referred to as “msiexec.exe” to download and execute a malicious shared library (DLL) from a compromised QNAP NAS appliance.

“To make it tougher to detect, Raspberry Robin leverages procedure injections in 3 reputable Windows technique processes,” Cybereason researcher Loïc Castel explained in a specialized publish-up, including it “communicates with the rest of [the] infrastructure by means of TOR exit nodes.”

Persistence on the compromised device is obtained by creating Windows Registry modifications to load the destructive payload by way of the Windows binary “rundll32.exe” at the startup section.

The marketing campaign, which is believed to date back again to September 2021, has remained a little something of a thriller so significantly, with no clues as to the risk actor’s origin or its close objectives.

The disclosure comes as QNAP reported it is actively investigating a new wave of Checkmate ransomware bacterial infections targeting its devices, building it the most up-to-date in a collection of attacks following AgeLocker, eCh0raix, and DeadBolt.

CyberSecurity

“Preliminary investigation signifies that Checkmate attacks by using SMB services uncovered to the internet, and employs a dictionary attack to break accounts with weak passwords,” the corporation noted in an advisory.

“At the time the attacker correctly logs in to a product, they encrypt details in shared folders and go away a ransom take note with the file identify “!CHECKMATE_DECRYPTION_README” in each and every folder.”

As safeguards, the Taiwanese corporation recommends clients to not expose SMB services to the internet, boost password energy, get frequent backups, and update the QNAP operating method to the hottest model.

Located this report fascinating? Observe THN on Facebook, Twitter  and LinkedIn to go through more distinctive information we put up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Spear Phishing Fake Job Offer Likely Behind Axie Infinity’s Lazarus $600m Hack
Next Post: QR codes are just as insecure as anything else qr codes are just as insecure as anything else»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.