Friday, April 11, 2025
HomeCyber Security NewsRaspberry Robin - A a Windows Malware Spreads Using External USB Drives

Raspberry Robin – A a Windows Malware Spreads Using External USB Drives

Published on

SIEM as a Service

Follow Us on Google News

The security analysts at Red Canary have uncovered recently a brand-new malware that can spread through external USB drives using worm-like capabilities.

In September 2021, malware called Raspberry Robin was first observed associated with a cluster of malicious activity known as ‘Raspberry Robin’. Despite this, the majority of related activities took place during or after January 2022.

The security team of Red Canary found this worm on the networks of several customers, from the technology and manufacturing industries, among others.

- Advertisement - Google News

As soon as a new USB drive containing a malicious .LNK file is plugged into a Windows computer, Raspberry Robin spreads to the new system. Upon spawning, the worm launches a malignant program that executes a script called cmd.exe on all infected drives in order to spread the infection.

Legit Windows Tools were Abused

To reach its C2 servers, it uses Microsoft Standard Installer (msiexec.exe). They are presumably hosted on compromised QNAP devices, which use TOR exit nodes for C2 communication.

Despite this, it is not clear yet how the malware establishes persistence or what methods it uses, but it is suspected that a DLL file is installed on compromised machines to resist removal.

Using two other legitimate Windows utilities, Raspberry Robin launches this DLL, and here they are:-

  • fodhelper: A trusted binary for managing features in Windows settings.
  • odbcconf: A tool for configuring ODBC drivers.

Below we have attempted to provide a comprehensive analysis of known raspberry robin behavior, which is accompanied by a checklist of potential detection opportunities.

Even though Red Canary analysts examined closely what the newly discovered malware does on infected systems, but, there are several questions still remaining.

The Raspberry Robin operators’ goal remains an unanswered question since there is no information about end-stage malicious tasks.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...