Monday, January 27, 2025
HomeCyber AttackBeware!! LNK Worm - A Raspberry Robin Malware Attacking Windows Devices

Beware!! LNK Worm – A Raspberry Robin Malware Attacking Windows Devices

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Cybereason Global Security Operations Center (SOC) Team, one of the world’s leading cybersecurity companies, have discovered a new Windows worm called Raspberry Robin. 

Through removable USB devices, the malware spreads from one computer to another. A malicious DLL file is downloaded from a QNAP-associated domain using Windows Installer.

An alternative C2 infrastructure is provided by TOR exit nodes used by the malware. This is also known as the LNK Worm, primarily since it is associated with the Raspberry Robin campaign.

An old but still effective way of enticing people to fall victim to this kind of attack is to use “LNK” shortcut files.

LNK Worm Infection Key Highlights

  • In order to infect its victims, Raspberry Robin uses specially crafted Microsoft links (LNK files) that are specifically crafted for this virus.
  • There was a delivery through a file archive, USB device, or ISO file that Cybereason observed.
  • As a persistent threat, Raspberry Robin has been identified. 
  • Upon infection, the malware creates a persistent backdoor and runs as soon as the computer is restarted, in order to maintain its control.
  • Most of the victims were found to be located in Europe, according to Cybereason.
  • Raspberry Robin activities are detected and prevented by the Cybereason Defense Platform.

Raspberry Robin Infection

As a summary of a Raspberry Robin infection, the GSOC team has outlined the following:-

  • There are two files that are the cause of the Raspberry Robin infection: A “LNK” file and a “BAT” file.
  • By leveraging the LOLBin called “msiexec.exe” from a compromised NAS device from QNAP, Raspberry Robin downloads and executes a malicious shared library (DLL).
  • Raspberry Robin does the following things to make it more difficult for people to detect it:
  • Injects malicious code into three legitimate processes in the Windows operating system
  • Tor Exit nodes (The Onion Router) are used by Raspberry Robin to communicate with the rest of the Raspberry Robin infrastructure 

According to the report, A registry key in Raspberry Robin’s code allows it to automatically load a malicious module by using the malware binary “rundll32.exe” in the Windows operating system. This allows Raspberry Robin to persist on the infected system.

Moreover, this module is quite weird because there is a break in the chain of certification. This makes the Windows system unable to verify the module’s signature despite the fact that it has been signed. 

In order to check for similar samples, you can use VirusTotal.com’s filter function to search for samples with the code signing name “OmniContact.”.

Recommendations

Here below we have mentioned all the recommendations offered by the security researchers at Cybereason:-

  • In order to prevent Raspberry Robin from communicating with TOR exit nodes outside of the organization, it is recommended to block outgoing connections (inside the organization) to TOR-related addresses.
  • It is imperative to re-image infected devices so they can no longer be infected by Raspberry Robin since it displays persistence mechanisms and creates a multitude of deceptive attacks on infected systems.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to...