Tuesday, April 29, 2025
HomeCyber AttackBeware!! LNK Worm - A Raspberry Robin Malware Attacking Windows Devices

Beware!! LNK Worm – A Raspberry Robin Malware Attacking Windows Devices

Published on

SIEM as a Service

Follow Us on Google News

Researchers from Cybereason Global Security Operations Center (SOC) Team, one of the world’s leading cybersecurity companies, have discovered a new Windows worm called Raspberry Robin. 

Through removable USB devices, the malware spreads from one computer to another. A malicious DLL file is downloaded from a QNAP-associated domain using Windows Installer.

An alternative C2 infrastructure is provided by TOR exit nodes used by the malware. This is also known as the LNK Worm, primarily since it is associated with the Raspberry Robin campaign.

- Advertisement - Google News

An old but still effective way of enticing people to fall victim to this kind of attack is to use “LNK” shortcut files.

LNK Worm Infection Key Highlights

  • In order to infect its victims, Raspberry Robin uses specially crafted Microsoft links (LNK files) that are specifically crafted for this virus.
  • There was a delivery through a file archive, USB device, or ISO file that Cybereason observed.
  • As a persistent threat, Raspberry Robin has been identified. 
  • Upon infection, the malware creates a persistent backdoor and runs as soon as the computer is restarted, in order to maintain its control.
  • Most of the victims were found to be located in Europe, according to Cybereason.
  • Raspberry Robin activities are detected and prevented by the Cybereason Defense Platform.

Raspberry Robin Infection

As a summary of a Raspberry Robin infection, the GSOC team has outlined the following:-

  • There are two files that are the cause of the Raspberry Robin infection: A “LNK” file and a “BAT” file.
  • By leveraging the LOLBin called “msiexec.exe” from a compromised NAS device from QNAP, Raspberry Robin downloads and executes a malicious shared library (DLL).
  • Raspberry Robin does the following things to make it more difficult for people to detect it:
  • Injects malicious code into three legitimate processes in the Windows operating system
  • Tor Exit nodes (The Onion Router) are used by Raspberry Robin to communicate with the rest of the Raspberry Robin infrastructure 

According to the report, A registry key in Raspberry Robin’s code allows it to automatically load a malicious module by using the malware binary “rundll32.exe” in the Windows operating system. This allows Raspberry Robin to persist on the infected system.

Moreover, this module is quite weird because there is a break in the chain of certification. This makes the Windows system unable to verify the module’s signature despite the fact that it has been signed. 

In order to check for similar samples, you can use VirusTotal.com’s filter function to search for samples with the code signing name “OmniContact.”.

Recommendations

Here below we have mentioned all the recommendations offered by the security researchers at Cybereason:-

  • In order to prevent Raspberry Robin from communicating with TOR exit nodes outside of the organization, it is recommended to block outgoing connections (inside the organization) to TOR-related addresses.
  • It is imperative to re-image infected devices so they can no longer be infected by Raspberry Robin since it displays persistence mechanisms and creates a multitude of deceptive attacks on infected systems.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...