Researchers from Cybereason Global Security Operations Center (SOC) Team, one of the world’s leading cybersecurity companies, have discovered a new Windows worm called Raspberry Robin.
Through removable USB devices, the malware spreads from one computer to another. A malicious DLL file is downloaded from a QNAP-associated domain using Windows Installer.
An alternative C2 infrastructure is provided by TOR exit nodes used by the malware. This is also known as the LNK Worm, primarily since it is associated with the Raspberry Robin campaign.
An old but still effective way of enticing people to fall victim to this kind of attack is to use “LNK” shortcut files.
As a summary of a Raspberry Robin infection, the GSOC team has outlined the following:-
According to the report, A registry key in Raspberry Robin’s code allows it to automatically load a malicious module by using the malware binary “rundll32.exe” in the Windows operating system. This allows Raspberry Robin to persist on the infected system.
Moreover, this module is quite weird because there is a break in the chain of certification. This makes the Windows system unable to verify the module’s signature despite the fact that it has been signed.
In order to check for similar samples, you can use VirusTotal.com’s filter function to search for samples with the code signing name “OmniContact.”.
Here below we have mentioned all the recommendations offered by the security researchers at Cybereason:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…
Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…
Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…
A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…
A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…
A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…