Cyber Security News

Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors

In a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with the Raspberry Robin malware.

This discovery sheds new light on the infrastructure used by this sophisticated threat actor group, which has evolved from a USB worm to a formidable initial access broker (IAB) for various cybercriminal entities, including Russian state-sponsored actors.

Collaboration Reveals Complex Network

Silent Push’s research, conducted in partnership with Team Cymru, has mapped out Raspberry Robin’s C2 infrastructure, revealing a singular IP address that connects the entire network of compromised devices.

This finding is crucial for understanding the group’s operations and potential vulnerabilities in their communication chain.

The threat actor group, also known as Roshtyak or Storm-0856, has been active since 2019 and has significantly transformed its tactics.

Initially spreading through infected USB drives in print and copy shops, Raspberry Robin now targets hardened corporate networks, selling access to other threat groups, including the Russian GRU’s Unit 29155.

Raspberry Robin attack flow

Evolving Attack Methodologies and Global Reach

Raspberry Robin’s attack methods have diversified over time.

Recent observations include the use of archive files distributed via Discord attachments, web downloads of Windows Script Files, and the exploitation of N-day vulnerabilities in QNAP and IoT devices.

This adaptability has allowed the group to maintain a global presence, with victims reported across various industries and countries.

The group’s infrastructure relies heavily on compromised QNAP and IoT devices, utilizing a network of lower-reputation two-letter top-level domains (TLDs) and multiple niche registrars.

Top-level domains (TLDs) for Raspberry Robin

This approach, combined with the use of Tor for communication, presents significant challenges for defenders and law enforcement agencies attempting to disrupt their operations.

Silent Push’s research highlights the importance of collaborative efforts in tracking and mitigating threats like Raspberry Robin.

As the group continues to evolve and provide services to various threat actors, including state-sponsored entities, the cybersecurity community must remain vigilant and share intelligence to combat this persistent threat effectively.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting…

16 hours ago

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial institutions…

16 hours ago

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats…

2 days ago

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages DNS…

2 days ago

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due…

2 days ago

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a…

2 days ago