Raspberry Robin is a malware that has been around for some time now and spreads via infected USB drives.
Here is what we have seen over the last 10 months. 🧵 1/12 #RaspberryRobin #malware

via @lazy_daemon
@sekoia_io and @redcanary have already published excellent technical analyses of this malware, so we won't go into more detail about it.

7095517.fs1.hubspotusercontent-na1.net/hubfs/7095517/…

redcanary.com/blog/raspberry…

🧵 2/12
Since December, 2021, we've seen several cases mostly in Hungary🇭🇺 and Germany🇩🇪 but also a few in Russia🇷🇺 and India🇮🇳.
The user always clicked the malicious link, so no automatic infection when the USB drive was plugged in. 🧵 3/12
In many cases, we had a chance to talk to the affected user. Independently of each other, every user reported to have used the USB stick for printing in print/copy stores🖨️. 🧵 4/12
One user reported that the malicious shortcut was on the USB drive only after visiting the print store and not before.🤔 🧵5/12
In most of the observed cases, nothing much happened on the system after the infected USB drive was plugged in because the 2nd stage payload was no longer available under the malicious URL. 🧵 6/12
In very few cases, however, we have seen TOR communications, confirming what other researchers have also seen. However, there was no follow-up infection with another payload. 🧵 7/12
In one recent case, something interesting actually happened. Right after a successful Raspberry Robin infection, a malicious Javascript was executed which can be attributed to #SocGholish #FakeUpdates. 🧵 8/12
@MsftSecIntel 👋 also reported about it recently so we are happy to confirm. ☺️ 🧵9/12

microsoft.com/security/blog/…
The experienced reader will have noticed that there are still many unresolved questions❓.
If victims are really infected via print stores, how are the print stores initially infected?
How do they infect the QNAP/SOHO routers to roll out their 2nd stage payload? 🧵 10/12
What does the heavily obfuscated DLL they drop do in detail?
What is the final goal of those campaigns?
We will continue to track🧐this actor and hope that the future will bring answers to these questions. 🧵11/12
IOCs: github.com/telekom-securi…
🧵 12/12

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Deutsche Telekom CERT

Deutsche Telekom CERT Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @DTCERT

Aug 25
🚨CAUTION🚨 : Attackers send invoice themed emails impersonating german companies to deliver #NetSupport #RAT. 🐀 via @lazy_daemon 🧵1/5
Attached to the email is a HTML file which tries to download and execute malicious Javascript code. 🧵2/5
The malicious Javascript code is heavily obfuscated and executes Powershell Code to download and execute an additional Payload. 🧵3/5
Read 6 tweets
May 6
Here are some lessons learned from our past engagements; see it as an easy checklist on what not to do. #LessonsLearned
1) MFA (Multi-Factor-Authentication) being not fully implemented or non-existent at all
While some attackers steal MFA tokens, it is rare! 📱 #MFA
2) Bad user privilege management
Does HR really need a domain admin? 👑 #UserPrivilegeManagement
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(