Site icon TheCyberThrone

Raspberry Robin found attacking QNAP devices

Advertisements

Raspberry Robin found using malicious code of Windows Installer to reach out to QNAP-associated domains and download a malicious DLL. The malware uses TOR exit nodes as a backup C2 infrastructure.

As reported by Microsoft this worm has infected customers from tech and manufacturing sectors. Based on this, researchers from Cybereason have reported multiple infections in Europe, the experts investigated a series of recent infections also associated with the name “LNK Worm.”

Advertisements

The attacks monitored by the researchers are leveraging compromised QNAP NAS devices as C2.

Below is the infection chain associated with the ongoing Raspberry Robin campaign observed by security researchers as follows.

The malware maintains persistence on the compromised machine through the Windows Registry, it loads the “rundll32.exe” at the startup.

Advertisements

Recommendations:

Exit mobile version