FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ The Hacker News

Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files

By: Newsroom — April 10th 2024 at 13:10
Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that has been propagating the malware through malicious Windows Script Files (WSFs) since March 2024. "Historically, Raspberry Robin was known to spread through removable media like USB drives, but over time its distributors have experimented with other initial infection vectors," HP Wolf Security researcher Patrick
☐ ☆ ✇ The Hacker News

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

By: Newsroom — February 9th 2024 at 16:32
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that "Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period of time," Check Point said in a report this
☐ ☆ ✇ The Hacker News

New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat Actors

By: Ravie Lakshmanan — January 11th 2023 at 17:35
A new analysis of Raspberry Robin's attack infrastructure has revealed that it's possible for other threat actors to repurpose the infections for their own malicious activities, making it an even more potent threat. Raspberry Robin (aka QNAP worm), attributed to a threat actor dubbed DEV-0856, is a malware that has increasingly come under the radar for being used in attacks aimed at finance,
☐ ☆ ✇ The Hacker News

Raspberry Robin Worm Evolves to Attack Financial and Insurance Sectors in Europe

By: Ravie Lakshmanan — January 3rd 2023 at 10:13
Financial and insurance sectors in Europe have been targeted by the Raspberry Robin worm, as the malware continues to evolve its post-exploitation capabilities while remaining under the radar. "What is unique about the malware is that it is heavily obfuscated and highly complex to statically disassemble," Security Joes said in a new report published Monday. The intrusions, observed against
☐ ☆ ✇ The Hacker News

Raspberry Robin Worm Strikes Again, Targeting Telecom and Government Systems

By: Ravie Lakshmanan — December 21st 2022 at 12:23
The Raspberry Robin worm has been used in attacks against telecommunications and government office systems across Latin America, Australia, and Europe since at least September 2022. "The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools," Trend Micro researcher Christopher So 
☐ ☆ ✇ The Hacker News

Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in Philippines

By: Ravie Lakshmanan — November 30th 2022 at 06:21
A threat actor with a suspected China nexus has been linked to a set of espionage attacks in the Philippines that primarily relies on USB devices as an initial infection vector. Mandiant, which is part of Google Cloud, is tracking the cluster under its uncategorized moniker UNC4191. An analysis of the artifacts used in the intrusions indicates that the campaign dates as far back as September
☐ ☆ ✇ The Hacker News

Raspberry Robin Operators Selling Cybercriminals Access to Thousands of Endpoints

By: Ravie Lakshmanan — October 28th 2022 at 10:18
The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. It is "part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread," the Microsoft Security Threat Intelligence Center (MSTIC
☐ ☆ ✇ The Hacker News

New Evidence Links Raspberry Robin Malware to Dridex and Russian Evil Corp Hackers

By: Ravie Lakshmanan — September 2nd 2022 at 07:00
Researchers have identified functional similarities between a malicious component used in the Raspberry Robin infection chain and a Dridex malware loader, further strengthening the operators' connections to the Russia-based Evil Corp group. The findings suggest that "Evil Corp is likely using Raspberry Robin infrastructure to carry out its attacks," IBM Security X-Force researcher Kevin Henson 
❌