Security

Research

This Windows worm evolved into slinging ransomware. Here's how to detect it

Raspberry Robin hits 1,000 orgs in just one month


Raspberry Robin, a worm that spreads through Windows systems via USB drives, has rapidly evolved: now backdoor access is being sold or offered to infected machines so that ransomware, among other code, can be installed by cybercriminals.

In a report on Thursday, Microsoft's Security Threat Intelligence unit said Raspberry Robin is now "part of a complex and interconnected malware ecosystem" with links to other families of malicious code and ties to ransomware infections.

Ultimately, Raspberry Robin first appeared to be a strange worm that spread from PC to PC with no obvious aim. Now whoever is controlling the malware is seemingly using it to offer access to infected machines so that other software nasties can be deployed, such as ransomware, by other miscreants.

"Raspberry Robin's infection chain is a confusing and complicated map of multiple infection points that can lead to many different outcomes, even in scenarios where two hosts are infected simultaneously," the Microsoft researchers wrote.

"There are numerous components involved; differentiating them could be challenging as the attackers behind the threat have gone to extreme lengths to protect the malware at each stage with complex loading mechanisms."

According to data collected by Microsoft's Defender for Endpoint tool, almost 3,000 devices in about 1,000 organizations have experienced at least one alert about a malicious payload related to Raspberry Robin in the past 30 days.

"Raspberry Robin has evolved from being a widely distributed worm with no observed post-infection actions when Red Canary first reported it in May 2022, to one of the largest malware distribution platforms currently active," they wrote.

Red Canary researchers first observed Raspberry Robin activities in September 2021. The malware was a worm typically installed via a removable USB device and used compromised QNAP storage servers for its backend command-and-control (C2) servers.

A Raspberry Robin infected USB stick contains .lnk file that looks like a legitimate folder. The drive may be set up to auto-run that file – which organizations can block – or the user is tricked into double-clicking on the link file. That .lnk file then runs commands to fetch and execute from a C2 server the main malware code on the victim's PC.

See the above Microsoft post for technical details on how to detect a Raspberry Robin intrusion. A PC is infected after inserting the USB drive and/or running the .lnk file. Some infections occurred without a link file and USB drive, though, indicating there is more than one way to catch Raspberry Robin.

It's only getting worse

Microsoft, IBM, and Cisco have been tracking Raspberry Robin and its evolution. Two months after Red Canary's report, Microsoft detected Raspberry Robin – which the IT giant is tracking as DEV-0856 – installing on compromised computers the FakeUpdates (also known as SocGolish) backdoor malware, which is also used by Evil Corp – a Russian cybercrime group tracked by Microsoft as DEV-0243 that spreads the Dridex banking trojan.

Raspberry Robin also has been used to deploy the IdedID (or BokBot banking trojan), malware loader Bumblebee, and the Truebot trojan. Scumbags also have ordered it to run LockBit ransomware and now Clop ransomware on hijacked machines, according to the Microsoft analysts.

It gets worse. This month, Microsoft saw Raspberry Robin being used by a crew tracked as DEV-0950, which overlaps with gangs tagged as FIN11 and TA505. After Raspberry Robin infects a PC, DEV-0950 uses it to run Cobalt Strike – and occasionally Truebot – according to Microsoft. Eventually, Clop is executed on the victim's computer. Raspberry Robin has been a boon for these miscreants, according to the Microsoft researchers.

"DEV-0950 traditionally uses phishing to acquire the majority of their victims, so this notable shift to using Raspberry Robin enables them to deliver payloads to existing infections and move their campaigns more quickly to ransomware stages," they wrote.

"Given the interconnected nature of the cybercrime economy, it's possible that the actors behind these Raspberry Robin-related malware campaigns – usually distributed through other means like malicious ads or email – are paying the Raspberry Robin operators for malware installs."

In July Microsoft found that Fauppod – malware distributed by another group called DEV-0651 from Azure and Discord – has similar code to Raspberry Robin. It also has delivered FakeUpdates backdoors.

IBM's Security X-Force in September found other connections between Raspberry Robin and Dridex – including similarities in structure and functionality – between a Raspberry Robin DLL and a Dridex malware loader.

"Thus, IBM Security research draws another link between the Raspberry Robin infections and the Russia-based cybercriminal group 'Evil Corp,' which is the same group behind the Dridex Malware, suggesting that Evil Corp is likely using Raspberry Robin infrastructure to carry out its attacks," wrote Kevin Henson, a malware reverse engineer, and Emmy Ebanks, a cyberthreat responder, with IBM.

It's expected that the malware will continue to morph into an increasingly dangerous threat, according to Microsoft.

"While Raspberry Robin seemed to have no purpose when it was first discovered, it has evolved and is heading towards providing a potentially devastating impact on environments where it's still installed," the analysts wrote.

"Raspberry Robin will likely continue to develop and lead to more malware distribution and cybercriminal activity group relationships as its install footprint grows." ®

Send us news
12 Comments

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

IBM takes a crack at 'utility scale' quantum processing with Heron processor

Big Blue's roadmap prioritizes circuit size over qubit quantity

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

Google submits complaints about Microsoft licensing to UK competition regulator

Now Microsoft has regulator breathing down its neck in three regions

FTC wants Microsoft's relationship with OpenAI under the microscope

Hey Bing, how can I invest billions in a company but not break antitrust laws?

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

Microsoft's relationship with OpenAI now in competition regulator's sights

Has recent CEO, board shenanigans given rise to a merger situation? CMA is asking for a friend

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Experienced Copilot help is hard to find, warns Microsoft MVP

Almost nobody has used it, or knows it well, so beware of consultants bearing cred

Microsoft issues deadline for end of Windows 10 support – it's pay to play for security

Limited options will be available into 2028, for an undisclosed price

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good