Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Raspberry Robin Malware Attacks Against Telecom and Government Sectors

admin by admin
Dec 22, 2022
in News
A A
0

Trend Micro researchers noticed Raspberry Robin in recent attacks on telecommunications service providers and government networks. The Raspberry Robin malware is now dropping a fake payload to evade detection when it detects it’s being run within sandboxes and debugging tools.

Researchers say, due to the use of.lnk files, it appears to propagate across systems in a worm-like manner through an infected USB.

“We have noted the malware’s capability to hide via multiple layers for obfuscation, as well as its feature of delivering a fake payload once the routine detects sandboxing and analysis solutions”, Trend Micro.

The majority of the group’s victims are telecom companies or governments in Europe, Oceania (Australia), and Latin America.

EHA

figure-1-raspberry-robin-malware-targets-telecom-governments
Percentage of Raspberry Robin detections worldwide (TrendMicro)

Raspberry Robin Infection Routine

Raspberry Robin first appears as a shortcut or LNK file when the user plugs the infected USB into the computer. A command line in the LNK file launches a legitimate executable to download a Windows Installer (MSI) package.

figure-2-raspberry-robin-malware-targets-telecom-governments

Different techniques are used to obscure the code, featuring multiple layers containing hard-coded values for decrypting the next one.

Depending on how it is being used on a device, Raspberry Robin has started to drop two separate payloads. The loader distributes a fake payload if the malware recognizes that it is operating in a sandbox, signaling that it is probably being examined. Otherwise, the actual Raspberry Robin malware will be launched.

figure-6-raspberry-robin-malware-targets-telecom-governments
A visual representation of the Raspberry Robin’s packing (Trend Micro)

In this case, two additional layers are included in this false payload: a shellcode with an embedded PE file and a PE file without the MZ header or the PE signature.

Upon execution, it makes an effort to scan the Windows registry in search of infection indicators before starting to gather fundamental system data. The fake payload then makes an attempt to download and run an adware programme called “BrowserAssistant”.

“After dropping a copy of itself, it executes the dropped copy as Administrator using a UAC (User Account Control) bypass technique”, researchers

“It implements a variation of the technique ucmDccwCOMMethod in UACMe, thereby abusing the built-in Windows AutoElevate backdoor”.

Final Word

The malware employs a variety of anti-analysis tactics, but its core payload is layered heavily and demands investigation. As a result, a novice analyst will only discover the false payload, conclude the researchers.

Penetration Testing As a Service – Download Red Team & Blue Team Workspace

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.