Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Beware-Raspberry Robin That Delivered as a Windows Component

admin by admin
Feb 12, 2024
in News
A A
0

Raspberry Robin is a malicious worm that spreads through USB drives, and it’s been actively used by the threat actors to download and install hidden malware on Windows systems. 

Besides this, the threat actors exploit it for various reasons like initial access, data theft, espionage, and deploying other malware.

Cybersecurity researchers at Check Point recently discovered that threat actors actively use the stealthy Raspberry Robin that was delivered as a Windows component.

Document

Live Account Takeover Attack Simulation

Live attack simulation Webinar demonstrates various ways in which account takeover can happen and practices to protect your websites and APIs against ATO attacks

.


Stealthy Raspberry Robin

Raspberry Robin was discovered by Red Canary in 2021, and it stands out for its active distribution and evasion tactics. This worm is associated with crime groups like EvilCorp and TA505 and serves as an initial access broker for deploying additional malware. 

Despite ongoing attacks since October, Raspberry Robin continuously evolves, incorporating new features and tricks for increased complexity. 

Notably, it exploits vulnerabilities, including 0-days like CVE-2023-36802, that are sold on the Dark Web, making it challenging to analyze.

Raspberry Robin previously used LNKs and network shares to spread. Now, it hides in RAR files named File.Chapter-1.rar, downloaded from Discord. OleView.exe loads the malicious DLL. 

Attackers like OleView.exe for side-loading because it needs a DLL to run and often isn’t on the disk alone. However, certain security solutions trust Microsoft-signed DLLs.

Raspberry Robin attack flow (Source - Check Point)
Raspberry Robin attack flow (Source – Check Point)

Raspberry Robin escalates privileges through encrypted kernel LPE exploits by targeting specific Windows versions. New samples inject exploits into cleanmgr.exe using KernelCallbackTable injection. 

A unique loader in memory loads an external PE with the exploit, now targeting CVE-2023-36802, a Type Confusion vulnerability in Microsoft Streaming Service Proxy. 

This allows local attackers to escalate to SYSTEM privileges. The CVE disclosed on September 12 that it had been exploited in the wild before becoming a 0-day, with no information about the exploiting group.

The exploit targets Windows 10 up to build 22621 by adapting offsets based on the Windows version. EPROCESS addresses are obtained through NtQuerySystemInformation API and SYSTEM_HANDLE structures. 

It then creates a random pipe name with UuidCreate and UuidToStringW APIs. The flow diverges for Windows versions below or above 19044. 

Besides this, there’s no evidence of Raspberry Robin using it as a 0-day, only as a 1-day, prompting pre-disclosure analysis.

Before October, Raspberry Robin utilized the CVE-2023-29360 exploit in August, which was disclosed in June. The exploit’s prompt use showcases the writer’s efficiency.

However, some similarities exist with the CVE-2023-36802 exploit in loader and string obfuscation. Both vulnerabilities target mskssrv.sys, indicating ongoing driver exploration.

Raspberry Robin’s trend of faster exploit utilization aims to exploit infrequent Windows updates, which helps maximize vulnerability exposure.

Raspberry Robin actively evades the virtual machines using evolving evasions. This worm is expected to persist by incorporating new tricks, adding unique features, and leveraging a Dark Web-acquired 0-day exploit before public disclosure.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.