i-comit

USB drive, reimagined


Raspberry Robin Attack on Networking Systems- How lethal is it?


Recently, we have seen an increase in attacks on networking systems. While these tactics are not new, the fact that they are being used more frequently is something that security researchers cannot ignore. Raspberry Robin, also known as QNAP Worm, was first discovered by cybersecurity company Red Canary in September 2021.  At the time of…


Recently, we have seen an increase in attacks on networking systems. While these tactics are not new, the fact that they are being used more frequently is something that security researchers cannot ignore.

Raspberry Robin, also known as QNAP Worm, was first discovered by cybersecurity company Red Canary in September 2021. 

At the time of its discovery, it was notable for being a worm that could spread across open ports on any device connected to a local area network (LAN). This made it a formidable weapon for hackers to deploy against an organisation’s network infrastructure.

What is Raspberry Robin?

Raspberry Robin is a new worm-like malware that spreads offline via infected USB drives. The malware targets Windows domains and leverages Windows Installer to reach out to QNAP-associated domains and download a malicious DLL (dynamic link library). 

Once this DLL is downloaded, it attempts to inject code into the running process of lsass.exe. This process allows Raspberry Robin to gain control of the system and execute malicious commands.

How does Raspberry Robin work?

The Raspberry Robin worm is a type of malware that uses an infected Microsoft Windows shortcut file to infect the machine it is connected to. It then uses that system to spread itself, which it does in three different ways. First, it gives the user an infection. LNK file allows the device to be started with a command prompt. 

This prompt can come with two types of commands: one that can manage Windows features and another that can configure Open Database Connectivity. These two commands combined make the threat tricky to find on an infrastructure, allowing it to remain hidden.

In addition to these methods, MakeUseOf also describes how the worm uses compromised QNAP NAS devices; it downloads an infected. LNK file from a compromised QNAP device and uses a malicious DLL (Dynamic-Link Library) from this device to gain access to and control over one’s system.

Raspberry Robin Detection

When it comes to the threat, Raspberry Robin, Cisco Secure Network Analytics (CSA), and Cisco Secure Endpoint (CSE) are providing new ways of detecting the activity through real-time threat alerts. These alerts include details about the attacker’s IP address, the target, vector, and resources used for each attack.

CSA is a cloud-based solution that provides network visibility, control, and security. CSE is an agentless endpoint collector that monitors endpoints in your environment. Both solutions are based on a common architecture and complement each other to provide comprehensive visibility into your network traffic.

The Raspberry Robin attack is lethal. Why??

It is worth noting that Raspberry Robin has not been seen in the wild since the initial month of its discovery. Several speculations have been made regarding the worm’s disappearance from cyberspace, such as an inability to survive in the Internet environment or a security patch installed on vulnerable devices. However, there are no confirmed reports to verify these speculations.

The lack of post-exploitation activities has led some security experts to believe that Raspberry Robin can be highly lethal but is not activated for unknown reasons. This “raspberry” characteristic has given the worm its name.

Summing up 

As we can see, the Raspberry Robin Attack on Networking Systems is a lethal attack that can cause a considerable loss to the company that has been attacked. It is an advanced attack that requires excellent skills and knowledge about networking systems. The best way to prevent it is to install a robust firewall system and regularly update the router’s firmware.

Preventing cyber security attacks is very important in today’s world. The government should come up with strict laws to prevent people from carrying out such cyber crimes.

Leave a Reply


%d bloggers like this: