{"id":49059,"date":"2022-10-27T16:00:00","date_gmt":"2022-10-27T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=124358"},"modified":"2022-10-27T16:00:00","modified_gmt":"2022-10-27T16:00:00","slug":"raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/","title":{"rendered":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity"},"content":{"rendered":"<p>Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread. These infections lead to follow-on hands-on-keyboard attacks and human-operated ransomware activity. Our continuous tracking of Raspberry Robin-related activity also shows a very active operation: Microsoft Defender for Endpoint data indicates that nearly 3,000 devices in almost 1,000 organizations have seen at least one Raspberry Robin payload-related alert in the last 30 days.<\/p>\n<p>Raspberry Robin has evolved from being a widely distributed worm with no observed post-infection actions when Red Canary first <a href=\"https:\/\/redcanary.com\/blog\/raspberry-robin\/\">reported<\/a> it in May 2022, to one of the largest malware distribution platforms currently active. In July 2022, Microsoft security researchers observed devices infected with Raspberry Robin being installed with the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/#DEV-0206-DEV-0243\">FakeUpdates<\/a> malware, which led to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/#DEV-0206-DEV-0243\">DEV-0243<\/a> activity. DEV-0243, a ransomware-associated activity group that overlaps with actions tracked as EvilCorp by other vendors, was first observed deploying the LockBit ransomware as a service (RaaS) payload in November 2021. Since then, Raspberry Robin has also started deploying IcedID, Bumblebee, and Truebot based on our investigations.<\/p>\n<p>In October 2022, Microsoft observed Raspberry Robin being used in post-compromise activity attributed to another actor, DEV-0950 (which overlaps with groups tracked publicly as FIN11\/TA505). From a Raspberry Robin infection, the DEV-0950 activity led to Cobalt Strike hands-on-keyboard compromises, sometimes with a Truebot infection observed in between the Raspberry Robin and Cobalt Strike stage. The activity culminated in deployments of the Clop ransomware. DEV-0950 traditionally uses phishing to acquire the majority of their victims, so this notable shift to using Raspberry Robin enables them to deliver payloads to existing infections and move their campaigns more quickly to ransomware stages.<\/p>\n<p>Given the interconnected nature of the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\">cybercriminal economy<\/a>, it\u2019s possible that the actors behind these Raspberry Robin-related malware campaigns\u2014usually distributed through other means like malicious ads or email\u2014are paying the Raspberry Robin operators for malware installs.<\/p>\n<p>Raspberry Robin attacks involve multi-stage intrusions, and its post-compromise activities require access to highly privileged credentials to cause widespread impact. Organizations can defend their networks from this threat by having security solutions like <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\">Microsoft Defender for Endpoint<\/a> and Microsoft Defender Antivirus, which is built into Windows, to help detect Raspberry Robin and its follow-on activities, and by applying best practices related to credential hygiene, network segmentation, and attack surface reduction.<\/p>\n<p>In this blog, we share our detailed analysis of these attacks and shed light on Raspberry Robin\u2019s origins, since its earliest identified activity in September 2021, and motivations which have been debated since it was first reported in May 2022. We also provide mitigation guidance and other recommendations defenders can use to limit this malware\u2019s spread and impact from follow-on hands-on-keyboard attacks.<\/p>\n<h2>A new worm hatches: Raspberry Robin\u2019s initial propagation via USB drives<\/h2>\n<p>In early May 2022, Red Canary reported&nbsp;that a new worm named Raspberry Robin was spreading to Windows systems through infected USB drives. The USB drive contains a Windows shortcut (LNK) file disguised as a folder. In earlier infections, this file used a generic file name like <em>recovery.lnk<\/em>, but in more recent ones, it uses brands of USB drives. It should be noted that USB-worming malware isn\u2019t new, and many organizations no longer track these as a top threat. &nbsp;<\/p>\n<p>For an attack relying on a USB drive to run malware upon insertion, the targeted system\u2019s <em>autorun.inf<\/em> must be edited or configured to specify which code to start when the drive is plugged in. Autorun of removable media is disabled on Windows by default. However, many organizations have widely enabled it through legacy Group Policy changes.<\/p>\n<p>There has been much public debate about whether the Raspberry Robin drives use autoruns to launch or if it relies purely on social engineering to encourage users to click the LNK file. Microsoft Threat Intelligence Center (MSTIC) and Microsoft Detection and Response Team (DART) research has confirmed that both instances exist in observed attacks. Some Raspberry Robin drives only have the LNK and executable files, while drives from earlier infections have a configured <em>autorun.inf<\/em>. This change could be linked to why the names of the shortcut files changed from more generic names to brand names of USB drives, possibly encouraging a user to execute the LNK file.<\/p>\n<p>Upon insertion of the infected drive or launching of the LNK file, the UserAssist registry key in Windows\u2014where Windows Explorer maintains a list of launched programs\u2014is updated with a new value indicating a program was launched by Windows.&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"219\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain.png\" alt=\"This diagram shows the linear progression of earlier Raspberry Robin infections.\" class=\"wp-image-124372\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain.png 800w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain-300x82.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain-768x210.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption>Figure 1. Attack chain of the original Raspberry Robin infections<\/figcaption><\/figure>\n<p>The UserAssist key stores the names of launched programs in ROT13-ciphered format, which means that every letter in the name of the program is replaced with the 13<sup>th<\/sup> letter in the alphabet after it. This routine makes the entries in this registry key not immediately readable. The UserAssist key is a useful forensic artifact to demonstrate which applications were launched on Windows, as outlined in Red Canary\u2019s blog.<\/p>\n<p>Windows shortcut files are mostly used to create an easy-to-find shortcut to launch a program, such as pinning a link to a user\u2019s browser on the taskbar. However, the format allows the launching of any code, and attackers often use LNK files to launch malicious scripts or run stored code remotely. Raspberry Robin\u2019s LNK file points to <em>cmd.exe<\/em> to launch the Windows Installer service <em>msiexec.exe<\/em> and install a malicious payload hosted on compromised QNAP network attached storage (NAS) devices.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"798\" height=\"132\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-2-raspberryrobin-url-samples.png\" alt=\"Screenshot of command lines where Raspberry Robin uses the Windows installer service to connect to an external domain.\" class=\"wp-image-124373\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-2-raspberryrobin-url-samples.png 798w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-2-raspberryrobin-url-samples-300x50.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-2-raspberryrobin-url-samples-768x127.png 768w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\"><figcaption>Figure 2. Examples of URLs connecting to an external domain<\/figcaption><\/figure>\n<p>Once the Raspberry Robin payload is running, it spawns additional processes by using system binaries such as <em>rundll32.exe<\/em>, <em>odbcconf.exe<\/em>, and <em>control.exe<\/em> to use as living-off-the-land binaries (LOLBins) to run malicious code. Raspberry Robin also launches code via <em>fodhelper.exe<\/em>, a system binary for managing optional features, as a user access control (UAC) bypass.<\/p>\n<p>The malware injects into system processes including <em>regsvr32.exe<\/em>, <em>rundll32.exe<\/em>, and <em>dllhost.exe <\/em>and connects to various command-and-control (C2) servers hosted on Tor nodes.<\/p>\n<p>In most instances, Raspberry Robin persists by adding itself to the <a href=\"https:\/\/learn.microsoft.com\/windows\/win32\/setupapi\/run-and-runonce-registry-keys\">RunOnce<\/a> key of the registry hive associated with the user who executed the initial malware install. The registry key points to the Raspberry Robin binary, which has a random name and a random extension such as <em>.mh <\/em>or .<em>vdm <\/em>in the user\u2019s <em>AppData<\/em> folder or to <em>ProgramData<\/em>. The key uses the intended purpose of <em>regsvr32.exe<\/em> to launch the portable executable (PE) file, allowing the randomized non-standard file extension to launch the executable content.&nbsp;<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"68\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-3f-raspberryrobin-runonce-1024x68.png\" alt=\"Screenshot of the contents of the RunOnce registry key where the value points to the randomly-named Raspberry Robin file.\" class=\"wp-image-124399\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-3f-raspberryrobin-runonce-1024x68.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-3f-raspberryrobin-runonce-300x20.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-3f-raspberryrobin-runonce-768x51.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-3f-raspberryrobin-runonce.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Figure 3. Example of the contents of the <em>RunOnce <\/em>key<\/figcaption><\/figure>\n<p>Entries in the RunOnce key delete the registry entry prior to launching the executable content at sign-in. Raspberry Robin re-adds this key once it is successfully running to ensure persistence. After the initial infection, this leads to <em>RunOnce.exe<\/em> launching the malware payload in timelines. Raspberry Robin also temporarily renames the RunOnce key when writing to it to evade detections.<\/p>\n<h2>Raspberry Robin\u2019s connection to a larger malware ecosystem<\/h2>\n<p>Since our initial analysis, Microsoft security researchers have discovered links between Raspberry Robin and other malware families. The Raspberry Robin implant has also started to distribute other malware families, which is not uncommon in the cybercriminal economy, where attackers purchase \u201cloads\u201d or installs from operators of successful and widespread malware to facilitate their goals.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"960\" height=\"507\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-4-infection-chain-1.png\" alt=\"This diagram shows Raspberry Robin worm's connections to various malware campaigns and threat operators. It also shows different infection methods seen in Raspberry Robin-related activity.\" class=\"wp-image-124371\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-4-infection-chain-1.png 960w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-4-infection-chain-1-300x158.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-4-infection-chain-1-768x406.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\"><figcaption>Figure 4. Raspberry Robin\u2019s connectivity to a larger cybercriminal ecosystem<\/figcaption><\/figure>\n<h3>Introducing Fauppod: Like FakeUpdates but without the fake updates<\/h3>\n<p>On July 26, 2022, Microsoft witnessed the first reported instance of a Raspberry Robin-infected host deploying a FakeUpdates (also known as SocGholish) JavaScript backdoor. Previously, FakeUpdates were delivered primarily through drive-by downloads or malicious ads masquerading as browser updates. Microsoft tracks the activity group behind FakeUpdates as DEV-0206 and the USB-based Raspberry Robin infection operators as DEV-0856.<\/p>\n<p>After discovering Raspberry Robin-deployed FakeUpdates, Microsoft security researchers continued monitoring for other previously unidentified methodologies in FakeUpdates deployments. Research into the various malware families dropped by Raspberry Robin\u2019s USB-delivered infections continued, and new signatures were created to track the various outer layers of packed malware under the family name Fauppod.<\/p>\n<p>On July 27, 2022, Microsoft identified samples detected as Fauppod that have similar process trees with DLLs written by Raspberry Robin LNK infections in similar locations and using similar naming conventions. Their infection chains also dropped the FakeUpdates malware. However, the victim hosts where these samples were detected didn\u2019t have the traditional infection vector of an LNK file launched from an infected USB drive, as detailed in Red Canary\u2019s blog.<\/p>\n<p>In this instance, Fauppod was delivered via <em>codeload[.]github[.]com<\/em>, a fraudulent and malicious repository created by a cybercriminal actor that Microsoft tracks as DEV-0651. The payload was delivered as a ZIP archive file containing another ZIP file, which then had a massive (700MB) Control Panel (CPL) file inside. Attackers use nested containers such as ZIP, RAR, and ISO files to avoid having their malicious payloads stamped with Mark of the Web (MOTW), which Windows uses to mark files from the internet and thus enable security solutions to block certain actions. Control Panel files are similar to other PEs like EXE and DLL files.<\/p>\n<p>Microsoft has since seen DEV-0651 deliver Fauppod samples by taking advantage of various public-facing trusted and legitimate cloud services beyond GitHub, including Azure, Discord, and SpiderOak. Refer to the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/27\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#iocs\">indicators of compromise (IOCs)<\/a> below for more details. Microsoft has shared information about this threat activity and service abuse with these hosting providers.<\/p>\n<h3>Connecting the dot(net malware)<\/h3>\n<p>With the discovery of the DEV-0651 link, Microsoft had two pieces of evidence suggesting a relationship between Fauppod and Raspberry Robin:<\/p>\n<ul>\n<li>Both malware families were delivering FakeUpdates<\/li>\n<li>Signatures created to detect Raspberry Robin DLL samples on hosts infected by the publicly known LNK file spreading mechanism were detecting malware that wasn\u2019t being delivered through any previously known Raspberry Robin connections<\/li>\n<\/ul>\n<p>Following DEV-0651\u2019s previous leveraging of cloud hosting services, the earliest iteration of a DEV-0651-related campaign that Microsoft was able to identify occurred in September 2021, which was around the same time Red Canary stated Raspberry Robin began to propagate.<\/p>\n<p>Based on these facts, Microsoft reached low-confidence assessment that the Fauppod malware samples were related to the later delivery of what was publicly known as Raspberry Robin and started investigating these links to raise confidence and discover more information.<\/p>\n<p>While authoring both file-based and behavior-based detections for Fauppod samples, Microsoft utilized existing detections based on the use of OBDCCONF as a LOLBin to launch <em>regsvr32<\/em> (which was also detailed in Red Canary\u2019s blog as a Raspberry Robin tactic, technique, and procedure (TTP)):<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"109\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-5f-odbcconf-1024x109.png\" alt=\"Screenshot of commands using ODBCCONF as a proxy for regsvr execution\" class=\"wp-image-124400\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-5f-odbcconf-1024x109.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-5f-odbcconf-300x32.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-5f-odbcconf-768x82.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-5f-odbcconf.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Figure 5. ODBCCONF being used as a proxy for regsvr execution, similar to <a href=\"https:\/\/redcanary.com\/blog\/raspberry-robin\/\">Red Canary\u2019s blog<\/a> on Raspberry Robin<\/figcaption><\/figure>\n<p>Microsoft noted a unique quality in the command execution that was persistent through all Raspberry Robin infections stemming from an infected USB drive: there was a trailing \u201c.\u201d character at the end of the DLL name within the command above.<\/p>\n<p>While reviewing DEV-0651 Fauppod-delivered malware, Microsoft identified a Fauppod CPL sample served via GitHub when the following command is run:<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"89\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-6f-fauppod-command-line-1024x89.png\" alt=\"Screenshot of commands generated by DEV-0651's Fauppod CPL\" class=\"wp-image-124401\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-6f-fauppod-command-line-1024x89.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-6f-fauppod-command-line-300x26.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-6f-fauppod-command-line-768x67.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-6f-fauppod-command-line.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Figure 6. DEV-0651 Fauppod CPL generated command line<\/figcaption><\/figure>\n<p>Notable in the above Fauppod command are the following:<\/p>\n<ul>\n<li>The use of <em>msiexec.exe<\/em> to launch the Windows binary <em>shell32.dll<\/em> as a LOLBin, instead of launching the malware PE directly via <em>rundll32.exe<\/em>, using <em>rundll32.exe<\/em> to launch <em>shell32.dll<\/em>, and passing <em>ShellExec_RunDLL<\/em> to load the commands\u2014a TTP consistent with Raspberry Robin.<\/li>\n<li>Fauppod CPL file\u2019s use of a staging directory to copy a payload to disk using randomly generated directories in <em>ProgramData<\/em> that then contain malicious PE files with randomly generated names and extensions. This naming pattern overlaps with those leveraged by publicly known Raspberry Robin DLLs.<\/li>\n<li>The same trailing \u201c.\u201d in the DLL name as seen in the ODBCCONF proxying detailed in Red Canary\u2019s blog. <a href=\"https:\/\/decoded.avast.io\/janvojtesek\/raspberry-robins-roshtyak-a-little-lesson-in-trickery\/\">Avast also later noted<\/a> this trailing in the DLL implant dropped by Raspberry Robin, which they refer to as Roshtyak.<\/li>\n<\/ul>\n<p>These findings raised Microsoft\u2019s confidence in assessing whether there is a connection between Fauppod\u2019s CPL files and Raspberry Robin extending beyond a similarity in outer layers and packing of the malware.<\/p>\n<p>Microsoft security researchers also identified a payload within a Fauppod sample communicating with a compromised QNAP storage server to send information about the infected device, overlapping with Raspberry Robin\u2019s use of compromised QNAP appliances for C2.<\/p>\n<p>While continuing to monitor the prevalence and infection sources of Fauppod, Microsoft identified a heavily obfuscated .NET malware (SHA-256: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/a9d5ec72fad42a197cbadcb1edc6811e3a8dd8c674df473fd8fa952ba0a23c15\">a9d5ec72fad42a197cbadcb1edc6811e3a8dd8c674df473fd8fa952ba0a23c15<\/a>) arriving on hosts that had previously been infected with either Raspberry Robin LNK infected hosts or Fauppod CPL malware.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"68\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-7f-net-spreader-dll-1024x68.png\" alt=\" This screenshot shows the .NET DLL execution where the folder names are generated from combining two words from the dictionary.\" class=\"wp-image-124402\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-7f-net-spreader-dll-1024x68.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-7f-net-spreader-dll-300x20.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-7f-net-spreader-dll-768x51.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-7f-net-spreader-dll.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption>Figure 7. .NET spreader DLL execution, via <em>rundll32<\/em>, with an export of <em>voicednws_St1_4<\/em>; the randomly generated directory structure of using two dictionary words is consistent across a significant number of infected hosts<\/figcaption><\/figure>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"959\" height=\"582\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-8-raspberryrobin-dnspy.png\" alt=\"This screenshot of the DNSpy app user interface shows the obfuscation of the .NET DLL file believed to be creating Raspberry Robin LNK files in USB drives.\" class=\"wp-image-124376\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-8-raspberryrobin-dnspy.png 959w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-8-raspberryrobin-dnspy-300x182.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-8-raspberryrobin-dnspy-768x466.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-8-raspberryrobin-dnspy-440x268.png 440w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\"><figcaption>Figure 8. DNSpy screenshot of a highly obfuscated .NET DLL assessed to be responsible for creating Raspberry Robin LNK files on external USB drives<\/figcaption><\/figure>\n<p>While inspecting these samples, Microsoft noted that many were responsible for creating LNK files on external USB drives.<\/p>\n<p>Based on our investigation, Microsoft currently assesses with medium confidence that the above .NET DLLs delivered both by Raspberry Robin LNK infections and Fauppod CPL samples are responsible for spreading Raspberry Robin LNK files to USB drives. These LNK files, in turn, infect other hosts via the infection chain detailed in Red Canary\u2019s blog.<\/p>\n<p>Microsoft also assesses with medium confidence that the Fauppod-packed CPL samples are currently the earliest known point in the attack chain for propagating Raspberry Robin infections to targets. Microsoft findings suggest that the Fauppod CPL entities, the obfuscated .NET LNK spreader modules they drop, the Raspberry Robin LNK files Red Canary documented, and the Raspberry Robin DLL files (or, Roshtyak, as per Avast) could all be considered as various components to the \u201cRaspberry Robin\u201d malware infection chain.<\/p>\n<h3>The Fauppod-Dridex connection<\/h3>\n<p>In July 2022, Microsoft found Raspberry Robin infections that led to hands-on-keyboard activity by DEV-0243. One of the earliest malware campaigns to bring notoriety to DEV-0243 was the Dridex banking trojan.<\/p>\n<p>Code similarity between malware families is often used to demonstrate a link between families to a tracked actor. In <a href=\"https:\/\/securityintelligence.com\/posts\/raspberry-robin-worm-dridex-malware\/\">IBM\u2019s blog post<\/a> published after we observed the Raspberry Robin and DEV-0243 connection, they highlighted several code similarities between the loader for the Raspberry Robin DLLs and the Dridex malware.<\/p>\n<p>Microsoft\u2019s analysis of Fauppod samples also identified some Dridex filename testing features, which are used to avoid running in certain environments. Fauppod has similar functionality to avoid execution if it recognizes it\u2019s running as <em>testapp.exe<\/em> or <em>self.exe.<\/em> This code similarity has historically caused some Fauppod samples to trip Dridex detection alerts.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"880\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-9-raspberryrobin-selfexe-880x1024.png\" alt=\"Screenshot of Fauppod code that shows commands related to its anti-investigation techniques.\" class=\"wp-image-124377\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-9-raspberryrobin-selfexe-880x1024.png 880w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-9-raspberryrobin-selfexe-258x300.png 258w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-9-raspberryrobin-selfexe-768x894.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-9-raspberryrobin-selfexe.png 960w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\"><figcaption>Figure 9. Screenshot highlighting <em>\u201cself.exe\u201d <\/em>and <em>\u201ctestapp.exe\u201d <\/em>evasions in Fauppod using <em>GetModuleHandleA <\/em>and <em>LoadLibraryW <\/em>API calls, similar to previous Dridex samples<\/figcaption><\/figure>\n<p>Given the previously documented relationship between Raspberry Robin and DEV-0206\/DEV-0243 (EvilCorp), this behavioral similarity in the initial vector for Raspberry Robin infections adds another piece of evidence to the connection between the development and propagation of Fauppod\/Raspberry Robin and DEV-0206\/DEV-0243.<\/p>\n<h2>Raspberry Robin\u2019s future as part of the cybercriminal gig economy<\/h2>\n<p>Cybercriminal malware is an ever-present threat for most organizations today, taking advantage of common weaknesses in security strategies and using social engineering to trick users. Almost every organization risks encountering these threats, including Fauppod\/Raspberry Robin and FakeUpdates. Developing a robust protection and detection strategy and investing in credential hygiene, least privileges, and network segmentation are keys to preventing the impact of these complex and highly connected cybercriminal threats.<\/p>\n<p>Raspberry Robin\u2019s infection chain is a confusing and complicated map of multiple infection points that can lead to many different outcomes, even in scenarios where two hosts are infected simultaneously. There are numerous components involved; differentiating them could be challenging as the attackers behind the threat have gone to extreme lengths to protect the malware at each stage with complex loading mechanisms. These attackers also hand off to other actors for some of the more impactful attack stages, such as ransomware deployment.<\/p>\n<p>As of this writing, Microsoft is aware of at least four confirmed Raspberry Robin entry vectors. These entry points were linked to hands-on-keyboard actions by attackers, and they all led to intrusions where the end goal was likely deployment of ransomware.<\/p>\n<p>Infections from Fauppod CPL files and the Raspberry Robin worm component have facilitated human-operated intrusions indicative of pre-ransomware activity. Based on the multiple infection stages and varied payloads, Microsoft assesses that DEV-0651\u2019s initial access vector, the various spreading techniques of the malicious components, and high infection numbers have provided an attractive distribution option for follow-on payloads.<\/p>\n<p>Beginning on September 19, 2022, Microsoft identified Raspberry Robin worm infections deploying IcedID and\u2014later at other victims\u2014Bumblebee and TrueBot payloads. In October 2022, Microsoft researchers observed Raspberry Robin infections followed by Cobalt Strike activity from DEV-0950. This activity, which in some cases included a Truebot infection, eventually deployed the Clop ransomware.<\/p>\n<h2>Defending against Raspberry Robin infections<\/h2>\n<p>Worms can be noisy and could lead to alert fatigue in security operations centers (SOCs). Such fatigue could lead to improper or untimely remediation, providing the worm operator ample opportunity <a href=\"https:\/\/aka.ms\/ransomware-as-a-service\">to sell access to the affected network to other cybercriminals<\/a>.<\/p>\n<p>While Raspberry Robin seemed to have no purpose when it was first discovered, it has evolved and is heading towards providing a potentially devastating impact on environments where it\u2019s still installed. Raspberry Robin will likely continue to develop and lead to more malware distribution and cybercriminal activity group relationships as its install footprint grows.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\">Microsoft Defender for Endpoint<\/a> and Microsoft Defender Antivirus detect Raspberry Robin and follow-on activities described in this blog. Defenders can also apply the following mitigations to reduce the impact of this threat:<\/p>\n<ul>\n<li>Prevent drives from using autorun and execution code on insertion or mount. This can be done via <a href=\"https:\/\/learn.microsoft.com\/windows\/win32\/shell\/autoplay-reg#using-the-registry-to-disable-autorun\">registry settings<\/a> or <a href=\"https:\/\/www.stigviewer.com\/stig\/windows_server_2016\/2019-07-09\/finding\/V-73547\">Group Policy<\/a>.<\/li>\n<li>Follow the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/#defending-against-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">defending against ransomware<\/a> guidance in Microsoft\u2019s RaaS blog post<\/li>\n<li>Enable <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/prevent-changes-to-security-settings-with-tamper-protection\">tamper protection<\/a> to prevent attacks from stopping or interfering with Microsoft Defender Antivirus.<\/li>\n<li>Turn on <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/configure-block-at-first-sight-microsoft-defender-antivirus\">cloud-delivered protection<\/a> in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a huge majority of new and unknown variants.<\/li>\n<\/ul>\n<p>Microsoft customers can turn on <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction\">attack surface reduction rules<\/a> to prevent several of the infection vectors of this threat. Attack surface reduction rules, which any security administrator can configure, offer significant hardening against the worm. In observed attacks, Microsoft customers who had the following rules enabled were able to mitigate the attack in the initial stages and prevent hands-on-keyboard activity:<\/p>\n<p>Defenders can also refer to detection details and indicators or compromise in the following sections for more information about surfacing this threat.<\/p>\n<h2>Detection details<\/h2>\n<h3>Microsoft Defender Antivirus<\/h3>\n<p>Microsoft Defender Antivirus detects threat components as the following malware:<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender-endpoint\/configure-advanced-scan-types-microsoft-defender-antivirus\">Configure Defender Antivirus scans<\/a> to include removable drives. The following command lets admins scan removable drives, such as flash drives, during a full scan using the <a href=\"https:\/\/learn.microsoft.com\/powershell\/module\/defender\/set-mppreference?view=windowsserver2022-ps\">Set-MpPreference cmdlet<\/a>:<\/p>\n<pre class=\"wp-block-preformatted\">Set-MpPreference&nbsp;-DisableRemovableDriveScanning<\/pre>\n<p>If you specify a value of <em>$False<\/em> or do not specify a value, Defender Antivirus scans removable drives during any type of scan. If you specify a value of <em>$True<\/em>, Defender Antivirus doesn\u2019t scan removable drives during a full scan. Defender Antivirus can still scan removable drives during quick scans or custom scans.<\/p>\n<p>Defender Antivirus also detects identified post-compromise payloads as the following malware:<\/p>\n<h3>Microsoft Defender for Endpoint<\/h3>\n<p>Alerts with the following titles in the security center can indicate threat activity on your network:<\/p>\n<ul>\n<li>Potential Raspberry Robin worm command<\/li>\n<li>Possible Raspberry Robin worm activity<\/li>\n<\/ul>\n<p>Microsoft also clusters indicators related to the presence of the Raspberry Robin worm under DEV-0856. The following alert can indicate threat activity on your network:<\/p>\n<ul>\n<li>DEV-0856 activity group<\/li>\n<\/ul>\n<p>The following alerts might also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and therefore are not monitored in the status cards provided with this report.<\/p>\n<ul>\n<li>Suspicious process launched using cmd.exe<\/li>\n<li>Suspicious behavior by msiexec.exe<\/li>\n<li>Observed BumbleBee malware activity<\/li>\n<li>Malware activity resembling Bumblebee loader detected<\/li>\n<li>BumbleBeeLoader malware was prevented<\/li>\n<li>Ransomware-linked emerging threat activity group detected<\/li>\n<li>Ongoing hands-on-keyboard attacker activity detected (Cobalt Strike)<\/li>\n<li>SocGholish command-and-control<\/li>\n<li>Suspicious \u2018Socgolsh\u2019 behavior was blocked<\/li>\n<li>DEV-0651 threat group activity associated with FakeUpdates JavaScript backdoor<\/li>\n<\/ul>\n<h2 id=\"iocs\">Indicators of compromise (IOCs)<\/h2>\n<p>NOTE: These indicators should not be considered exhaustive for this observed activity.<\/p>\n<p><strong>Fauppod samples delivered by DEV-0651 via legitimate cloud services<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Sample (SHA-256)<\/strong><\/td>\n<td><strong>Related URL<\/strong><\/td>\n<td><strong>Related ad server<\/strong><\/td>\n<\/tr>\n<tr>\n<td>d1224c08da923517d65c164932ef8d931633e5376f74bf0655b72d559cc32fd2 &nbsp;<\/td>\n<td>hxxps:\/\/codeload[.]github[.]com\/downloader2607\/download64_12\/zip\/refs\/heads\/main<\/td>\n<td>ads[.]softupdt[.]com &nbsp;<\/td>\n<\/tr>\n<tr>\n<td>0b214297e87360b3b7f6d687bdd7802992bc0e89b170d53bf403e536e07e396e &nbsp;<\/td>\n<td>hxxps:\/\/spideroak[.]com\/storage\/OVPXG4DJMRSXE33BNNPWC5LUN5PTSMRTGAZTG\/shared\/5392194-1-1040\/Setup_64_1.zip?b6755c86e52ceecf8d806bf814690691<\/td>\n<td>146[.]70[.]93[.]10<\/td>\n<\/tr>\n<tr>\n<td>f18a54ba72df1a17daf21b519ffeee8463cfc81c194a8759a698709f1c9a3e87 &nbsp;<\/td>\n<td>hxxps:\/\/dsfdsfgb[.]azureedge[.]net\/332_332\/universupdatepluginx84.zip<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>0c435aadaa3c42a71ad8ff80781def4c8ce085f960d75f15b6fee8df78b2ac38 &nbsp;<\/td>\n<td>hxxps:\/\/cdn[.]discordapp[.]com\/attachments\/1004390520904220838\/1008127492449648762\/Setup_64_11.zip<\/td>\n<td>Unknown<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>Timeline of Raspberry Robin deployments of various payloads<\/strong><\/p>\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Sample (SHA-256)<\/strong><\/td>\n<td><strong>Malware<\/strong><\/td>\n<td><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td>9\/19\/22<\/td>\n<td>1789ba9965adc0c51752e81016aec5749<br \/>377ec86ec9a30449b52b1a5857424bf&nbsp; &nbsp;<\/td>\n<td>IcedID<\/td>\n<td>Configuration details: { &nbsp; \u201cCampaign ID\u201d: 2094382323, &nbsp; \u201cC2 url\u201d: \u201caviadronazhed[.]com\u201d }<\/td>\n<\/tr>\n<tr>\n<td>9\/28\/22<\/td>\n<td>5c15151a29fab8a2d58fa55aa6c88a58a45<br \/>6b0a6bc959b843e9ceb2295c61885 09247f88d47b69e8d50f0fe4c10c7f0ecc95<br \/>c979a38c2f7dfee4aec3679b5807 f0115a8c173d30369acc86cb8c68d870c8c<br \/>f8a2b0b74d72f9dbba30d80f05614<\/td>\n<td>Bumblebee<\/td>\n<td>Bumblebee called out to a Cobalt Strike Beacon server (guteyutur[.]com) shortly after execution<\/td>\n<\/tr>\n<tr>\n<td>9\/30\/22<\/td>\n<td>7e39dcd15307e7de862b9b42bf556f2836b<br \/>f7916faab0604a052c82c19e306ca<\/td>\n<td>TrueBot<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/27\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has discovered recent activity indicating that the Raspberry Robin worm is part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread.<br \/>\nThe post Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49060,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,7221,91],"class_list":["post-49059","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-microsoft-security-intelligence","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-27T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity\",\"datePublished\":\"2022-10-27T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\"},\"wordCount\":3673,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png\",\"keywords\":[\"Cybersecurity\",\"Microsoft security intelligence\",\"ransomware\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\",\"name\":\"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png\",\"datePublished\":\"2022-10-27T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png\",\"width\":800,\"height\":219},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/","og_locale":"en_US","og_type":"article","og_title":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-27T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/10\/fig-1-raspberryrobin-original-chain.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity","datePublished":"2022-10-27T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/"},"wordCount":3673,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png","keywords":["Cybersecurity","Microsoft security intelligence","ransomware"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/","url":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/","name":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png","datePublished":"2022-10-27T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity.png","width":800,"height":219},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/raspberry-robin-worm-part-of-larger-ecosystem-facilitating-pre-ransomware-activity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49059"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49059\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49060"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}