Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Research warning of “severe risks” when using AI therapy chatbots

UK launches a £500 million package to support diverse and underrated investors and founders

California creates a residential-focused agency | Planetizen News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers link ~200 unique C2 domains to the Raspberry Robin Access Broker
Identity

Researchers link ~200 unique C2 domains to the Raspberry Robin Access Broker

userBy userMarch 25, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 25, 2025Ravi LakshmananThreat Intelligence/Malware

A new investigation unearthed nearly 200 unique command and control (C2) domains related to malware called Raspberry Robin.

“Raspberry Robin (also known as Roshtyak or Storm-0856) is a complex and evolving threat actor providing early access broker (IAB) services to many criminal groups, many of whom have connections with Russia.”

Since its arrival in 2019, malware has become a conduit for a variety of malicious strains, including Socgholish, Dridex, Lockbit, Icedid, Bumblebee, and TrueBot. It is also known as a QNAP worm because it uses compromised QNAP devices to obtain the payload.

Cybersecurity

Over the years, the Raspberry Robin Attack chain has added a new distribution method to download it via archives sent as attachments using messaging services inconsistencies and Windows script files.

There is also some evidence to suggest that malware will be provided to other actors as a Pay-per Installation (PPI) botnet to provide the next stage of malware.

Additionally, Raspberry Robin Infections incorporates a USB-based propagation mechanism that involves using a compromised USB drive containing Windows Shortcuts (LNK) files disguised as folders to activate malware deployment.

Since then, the US government has revealed that the Russian nation-state threat actors were tracked for Cadet Blizzard’s use of raspberry robin as the first access facilitator.

In a recent analysis done with Team Cymru, Silent Push found one IP address used as a data relay to connect all compromised QNAP devices, ultimately leading to the discovery of over 180 unique C2 domains.

“The singular IP address is connected via a Tor relay, and is likely a way for the network operator to issue new commands and interact with the compromised devices,” the company said. “The IP used for this relay was based in an EU country.”

Cybersecurity

A deeper investigation of the infrastructure revealed that the Raspberry Robin C2 domain is short.[.]Rs, M0[.]WF, H0[.]WF, and 2i[.]PM – And they are spinning quickly through compromised devices and IPS, using a technique called Fast Flux to challenge them to defeat them.

Parts of the top raspberry robin top level domain (TLD) are .wf, .pm, .re, .nz, .eu, .gy, .tw, and .cx.[.]DE, CentralNic Ltd, and Open SRS. The majority of the identified C2 domains have name servers in a Bulgarian company named Cloudns.

“The use of raspberry robin by the Russian government’s threat actors is consistent with a history of working with countless other serious threat actors, many of whom have ties to Russia,” the company said. “These include Lockbit, Dridex, Socgholish, Dev-0206, Evil Corp (Dev-0243), Fauppod, Fin11, Clop Gang, and Lace Tempest (TA505).”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGermany begins trial of former Baader-Meinhof Gang member Court News
Next Article Apple Music integrates with music tools to allow DJs to create mixes using catalogs
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Research warning of “severe risks” when using AI therapy chatbots

UK launches a £500 million package to support diverse and underrated investors and founders

California creates a residential-focused agency | Planetizen News

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.