The operation has links to Russian government threat actors.
More than 180 unique command-and-control domains have been leveraged in attacks by the Raspberry Robin threat operation.
Also known as Storm-0856 and Roshtyak, Silent Push said in a report shared with The Hacker News that Raspberry Robin was only recently improved to include archive- and Windows Script File-based downloads in its attack chains, as well as a USB-based distribution mechanism.
Aside from using a single IP address to connect all of the QNAP devices it had compromised, Raspberry Robin also had brief C2 domains that are being quickly rotated through the fast flux approach.
"Raspberry Robin's use by Russian government threat actors aligns with its history of working with countless other serious threat actors, many of whom have connections to Russia" said the report. "These include LockBit, Dridex, SocGholish, DEV-0206, Evil Corp (DEV-0243), Fauppod, FIN11, Clop Gang, and Lace Tempest (TA505)."
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.