ICS: Rockwell Automation ControlLogix and GuardLogix Vulnerability
April 17, 2024CVE-2024-20903 – Oracle Database Server Vulnerability
April 17, 2024ICS: Rockwell Automation ControlLogix and GuardLogix Vulnerability
April 17, 2024CVE-2024-20903 – Oracle Database Server Vulnerability
April 17, 2024Severity
High
Analysis Summary
Raspberry Robin is a new Windows virus found by researchers having worm-like capabilities that spreads via removable USB devices. Raspberry Robin makes use of Windows Installer to connect to QNAP-related domains and download a malicious DLL. TOR exit nodes are used as a backup C2 infrastructure by this malware.
Raspberry Robin was first discovered in September 2021. This malware is observed targeting companies in the technology and manufacturing industries. The Raspberry Robin worm appears as a shortcut .lnk file masquerading as a legitimate folder on the infected USB device.
The UserAssist registry item is updated shortly after the Raspberry Robin infected disc is attached to the system, and when decoded, it records the execution of a ROT13-ciphered value referencing a.lnk file. For example q:\erpbirel.yax deciphers to d:\recovery.lnk.
Raspberry Robin reads and executes a file from the infected external drive using cmd.exe and it utilizes msiexec.exe for external network communication to a rogue domain used as C2 to download and install a DLL library file. After that msiexec.exe runs fodhelper.exe, a Windows utility, which runs rundll32.exe to run a malicious operation. Fodhelper.exe processes run with elevated administrator rights without necessitating a User Account Control prompt, according to experts.
Impact
- Exposure of Sensitive Data
- Unauthorized Access
Indicators of Compromise
MD5
- 026073e82684855a0273380b241b7938
- 4abca4ce3b4f93811359c9bfa0069878
- 3ec58919be38486e5899b284411d6c37
- 25db62aad8690011a9c38e84e42cb64c
- f14b54c6e41545c8ba51629183431d1d
- 25593d2dd5e7ef268a2400068987caf7
- e2fe09e0691f86121ec5bfb72143af9b
SHA-256
- 71063f63480cf26cfb18d82fd8a93ff1523decde32a10bf29f7d6c94b989c384
- 8523f06f8b50885c4b4895a09eae4acf06b4852966c7acd8ce0e2d1d9727f568
- e5ab91456bdb1ec8c84d400152244fc90812bdd62e7170e75c9709bb83c8dad7
- 7b09972a68f0f27a6eefc70a033922b433c9d622f45791f0b62c1ef759bc8990
- 015a36adeafc759d8034813bff44559ef28060351dd0e8750b87fdf12802e82f
- cd01c326183994911094c1699ddc9da5b1b6f5798b9a2fb9e346b4f2d96de8a4
- ac7393907c6d8c79e15fcdd437d984d7af08c6b179d53404fcd0cd6574864f74
SHA-1
- 17aceb12a1f1a80cff6a13edff80d0b16461cd61
- d4574fbd9741d1945c6d02cbb33fb398e9bc1d27
- cfd52d74b45eba29b45daacdf61913a71f74d81e
- 4120efa3cc325bb6e4d8fb64d838c221666965aa
- 758aa4668d2206d3a80308ecd2fecae459fed07e
- 661dde84788e4e0afa52d1c5eeb42279bc6b14da
- a045264e244e6324abe19d08f3d4bad953bf5001
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Ensure that all systems, software, and applications are up-to-date with the latest security patches. Regularly check for and apply updates to eliminate known vulnerabilities that attackers could exploit.
- Educate employees about phishing emails, social engineering tactics, and safe online behavior. Effective training can reduce the likelihood of users inadvertently initiating an attack.
- Regularly back up critical data and systems to offline or isolated storage. Test the backup restoration process to ensure that it is effective in case of an attack.
- Deploy security solutions that utilize behavioral analysis and anomaly detection to identify unusual patterns of activity that may indicate the presence of malware.
- Enforce multi-factor authentication for sensitive accounts, including cryptocurrency wallets and other financial services, to add an extra layer of security against unauthorized access.
- Develop and regularly test an incident response plan to ensure a swift and effective response in case of a security incident.
- Deploy strong endpoint protection solutions that include advanced threat detection, behavior monitoring, and real-time protection against malware and ransomware.
- Employ robust email filtering and anti-phishing solutions to detect and prevent malicious attachments and links from reaching user inboxes.
- Conduct regular penetration testing and security assessments to identify vulnerabilities and weaknesses in your network and systems. Address any findings promptly.
- Thoroughly assess third-party vendors and software before integrating them into your environment. Ensure they have strong security practices and adhere to cybersecurity standards.