{"id":7170,"date":"2022-07-29T15:52:22","date_gmt":"2022-07-29T06:52:22","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7170"},"modified":"2022-08-19T15:53:55","modified_gmt":"2022-08-19T06:53:55","slug":"microsoft-draws-connections-between-raspberry-robin-malware-and-evil-corp-attacks","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/microsoft-draws-connections-between-raspberry-robin-malware-and-evil-corp-attacks\/","title":{"rendered":"Microsoft draws connections between Raspberry Robin malware and Evil Corp attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7170\" class=\"elementor elementor-7170\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23e1b92 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23e1b92\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cd9f5d0\" data-id=\"cd9f5d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5aaa136 elementor-widget elementor-widget-text-editor\" data-id=\"5aaa136\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 28<sup>th<\/sup> of July 2022, Microsoft researchers revealed that an access broker (DEV-0206) they have been tracking has been observed using the Raspberry Robin Windows worm to deploy a malware downloader on networks as well as showing signs of\u00a0Evil Corp pre-ransomware deploy tactics.<\/p><p>According to Microsoft\u2019s threat intelligence advisory, they have found Raspberry Robin malware\u00a0on the networks of hundreds of organisations from across a wide range of sectors. Based on Microsoft\u2019s threat intelligence advisory, it seems like Evil Corp has taken advantage of Raspberry Robin&#8217;s access to enterprise networks.<\/p><p>The Raspberry Robin malware was first observed in September 2021 by Red Canary intelligence analysts. It was observed spreading via infected USB devices to other devices on a target&#8217;s network once deployed on a compromised system.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 28th of July 2022, Microsoft researchers revealed that an access broker (DEV-0206) they have been tracking has been observed using the Raspberry Robin Windows worm to deploy a malware downloader on networks as well as showing signs of&nbsp;Evil Corp pre-ransomware deploy tactics. According to Microsoft\u2019s threat intelligence advisory, they have found Raspberry Robin malware&nbsp;on the networks of hundreds<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2,1],"tags":[],"class_list":["post-7170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/08\/14.jpg?fit=1378%2C883&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7170"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7170"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7170\/revisions"}],"predecessor-version":[{"id":7178,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7170\/revisions\/7178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7175"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}