Security News > 2024 > February > Raspberry Robin malware evolves with early access to Windows exploits

Raspberry Robin malware evolves with early access to Windows exploits
2024-02-10 15:11

Recent versions of the Raspberry Robin malware are stealthier and implement one-day exploits that are deployed only on systems that are susceptible to them.

According to a report from Check Point, Raspberry Robin has recently used at least two exploits for 1-day flaws, which indicates that the malware operator either has the capability to develop the code or has sources that provide it.

When Raspberry Robin is first run on a computer, it will automatically attempt to elevate privileges on the device using a variety of 1-day exploits.

Check Point highlights that the new Raspberry Robin campaign leverages exploits for CVE-2023-36802, and CVE-2023-29360, two local privilege escalation vulnerabilities in Microsoft Streaming Service Proxy and the Windows TPM Device Driver.

Check Point found evidence that points to this theory as well, since the exploits used by Raspberry Robin were not embedded into the main 32-bit component, but deployed as external 64-bit executables, and also lack the heavy obfuscation typically seen with this malware.

The researchers believe that Raspberry Robin will keep evolving and add new exploits to its arsenal, seeking code that has not been released publicly.


News URL

https://www.bleepingcomputer.com/news/security/raspberry-robin-malware-evolves-with-early-access-to-windows-exploits/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2023-09-12 CVE-2023-36802 Use After Free vulnerability in Microsoft products
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
local
low complexity
microsoft CWE-416
7.8
2023-06-14 CVE-2023-29360 Unspecified vulnerability in Microsoft products
Microsoft Streaming Service Elevation of Privilege Vulnerability
local
low complexity
microsoft
8.4