Raspberry Robin Linked to 200 Unique Domains Operated by Threat Actors

In a significant development in cybersecurity research, Silent Push has identified nearly 200 unique command and control (C2) domains associated with the Raspberry Robin malware.

This discovery, made through the identification of key nameservers, domain naming conventions, and IP and ASN diversity patterns, provides crucial insights into the infrastructure of this sophisticated threat actor.

Evolution from USB Worm to Initial Access Broker

Raspberry Robin, also known as Roshtyak or Storm-0856, has evolved from its initial appearance as a USB worm in 2019 to become a complex initial access broker (IAB) service.

The threat actor now provides access to numerous criminal groups, many with connections to Russia, including the Russian GRU’s Unit 29155 cyber actors.

The malware’s attack methodology has shifted from USB drive infections to more advanced tactics.

These include leveraging compromised QNAP NAS boxes, routers, and IoT devices, as well as employing multi-layer packing techniques to obfuscate malware.

According to the Report, Raspberry Robin has been linked to serious threat actors such as SocGholish, Dridex, and LockBit.

Raspberry Robin
Raspberry Robin attack flow

Infrastructure Analysis and Collaboration

Silent Push’s research, conducted in collaboration with Team Cymru, has revealed a sophisticated C2 infrastructure connected through a singular IP address.

This finding, based on updated NetFlow analysis from 2024, provides a map of Raspberry Robin’s C2 network.

The threat actor’s domains primarily use lower-reputation 2-letter TLDs, with .wf, .pm, and .re being among the most common.

Following a takedown of approximately 80 domains on Namecheap in 2022, Raspberry Robin shifted to using multiple niche registrars.

Raspberry Robin
Top registrars observed for Raspberry Robin

The majority of its domains are now hosted on ClouDNS nameservers.

The connection between Raspberry Robin and Russian threat groups, including state-sponsored actors, underscores the gravity of this threat.

As the malware continues to evolve and adapt, collaboration among cybersecurity researchers and law enforcement agencies will be crucial in tracking and mitigating its impact.

Silent Push’s ongoing monitoring of Raspberry Robin’s C2 domains and infrastructure provides valuable intelligence for defenders.

As the threat landscape continues to evolve, this research highlights the importance of proactive threat hunting and information sharing in combating sophisticated cyber threats.

Find this Story Interesting! Follow us on LinkedIn, and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here