back to article Raspberry Robin devs are buying exploits for faster attacks

Researchers suspect the criminals behind the Raspberry Robin malware are now buying exploits for speedier cyberattacks. An exploit developer is thought by infosec pros to be either on the Raspberry Robin payroll or a close contact that sells them to the group – most likely the latter. That's according to Check Point Research ( …

  1. Version 1.0 Silver badge
    Flame

    Let's make a tack to computing.

    "The fact that these executables were 64-bit only hints towards outside development, since Raspberry Robin was developed for both 32-bit and 64-bit architectures."

    We see this everywhere ... but how secure would a 16-bit CPU operating system be? Certainly a little slower than today's computing but a nice slow CPU with only 16-bit calculations would be a lot harder to process malware installations. How much malware is available for installation on a CP/M system? But Windows ran fine in those days too.

    Back in the slow CPU days with a 300bpm network we saw virtually no infections, all of today's risks are mostly a result of a much more powerful computing world. But other unrelated environments work exactly opposite, a 70mph speed limit reduces accidents, upgrading roads to set the 70mph limit as a minimum speed (arresting anyone only driving at 60mph) would not help. I just think we need a very large change in our computing world to be safer like we used to be.

  2. Anonymous Coward
    Boffin

    Raspberry Robin Worm Abuses Windows Installer and QNAP Devices

    Raspberry Robin involves a worm that spreads over USB devices or shared folders, leveraging compromised QNAP (Network Attached Storage or NAS) devices as stagers. It uses an old but still effective method of using “LNK” shortcut files to lure its victims.’

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like