191
submitted 6 months ago* (last edited 6 months ago) by chevy9294@monero.town to c/privacy@lemmy.ml

This is probably not the right community but I haven't found a better one.

So I watched a video from Seytonic where he mentiond that some malware creates a windows link with the name of the usb on a usb. So I checked my usb because I remembered that I had to click 2 times on my usb to opened it. I found a link that contained cmd.exe and a name of a file next to it. Upload to the virustotal showed Raspberry Roblin worm.

I use Linux but my familly uses windows so I will have to go through all familly computers and remove the worm. Where can I find info how to remove this specific worm - Raspberry Roblin? On google I found a description about how the worm works but not specific files it creates and how to remove it.

The first page that shows up is microsoft.com and it says that windows defender detects the worm, but clearly it doesnt.

Edit: The worm was on one computer and it did not have windows defender installed. Seems like malware removed it and also disabled automatic updates. I installed MalwareBytes and sucessfully removed the worm :)

top 50 comments
sorted by: hot top controversial new old
[-] melroy@kbin.melroy.org 113 points 6 months ago

Try to clean your USB stick. Remove the worm and maybe use a cloth to remove the dirt.

[-] SomeBoyo@feddit.de 49 points 6 months ago

I would use a microwave to kill any worms / eggs still remaining, just in case.

[-] some_guy@lemmy.sdf.org 17 points 6 months ago

Rubbing alcohol should work in a pinch.

[-] geoma@lemmy.ml 10 points 6 months ago

Better use a biologic solution. Put the usb outside with some seeds nearby to attract birds that should eat it

load more comments (1 replies)
[-] melroy@kbin.melroy.org 6 points 6 months ago

Try C-band UV Lamp instead.

[-] SomeBoyo@feddit.de 3 points 6 months ago

At the end of the day, if nothing help's, kill it with fire.

load more comments (4 replies)
load more comments (2 replies)
[-] chevy9294@monero.town 11 points 6 months ago

I'll clean all USB sticks the house, just to be sure.

[-] melroy@kbin.melroy.org 8 points 6 months ago

yea microwave all your sticks in your house at full power for 15 minutes.

[-] possiblylinux127@lemmy.zip 4 points 6 months ago* (last edited 6 months ago)

Then mix bleach with ammonia

(Don't actually do this as it generates chorine gas which is quiet deadly and unpleasant)

[-] melroy@kbin.melroy.org 3 points 6 months ago

(what did you say? I can't read or ty.e mani 93

[-] goldfndr@lemmy.ml 4 points 6 months ago

In other words, wipe the USB stick.

load more comments (1 replies)
[-] stevedidwhat_infosec@infosec.pub 111 points 6 months ago

Here’s probably all the info you could ever need:

https://redcanary.com/blog/threat-intelligence/raspberry-robin/

Next, you need to get your systems scanned and cleaned. Malware bytes is likely enough, but I always recommend BitDefender. Their efficacy rates are always fantastic, and they have been leading the industry for several years now. Download the AV on a clean system, put on clean flash drive, and install that way.

Last, you’re gonna need to reset your passwords. Yes, I know that’s toxic af. But this is the reality and why we always need to be veeeery careful with what we do. This worm communicates with a c2 server which means it can update itself which makes detection hard, and it also means that, at one point it may have been spying on your activity (and it likely was if not continues to)

This stuff happens, don’t beat yourself up too much. Live and learn

[-] chevy9294@monero.town 15 points 6 months ago

Thank you for the link, it will help for sure!

I (not me but my family) always used just default Windows Defender but I heard good things about Malware bytes and BitDefender, I'll checked them out.

[-] stevedidwhat_infosec@infosec.pub 10 points 6 months ago

Bitdefender usually goes on sale too - check for coupon codes, don't pay full price. Plus you get like 5 devices with your license IIRC. Worth a shot

[-] chevy9294@monero.town 6 points 6 months ago

Oh it's paid... I would rather install Linux, I don't pay even for Windows.

[-] Jumuta@sh.itjust.works 3 points 6 months ago

if you're changing all your passwords and switching to Linux anyway consider using a free software local password manager like KeepassXC, I use it along with syncthing and it's great

load more comments (3 replies)
[-] possiblylinux127@lemmy.zip 4 points 6 months ago

I'd start with a offline scan.

If possible wipe the drive from Linux and reinstall Windows. Be mindful of any files as documents and other files can sometimes hide things. Make sure you reset all passwords as well. Start with email passwords and then go up from there.

[-] apotheotic@beehaw.org 4 points 6 months ago

Windows defender along with a system hardener (like hard_configurator) can actually be quite insanely strong, especially since windows defender starts working and blocking stuff long before non-system apps, which can be a big boon. This approach is also free (if you have windows) which seems to fit your needs!

[-] hanrahan@slrpnk.net 58 points 6 months ago

Same thing happened to RFK Jr

load more comments (1 replies)
[-] SoupBrick@pawb.social 49 points 6 months ago

Would you love your USB if it was a worm?

[-] KazuchijouNo@lemy.lol 8 points 6 months ago

What if it didn't exist? Would you still love your USB then?

load more comments (2 replies)
[-] ohwhatfollyisman@lemmy.world 40 points 6 months ago

we've found the early bird.

[-] anarchist@lemmy.ml 12 points 6 months ago

Lisan al ghaieb!!!

[-] techognito@lemmy.world 11 points 6 months ago

Have you run a full scan using Windows Defender?

Can you confirm that the worm is actually running?

AV software may remove the installed worm from the system, but not from the drive.

Probably a good idea to reformat the USB drive

PS. if all else fails, nuke and pave (reinstall the computers in your household, including your linux machine)

You should do this offline, as in, quarantine the situation.

[-] stevedidwhat_infosec@infosec.pub 5 points 6 months ago

Windows defender also has an offline scan mode which may be of use here - hard to say, dunno if they ever dropped a rootkit or any other av-dodging/persistence mechanisms

[-] possiblylinux127@lemmy.zip 3 points 6 months ago

Time to switch to Linux (joking)

load more comments (1 replies)
[-] stevedidwhat_infosec@infosec.pub 9 points 6 months ago

I'll also toss this hat into the ring - sysmon this is essentially a logging tool thats a bit better/nicer than the windows default, and categorizes all logs into very neat buckets that will make watching out for strange shit much much easier.

Sysmon is part of the sysinternals suite (vetted by the community + microsoft, which is sayin somethin lol) and you can make use this as the config file to use (Uses industry-standard MITRE Att&ck framework) which you can then use to correlate to more threats/malware authors/malware artifacts if you really wanna get your hands dirty/have some fun

[-] borari@lemmy.dbzer0.com 7 points 6 months ago

To level set, Microsoft owns SysInternals, and has since 2006. None of it is “community vetted”, to me that implies FOSS or something.

[-] Imprint9816@lemmy.dbzer0.com 8 points 6 months ago* (last edited 6 months ago)

Why would "community vetted" imply FOSS?

Microsoft has a massive community of users and sysinternals is highly regarded amongst amateur and professional users alike. The term "community vetted" makes perfect sense in this context.

[-] borari@lemmy.dbzer0.com 7 points 6 months ago

Yeah, I use SysInternals stuff every day. Neither myself nor the community has vetted SysInternals tools any more than they have vetted outlook, teams, or word. Unless I’m misunderstanding the meaning of vetted.

Vetting in a program/application context as I understand it is that the code has been vetted, which can only be done by the community at large if the source code is provided. Just like with a person, vetting is doing an actual background check, where as vouching for someone is just one person telling a second person that a third person is chill or something.

[-] possiblylinux127@lemmy.zip 7 points 6 months ago

The malware probably turned of defender. Try an offline scan

[-] chevy9294@monero.town 6 points 6 months ago

Actualy the malware somehow deleted windows defender and disabled automatic updates. I install MalwareBytes and run full scan and removed it.

[-] sramder@lemmy.world 6 points 6 months ago

Doesn’t virus total display a list of the AV software it triggered?

I generally use Malware Bytes on windows but I don’t know if it’s effective against that particular virus.

[-] chevy9294@monero.town 3 points 6 months ago

Yes it does but I haven't checked whichones do end whichones don't. But half of them do, thats important.

load more comments (1 replies)
[-] TCB13@lemmy.world 5 points 6 months ago

And here I was under the impression that using USB storage for anything else than installing operating systems was a thing of the past.

[-] DharkStare@lemmy.world 13 points 6 months ago

Out of curiosity, what do you use to transfer files between computers?

[-] realbadat@programming.dev 12 points 6 months ago

SCP or a share on a NAS, personally.

load more comments (9 replies)
[-] Dave@lemmy.nz 11 points 6 months ago

Personally, most stuff is in cloud storage. For local stuff I use syncthing.

But for the average person, I'd expect using iCloud, Google Drive, Onedrive, or Dropbox and then creating a shareable link for the other person.

I also can't remember the last time I used a USB drive for anything other than installing an OS.

[-] user224@lemmy.sdf.org 4 points 6 months ago* (last edited 6 months ago)

Deleted: Replied to wrong comment

[-] TCB13@lemmy.world 5 points 6 months ago* (last edited 6 months ago)

SMB (NAS), Syncthing, FileBrowser, snapdrop.net, email and sometimes public cloud services...

[-] sorter_plainview@lemmy.today 5 points 6 months ago

Syncthing and LocalSend.

Syncthing is used if it is not a one time transfer. LocalSend is mainly for one time transfer. LocalSend needs things to be in the same network. The same WiFi router is enough. Syncthing can send files over the internet also.

There are browser based alternatives like ShareDrop . These tools are not as reliable as Syncthing and LocalSend, especially when it comes to single large files (more than a few GBs), like ISOs.

For one time transfer over the internet, another handy tool is Croc . This one also suffers from the large file related issues.

load more comments (3 replies)
[-] seaQueue@lemmy.world 5 points 6 months ago

NVMe in a USB enclosure makes a pretty rad backup target a couple of times a week. The whole job is over and done in <2 minutes.

[-] TCB13@lemmy.world 3 points 6 months ago

Yes, that's true but I'm no longer doing that. Everything sync to the NAS using Syncthing that in turn is set with file versioning and weekly snapshots.

[-] Player2@lemm.ee 5 points 6 months ago

Ventoy is very useful for diagnostics too

load more comments (1 replies)
[-] hanrahan@slrpnk.net 4 points 6 months ago

All the time, right now copying 400 MB onto one as an eBook Calibre library backup.

load more comments (4 replies)
load more comments
view more: next ›
this post was submitted on 13 May 2024
191 points (96.6% liked)

Privacy

32159 readers
232 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS