This is probably not the right community but I haven’t found a better one.

So I watched a video from Seytonic where he mentiond that some malware creates a windows link with the name of the usb on a usb. So I checked my usb because I remembered that I had to click 2 times on my usb to opened it. I found a link that contained cmd.exe and a name of a file next to it. Upload to the virustotal showed Raspberry Roblin worm.

I use Linux but my familly uses windows so I will have to go through all familly computers and remove the worm. Where can I find info how to remove this specific worm - Raspberry Roblin? On google I found a description about how the worm works but not specific files it creates and how to remove it.

The first page that shows up is microsoft.com and it says that windows defender detects the worm, but clearly it doesnt.

Edit: The worm was on one computer and it did not have windows defender installed. Seems like malware removed it and also disabled automatic updates. I installed MalwareBytes and sucessfully removed the worm :)

  • melroy@kbin.melroy.org
    link
    fedilink
    arrow-up
    126
    arrow-down
    16
    ·
    6 months ago

    Try to clean your USB stick. Remove the worm and maybe use a cloth to remove the dirt.

  • stevedidwhat_infosec@infosec.pub
    link
    fedilink
    arrow-up
    110
    ·
    6 months ago

    Here’s probably all the info you could ever need:

    https://redcanary.com/blog/threat-intelligence/raspberry-robin/

    Next, you need to get your systems scanned and cleaned. Malware bytes is likely enough, but I always recommend BitDefender. Their efficacy rates are always fantastic, and they have been leading the industry for several years now. Download the AV on a clean system, put on clean flash drive, and install that way.

    Last, you’re gonna need to reset your passwords. Yes, I know that’s toxic af. But this is the reality and why we always need to be veeeery careful with what we do. This worm communicates with a c2 server which means it can update itself which makes detection hard, and it also means that, at one point it may have been spying on your activity (and it likely was if not continues to)

    This stuff happens, don’t beat yourself up too much. Live and learn

    • chevy9294@monero.townOP
      link
      fedilink
      English
      arrow-up
      15
      ·
      6 months ago

      Thank you for the link, it will help for sure!

      I (not me but my family) always used just default Windows Defender but I heard good things about Malware bytes and BitDefender, I’ll checked them out.

      • stevedidwhat_infosec@infosec.pub
        link
        fedilink
        arrow-up
        10
        ·
        6 months ago

        Bitdefender usually goes on sale too - check for coupon codes, don’t pay full price. Plus you get like 5 devices with your license IIRC. Worth a shot

          • Jumuta@sh.itjust.works
            link
            fedilink
            arrow-up
            3
            ·
            6 months ago

            if you’re changing all your passwords and switching to Linux anyway consider using a free software local password manager like KeepassXC, I use it along with syncthing and it’s great

          • stevedidwhat_infosec@infosec.pub
            link
            fedilink
            arrow-up
            7
            arrow-down
            5
            ·
            edit-2
            6 months ago

            And you got what you paid for, no?

            I believe there is a free version as well but don’t think just because you’re installing Linux that you’re somehow safer.

            There was just a package that was essentially socially engineered into by a hacker, who then had full access to everyone’s shit.

            All because a GitHub author was pressured into letting them contribute to code. Mac/Apple are no different and starting to be more and more vulnerable as the “security by obscurity” wears off.

            Free tools are fine and well, but that stuff is done for free. Including maintainence and everything else. In times like these, ain’t nobody got time for that anymore. People need to make a living and you will see degradation in the products thusly

            • laughterlaughter@lemmy.world
              link
              fedilink
              arrow-up
              4
              ·
              edit-2
              6 months ago

              I didn’t downvote you, but I think you’re assuming waaaay too much about OP’s life circumstances. For al we know, he’s an Argentinian teenage girl with an allowance, or a Vietnamese retired fisherman with no life savings.

              • stevedidwhat_infosec@infosec.pub
                link
                fedilink
                arrow-up
                3
                ·
                6 months ago

                Could be. However, the point stands, you’re gonna get what you pay for in the end. Not trying to be a dick ofc, but that’s the reality.

                There are some well performing options that are free, but they are limited, and not too common imo

                If anyone does have some good options, feel free to share as I may be unaware of them and think learning about them would be neat

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 months ago

        I’d start with a offline scan.

        If possible wipe the drive from Linux and reinstall Windows. Be mindful of any files as documents and other files can sometimes hide things. Make sure you reset all passwords as well. Start with email passwords and then go up from there.

      • apotheotic (she/her)@beehaw.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        6 months ago

        Windows defender along with a system hardener (like hard_configurator) can actually be quite insanely strong, especially since windows defender starts working and blocking stuff long before non-system apps, which can be a big boon. This approach is also free (if you have windows) which seems to fit your needs!

  • Techognito@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    6 months ago

    Have you run a full scan using Windows Defender?

    Can you confirm that the worm is actually running?

    AV software may remove the installed worm from the system, but not from the drive.

    Probably a good idea to reformat the USB drive

    PS. if all else fails, nuke and pave (reinstall the computers in your household, including your linux machine)

    You should do this offline, as in, quarantine the situation.

    • stevedidwhat_infosec@infosec.pub
      link
      fedilink
      arrow-up
      5
      ·
      6 months ago

      Windows defender also has an offline scan mode which may be of use here - hard to say, dunno if they ever dropped a rootkit or any other av-dodging/persistence mechanisms

      • Techognito@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 months ago

        That would be a valid option, but only if there are no windows dependencies and the primary user agrees to the change.

        With all the Win11 spam in Win10, my grandmother decided to try Linux. She is now a 90-year-old Linux user. Her use case is YouTube and email, and I have to support the system (I had to do that for the win10 system as well).

  • stevedidwhat_infosec@infosec.pub
    link
    fedilink
    arrow-up
    13
    arrow-down
    3
    ·
    6 months ago

    I’ll also toss this hat into the ring - sysmon this is essentially a logging tool thats a bit better/nicer than the windows default, and categorizes all logs into very neat buckets that will make watching out for strange shit much much easier.

    Sysmon is part of the sysinternals suite (vetted by the community + microsoft, which is sayin somethin lol) and you can make use this as the config file to use (Uses industry-standard MITRE Att&ck framework) which you can then use to correlate to more threats/malware authors/malware artifacts if you really wanna get your hands dirty/have some fun

    • borari@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      10
      arrow-down
      3
      ·
      6 months ago

      To level set, Microsoft owns SysInternals, and has since 2006. None of it is “community vetted”, to me that implies FOSS or something.

      • Imprint9816@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        edit-2
        6 months ago

        Why would “community vetted” imply FOSS?

        Microsoft has a massive community of users and sysinternals is highly regarded amongst amateur and professional users alike. The term “community vetted” makes perfect sense in this context.

        • borari@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          7
          ·
          6 months ago

          Yeah, I use SysInternals stuff every day. Neither myself nor the community has vetted SysInternals tools any more than they have vetted outlook, teams, or word. Unless I’m misunderstanding the meaning of vetted.

          Vetting in a program/application context as I understand it is that the code has been vetted, which can only be done by the community at large if the source code is provided. Just like with a person, vetting is doing an actual background check, where as vouching for someone is just one person telling a second person that a third person is chill or something.

    • chevy9294@monero.townOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      6 months ago

      Actualy the malware somehow deleted windows defender and disabled automatic updates. I install MalwareBytes and run full scan and removed it.

  • sramder@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    6 months ago

    Doesn’t virus total display a list of the AV software it triggered?

    I generally use Malware Bytes on windows but I don’t know if it’s effective against that particular virus.

    • chevy9294@monero.townOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      6 months ago

      Yes it does but I haven’t checked whichones do end whichones don’t. But half of them do, thats important.

  • TCB13@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    5
    ·
    6 months ago

    And here I was under the impression that using USB storage for anything else than installing operating systems was a thing of the past.

      • Dave@lemmy.nz
        link
        fedilink
        arrow-up
        11
        ·
        6 months ago

        Personally, most stuff is in cloud storage. For local stuff I use syncthing.

        But for the average person, I’d expect using iCloud, Google Drive, Onedrive, or Dropbox and then creating a shareable link for the other person.

        I also can’t remember the last time I used a USB drive for anything other than installing an OS.

      • sorter_plainview@lemmy.today
        link
        fedilink
        arrow-up
        5
        ·
        6 months ago

        Syncthing and LocalSend.

        Syncthing is used if it is not a one time transfer. LocalSend is mainly for one time transfer. LocalSend needs things to be in the same network. The same WiFi router is enough. Syncthing can send files over the internet also.

        There are browser based alternatives like ShareDrop . These tools are not as reliable as Syncthing and LocalSend, especially when it comes to single large files (more than a few GBs), like ISOs.

        For one time transfer over the internet, another handy tool is Croc . This one also suffers from the large file related issues.

      • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        6 months ago

        If I want to quickly share something from my phone, I use NGINX in Termux with autoindex enabled.

        No need for anything else than browser on client-side.
        Actually, on Play store there’s also a simple GUI app called “Simple HTTP server”, but NGINX feels fancier.

        Just a tip if you want to try this:
        By default, error logs are kept. One source of errors is interface suddenly disappearing (i.e. your phone got disconnected from network). This error will be logged as quickly as it can be.
        What happened (when this occurred)? I found my phone stuck in bootloop. The error log filled internal storage to the last byte causing Android system to crash and unable to reboot, which it tried again, again, again,… Bootloop. I just found my pocket suddenly feeling unreasonably hot.
        In my case, forcing it into recovery, turning it off from there and retrying boot up freed 17MB from somewhere, allowing the phone to boot up.
        Alternative to that would be a hard reset.

        Sounds crazy, but any app could fill the internal storage like that.

    • seaQueue@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      6 months ago

      NVMe in a USB enclosure makes a pretty rad backup target a couple of times a week. The whole job is over and done in <2 minutes.

      • TCB13@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 months ago

        Yes, that’s true but I’m no longer doing that. Everything sync to the NAS using Syncthing that in turn is set with file versioning and weekly snapshots.

    • Hanrahan@slrpnk.net
      link
      fedilink
      English
      arrow-up
      4
      ·
      6 months ago

      All the time, right now copying 400 MB onto one as an eBook Calibre library backup.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        edit-2
        6 months ago

        That’s not a good practice as USBs aren’t designed for long term storage. Maybe build some sort of NAS.

        • Richard@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 months ago

          Lol any kind of flash storage suffers from degradation over time, it doesn’t matter whether you attach a computer to it or not