{"id":3754,"date":"2020-05-14T00:45:00","date_gmt":"2020-05-14T00:45:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3754"},"modified":"2026-04-14T23:32:02","modified_gmt":"2026-04-14T23:32:02","slug":"robbinhood-and-his-not-so-merry-malware","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware","title":{"rendered":"RobbinHood and His Not-So-Merry Malware"},"content":{"rendered":"\n<p>There\u2019s a new outlaw in town \u2013 but you won\u2019t catch this guy with a heroic band of Merry Men.<\/p>\n\n\n\n<p>Instead of stealing from the rich and giving to the poor, this aptly named piece of ransomware exploits a privilege escalation vulnerability in a kernel driver to infiltrate the network, encrypting files and demanding to be paid within four days \u2013 with the ransom increasing by $10,000 every day that it is not paid.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Out of the Forest and into the Network<\/h2>\n\n\n\n<p>A kernel manages computer operations and is essentially the core of the operating system. Gaining kernel control means gaining control of everything in the system.<\/p>\n\n\n\n<p>RobbinHood ransomware is as mischievous as its namesake, gaining access to the kernel under the guise of a legitimate driver.<\/p>\n\n\n\n<p>RobbinHood ransomware uses this to its advantage; instead of hunting for existing vulnerabilities within a network, it uses an old but legitimate Windows kernel driver from&nbsp;<a href=\"https:\/\/www.gigabyte.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gigabyte<\/a>&nbsp;to&nbsp;<a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/02\/07\/robbin-hood-the-ransomware-that-brings-its-own-bug\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u2018bring its own bug\u2019<\/a>&nbsp;into the system.<\/p>\n\n\n\n<p>The malware consists of several files embedded in executable&nbsp;<strong>STEEL.EXE<\/strong>. Here\u2019s an overview of the attack plan based on a research report from&nbsp;<a href=\"https:\/\/news.sophos.com\/en-us\/2020\/02\/06\/living-off-another-land-ransomware-borrows-vulnerable-driver-to-remove-security-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">SophosLabs<\/a>:<\/p>\n\n\n\n<p>1.&nbsp;<strong>STEEL.EXE<\/strong>&nbsp;is extracted and plants file&nbsp;<strong>ROBNR.EXE<\/strong>&nbsp;onto the disk, which then installs the legitimate Gigabyte driver (<strong>GDRV.SYS<\/strong>) along with the malicious driver (<strong>RBNL.SYS<\/strong>).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In order to be loaded into Windows 64-bit computers, drivers must be legitimate: signed by both Microsoft and the driver manufacturer. Windows recognises legitimate drivers by means of a driver signature enforcement process, and it therefore allows the&nbsp;<strong>GDRV.SYS<\/strong>&nbsp;to be installed.<\/li>\n<\/ul>\n\n\n\n<p>2. Once installed, the&nbsp;<strong>GDRV.SYS<\/strong>&nbsp;is able to temporarily disable the driver signature enforcement mechanism due to a vulnerability that allows the driver to read and write to any part of the computer memory. With signature enforcement disabled, the malicious driver can then be loaded into kernel space.<\/p>\n\n\n\n<p>3. Once the malicious driver is up and running, the&nbsp;<strong>ROBNR.EXE<\/strong>&nbsp;process exits and the&nbsp;<strong>PLIST.TXT<\/strong>&nbsp;file (a list of all applications to kill, often tailored to the target network), is processed. The malicious driver begins terminating security processes and deleting associated files on the list, using various deletion methods run consecutively.<\/p>\n\n\n\n<p>4. When the&nbsp;<strong>STEEL.EXE<\/strong>&nbsp;has completed this process, it exits, and RobbinHood can encrypt network files unimpeded by security software.<\/p>\n\n\n\n<p>The following image from a&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/17\/secured-core-pcs-a-brief-showcase-of-chip-to-cloud-security-against-kernel-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Security blog<\/a>&nbsp;illustrates the process:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"408\" height=\"478\" src=\"\/wp-content\/uploads\/2022\/10\/image-4.png\" alt=\"\" class=\"wp-image-3755\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/image-4.png 408w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/image-4-256x300.png 256w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Just in Time to Stop (and Audit) the Robbery<\/h2>\n\n\n\n<p>In the case of RobbinHood ransomware, privilege escalation is the steppingstone to the main attack; in order to install its malicious driver, it first needs elevated powers. This can start by gaining access to an already privileged account, or by accessing a less-privileged account and ascending the ranks (vertical privilege escalation) to the necessary level from which point the main goal can be achieved.<\/p>\n\n\n\n<p>If you can prevent the surface area of attack by managing privileged users, and promptly detect attempts (or even success) at privilege escalation, you have a much better chance at stopping the \u2018main event\u2019 from eventuating. Doing this essentially removes the privileged-account foothold RobbinHood needs to deploy and run&nbsp;<strong>STEEL.EXE<\/strong>.<\/p>\n\n\n\n<p>As a Privileged Access Management (PAM) system, Admin By Request does just that by limiting access rights of users.<\/p>\n\n\n\n<p>Admin By Request&nbsp;adopts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>The principle of least privilege (<strong>POLP<\/strong>)<\/em>&nbsp;&#8211; giving user accounts and administrators only the rights they need to successfully do their jobs, and<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Just-in-time (<strong>JIT<\/strong>) elevation<\/em>&nbsp;\u2013 only elevating privileges when and where they are absolutely necessary.<\/li>\n<\/ul>\n\n\n\n<p>In every business\u2019 computer network, there will be accounts and users that require higher privileges than others. But that does not have to mean giving some accounts privileged access and free rein all the time.<\/p>\n\n\n\n<p>With Admin By Request\u2019s Sub Settings, you can implement&nbsp;<strong>POLP<\/strong>&nbsp;by creating different access rules for specialised users and groups, depending on their needs. This means you can impose strict access controls for all but your two IT techs if you so choose, lessening the potential for malware like RobbinHood to gain access to an already privileged account.<\/p>\n\n\n\n<p><strong>JIT<\/strong>&nbsp;elevation safeguards are in place with Admin By Request&nbsp;providing users with&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">four ways to perform tasks<\/a>&nbsp;that require elevated privileges.<\/p>\n\n\n\n<p>Three of these four methods require the user to request permission or obtain a PIN in order to gain administrator access &#8211; with Admin By Request\u2019s auditlog recording and displaying all administrator activity that takes place during these requests.<\/p>\n\n\n\n<p>Auditing user activity in this way can prevent ransomware attacks like RobbinHood (in which escalation is instrumental to staging the attack), as it allows you to detect possible privilege escalation as it occurs and take appropriate action.<\/p>\n\n\n\n<p>To have the power to install system resources such as drivers (which RobbinHood ransomware relies on to perform encryption unhindered), a user would need full local admin rights of their system.<\/p>\n\n\n\n<p>In Admin By Request, this would require the user to make a Full Session Elevation request. Again, gaining this type of access could require a reason and\/or approval (depending on your settings in Admin By Request), and all installs and uninstalls are recorded with the details of the elevated session in the auditlog. This makes it a much harder task to climb up the ranks of privilege unnoticed.<\/p>\n\n\n\n<p>Disrupting just one of RobbinHood ransomware\u2019s many processes can thwart its plan entirely \u2013 removing the foothold of privileged accounts and privilege escalation with Admin By Request&nbsp;does just that.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">You Need More than One Sheriff to Stop RobbinHood<\/h2>\n\n\n\n<p>There is a operation in RobbinHood\u2019s execution that runs multiple deletion-processes sequentially to ensure everything on its&nbsp;<strong>PLIST.TXT<\/strong>&nbsp;list is deleted. Better to be safe than sorry, right?<\/p>\n\n\n\n<p>To beat this ransomware at its own game, you need to take a leaf out of Sherwood Forest.<\/p>\n\n\n\n<p>Admin By Request&nbsp;does this by&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\" target=\"_blank\" rel=\"noreferrer noopener\">integrating a PAM solution with Opswat MetaDefender\u2019s multi-engine malware scanning tool<\/a>, the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.opswat.com\/developers\/metadefender-cloud-api\" target=\"_blank\">MetaDefender Cloud<\/a>.<\/p>\n\n\n\n<p>This security tool scans files with more than 35 anti-malware scanning engines. To give you an idea of how effective this makes Admin By Request\u00a0at keeping your system safe from malware, here are some numbers from\u00a0<a href=\"https:\/\/www.opswat.com\/resources\/reports\/package-efficacy\" title=\"\">Opswat&#8217;s Detection Efficacy Overview<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>4 anti-malware engines detect 62.80% of the top 10,000 searched for threats from the MetaDefender Cloud database<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>12 anti-malware engines detect 90.53%<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>20 anti-malware engines detect 98.69%<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The MetaDefender Cloud detects 99.02%<\/li>\n<\/ul>\n\n\n\n<p>That raises malware detection rates to almost 100%.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Like RobbinHood, today\u2019s ransomware attacks use a range of tactics and often need to find success at every step to achieve their goal. The best way to combat this is to disrupt as many parts of the attack chain as possible.<\/p>\n\n\n\n<p><a href=\"\/en\/freeplandownload\">Admin By Request\u2019s PAM solution<\/a>, combined with an anti-malware security tool that employs multiple scanning engines, leaves no leaf unturned.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.<\/p>\n","protected":false},"author":2,"featured_media":7855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,131,80,129,148,149,91,82,181,79,180,84],"ppma_author":[10],"class_list":["post-3754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-antivirus","tag-current-events","tag-cyberattack","tag-cybersecurity","tag-hacked","tag-hacker","tag-malware","tag-malware-breakdown","tag-ransomware","tag-robbinhood-ransomware","tag-virus","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,antivirus,current events,cyberattack,cybersecurity,hacked,hacker,malware,malware breakdown,ransomware,robbinhood ransomware,virus\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-05-14T00:45:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-04-14T23:32:02+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#blogposting\",\"name\":\"RobbinHood and His Not-So-Merry Malware \\u00bb Admin By Request\",\"headline\":\"RobbinHood and His Not-So-Merry Malware\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/CircleTickShield.png\",\"width\":1673,\"height\":872,\"caption\":\"An eye-like digital artwork with an orange shield as the retina with a black background.\"},\"datePublished\":\"2020-05-14T00:45:00+00:00\",\"dateModified\":\"2026-04-14T23:32:02+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#webpage\"},\"articleSection\":\"Blogs, Antimalware, Antivirus, Current Events, Cyberattack, Cybersecurity, Hacked, Hacker, Malware, Malware Breakdown, Ransomware, RobbinHood Ransomware, Virus, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#listItem\",\"name\":\"RobbinHood and His Not-So-Merry Malware\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#listItem\",\"position\":3,\"name\":\"RobbinHood and His Not-So-Merry Malware\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware\",\"name\":\"RobbinHood and His Not-So-Merry Malware \\u00bb Admin By Request\",\"description\":\"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/CircleTickShield.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware\\\/#mainImage\",\"width\":1673,\"height\":872,\"caption\":\"An eye-like digital artwork with an orange shield as the retina with a black background.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/robbinhood-and-his-not-so-merry-malware#mainImage\"},\"datePublished\":\"2020-05-14T00:45:00+00:00\",\"dateModified\":\"2026-04-14T23:32:02+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request","description":"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,antivirus,current events,cyberattack,cybersecurity,hacked,hacker,malware,malware breakdown,ransomware,robbinhood ransomware,virus","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#blogposting","name":"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request","headline":"RobbinHood and His Not-So-Merry Malware","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/05\/CircleTickShield.png","width":1673,"height":872,"caption":"An eye-like digital artwork with an orange shield as the retina with a black background."},"datePublished":"2020-05-14T00:45:00+00:00","dateModified":"2026-04-14T23:32:02+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#webpage"},"articleSection":"Blogs, Antimalware, Antivirus, Current Events, Cyberattack, Cybersecurity, Hacked, Hacker, Malware, Malware Breakdown, Ransomware, RobbinHood Ransomware, Virus, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#listItem","name":"RobbinHood and His Not-So-Merry Malware"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#listItem","position":3,"name":"RobbinHood and His Not-So-Merry Malware","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware","name":"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request","description":"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/05\/CircleTickShield.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\/#mainImage","width":1673,"height":872,"caption":"An eye-like digital artwork with an orange shield as the retina with a black background."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware#mainImage"},"datePublished":"2020-05-14T00:45:00+00:00","dateModified":"2026-04-14T23:32:02+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request","og:description":"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-05-14T00:45:00+00:00","article:modified_time":"2026-04-14T23:32:02+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"RobbinHood and His Not-So-Merry Malware \u00bb Admin By Request","twitter:description":"Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3754","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-04-15 00:03:22","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2023-05-22 21:56:16","updated":"2026-04-15 00:17:15"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tRobbinHood and His Not-So-Merry Malware\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"RobbinHood and His Not-So-Merry Malware","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/robbinhood-and-his-not-so-merry-malware"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3754"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3754\/revisions"}],"predecessor-version":[{"id":32507,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3754\/revisions\/32507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7855"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3754"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}