December 29, 2015 By Larry Loeb 2 min read

The Raspberry Pi Foundation revealed on Twitter that on Dec. 23, it had been offered — seemingly seriously — money to include a malware .exe file as part of the system it provides users. The offer was from an obviously non-English speaker named Linda, whose suspicious request was riddled with poor grammar.

About Raspberry Pi

Raspberry Pi was developed as a simple computer that offers multiple basic functions. It can be used as part of more complex projects because of its ability to be programmed. The device currently retails for under $35 and has already seen significant adoption, having sold over 4 million units worldwide.

The nefarious email — which was addressed to Liz Upton, the foundation’s director of communications — said that the .exe file would create a desktop shortcut that allowed users to automatically log in to a website once they clicked on it. Additionally, Upton was asked to provide a “favorable and kind quotation about PPI (price per install).”

Who Wants a Piece of the Pi?

What is really surprising about all this to Pi users is that the Pi usually runs the Linux OS, notably the ARM GNU/Linux distributions and the Snappy Ubuntu Core. The newest and most powerful version of the device is capable of using Windows 10, but Linux is the primary system, SecurityWeek reported.

The .exe designation for the malware file suggested means that it requires Windows to be run. Such a file wouldn’t execute under Linux, so why Linda would even consider Raspberry Pi as a way to effectively distribute the file is puzzling and seems rather unsophisticated.

The solicitor may have been thinking that the more powerful Pi devices would end up being used in the future with Windows, hence why the file’s shortcut would be included as well.

Foiling the Malware Plan

The Raspberry Pi Foundation did not reveal the name of the organization that approached them but did call them “evildoers.” SecurityWeek noted that some of the people commenting on the foundation’s tweet suggested that the website the email was referring to might be jogotempo.com. One user said the style of the email was very similar to other attempts received from the site in the past.

In any case, users can rest assured the foundation will not be accepting the money nor distributing the file.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today