December 29, 2015 By Larry Loeb 2 min read

The Raspberry Pi Foundation revealed on Twitter that on Dec. 23, it had been offered — seemingly seriously — money to include a malware .exe file as part of the system it provides users. The offer was from an obviously non-English speaker named Linda, whose suspicious request was riddled with poor grammar.

About Raspberry Pi

Raspberry Pi was developed as a simple computer that offers multiple basic functions. It can be used as part of more complex projects because of its ability to be programmed. The device currently retails for under $35 and has already seen significant adoption, having sold over 4 million units worldwide.

The nefarious email — which was addressed to Liz Upton, the foundation’s director of communications — said that the .exe file would create a desktop shortcut that allowed users to automatically log in to a website once they clicked on it. Additionally, Upton was asked to provide a “favorable and kind quotation about PPI (price per install).”

Who Wants a Piece of the Pi?

What is really surprising about all this to Pi users is that the Pi usually runs the Linux OS, notably the ARM GNU/Linux distributions and the Snappy Ubuntu Core. The newest and most powerful version of the device is capable of using Windows 10, but Linux is the primary system, SecurityWeek reported.

The .exe designation for the malware file suggested means that it requires Windows to be run. Such a file wouldn’t execute under Linux, so why Linda would even consider Raspberry Pi as a way to effectively distribute the file is puzzling and seems rather unsophisticated.

The solicitor may have been thinking that the more powerful Pi devices would end up being used in the future with Windows, hence why the file’s shortcut would be included as well.

Foiling the Malware Plan

The Raspberry Pi Foundation did not reveal the name of the organization that approached them but did call them “evildoers.” SecurityWeek noted that some of the people commenting on the foundation’s tweet suggested that the website the email was referring to might be jogotempo.com. One user said the style of the email was very similar to other attempts received from the site in the past.

In any case, users can rest assured the foundation will not be accepting the money nor distributing the file.

More from

Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

3 min read - Rhode Island is grappling with the fallout of a significant ransomware attack that has compromised the personal information of hundreds of thousands of residents enrolled in the state’s health and social services programs. Officials confirmed the attack on the RIBridges system—the state’s central platform for benefits like Medicaid and SNAP—after hackers infiltrated the system on December 5, planting malicious software and threatening to release sensitive data unless a ransom is paid.Governor Dan McKee, addressing the media, called the attack “alarming”…

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today