🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>Analysis of AcidRain Malware Variant "AcidPour" and Its Impact on Ukraine</p><p><strong>Date</strong>: 19 March 2022<br><strong>CVE</strong>: Not specified <br><strong>Sources</strong>: <a href="https://www.hackread.com/acidrain-linux-malware-variant-acidpour-ukraine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackread.com/acidrain-linux-ma</span><span class="invisible">lware-variant-acidpour-ukraine/</span></a></p><p><strong>Issue Summary</strong></p><p>AcidRain, a destructive wiper malware, has been identified as a potential threat linked to the cyberattack on Viasat's KA-SAT satellite broadband service. This malware targets modems and routers, specifically designed to erase their storage contents, rendering the devices inoperable. The attack on Viasat disrupted communications across Ukraine and Europe, marking a significant cyber incident amidst the ongoing conflict between Russia and Ukraine.</p><p><strong>Technical Key findings</strong></p><p>AcidRain works by recursively deleting files and then attempting to destroy data on various storage devices, such as flash memory and SD/MMC cards, by overwriting them with up to 0x40000 bytes of data or using specific IOCTLS for erasure. This approach suggests a brute-force method, possibly indicating the attackers' desire for the tool to remain generic and reusable across different firmware. SentinelOne researchers found developmental and code overlaps with the VPNFilter malware, hinting at a connection to known Russian APT groups.</p><p><strong>Vulnerable products</strong></p><p>The attack mainly targeted satellite modems connected to the KA-SAT network, affecting thousands of modems across Europe. However, the malware's generic design suggests that it could potentially impact a wide range of routers and IoT devices with similar storage systems.</p><p><strong>Impact assessment</strong></p><p>The primary impact is the rendering of targeted modems and routers unusable, causing significant disruptions in satellite communications. This not only affects individual users but also has broader implications for organizations relying on satellite networks for their operations, including remote access to infrastructure and communications across Europe.</p><p><strong>Patches or workaround</strong></p><p>Specific patches or workarounds for AcidRain were not detailed in the sources. However, the fundamental mitigation involves securing network devices against unauthorized access and ensuring firmware is up to date to reduce vulnerabilities that could be exploited by similar malware.</p><p><strong>Tags</strong></p><p><a href="https://infosec.exchange/tags/AcidRain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AcidRain</span></a>, <a href="https://infosec.exchange/tags/AcidPour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AcidPour</span></a>, <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>, <a href="https://infosec.exchange/tags/ViasatAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ViasatAttack</span></a>, <a href="https://infosec.exchange/tags/VPNFilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPNFilter</span></a>, <a href="https://infosec.exchange/tags/WiperMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiperMalware</span></a>, <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a>, <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a>, <a href="https://infosec.exchange/tags/ModemWiper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ModemWiper</span></a></p>