Article Details

Original Article Text

Click to Toggle View

New AcidPour data wiper targets Linux x86 network devices. A new destructive malware named AcidPour was spotted in the wild, featuring data-wiper functionality and targeting Linux x86 IoT and networking devices. Data wipers are a category of malware designed for destructive attacks that delete files and data on targeted devices. This type of malware is commonly used to disrupt an organization's operations for political reasons or as a distraction from a larger attack. The new malware spotted by SentinelLabs' security researcher Tom Hegel, AcidPour, is considered a variant of the AcidRain data wiper.  AcidRain is a data wiper malware designed to brute-force and erase files on routers and modems. The malware was utilized in a cyberattack against satellite communications provider Viasat, which impacted service availability across Ukraine and Europe. AcidPour was uploaded from Ukraine on March 16, 2024, which complicates tracing its operators, as AcidRain was used against the country in the past. A thread on X by Juan Andrés Guerrero Saade provides some details about the new variant, though it is unknown whether it has been used in any attacks in the wild and who its targets might have been. The AcidPour wiper AcidPour shares many similarities with AcidRain, such as targeting specific directories and device paths common in embedded Linux distributions, but their codebase overlaps by an estimated 30%. This indicates either significant evolution or possibly a different origin. Guerrero Saade says it's not unlikely that a different group of attackers replicated some of AcidRain's functionality. AcidPour shares input/output control (IOCTL)-based wiping logic with VPNFilter's 'dstr' plugin and AcidRain, indicating a continuation or adaptation of the previously documented malicious techniques.  The new malware includes references to '/dev/ubiXX' indicating a focus on embedded systems using flash memory. There is also a reference to and '/dev/dm-XX', which are virtual block devices associated with Logical Volume Management (LVM), respectively. Network Attached Storage devices, including QNAP and Synology, utilize LVM to manage RAID arrays. These additions suggest that AcidPour might target a broader range of devices or systems than its predecessor, which targeted the more specific MIPS architecture. The SentinelLabs analyst publicly shared the malware's hash and called on the security research community to participate in collaborative analysis and verification, as the targets and distribution volume are currently unknown. A sample can be found on VirusTotal. These additions suggest that AcidPour might target a broader range of devices or systems than its predecessor, which targeted the more specific MIPS architecture. "This is a threat to watch. My concern is elevated because this variant is a more powerful AcidRain variant, covering more hardware and operating system types," warned Rob Joyce, the NSA's Director of Cybersecurity.

Daily Brief Summary

MALWARE // AcidPour Data Wiper Targets Linux IoT and Network Devices

A new data wiper malware, AcidPour, has been discovered targeting Linux x86 IoT and networking devices.

AcidPour is a variant of the AcidRain malware and shares about 30% code overlap.

SentinelLabs' researcher Tom Hegel identified AcidPour, which was uploaded from Ukraine on March 16, 2024.

The wiper malware targets specific directories and device paths of embedded Linux systems and has improved its targeting to include devices with flash memory and virtual block devices used in LVM.

There is evidence that the malware has functionalities or adaptation techniques similar to the VPNFilter malware's 'dstr' plugin.

AcidPour’s targets and distribution volume are unknown; SentinelLabs shared the malware's hash for collaborative analysis within the security research community.

NSA's Director of Cybersecurity, Rob Joyce, expressed heightened concern due to AcidPour's potential for wider hardware and system impact compared to AcidRain.