Cookie Consent by Free Privacy Policy Generator 📌 Data-Wiping Malware Dubbed AcidPour Strikes Linux x86 Systems

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Data-Wiping Malware Dubbed AcidPour Strikes Linux x86 Systems


💡 Newskategorie: Hacking
🔗 Quelle: blackhatethicalhacking.com

Data-Wiping Malware Dubbed AcidPour Strikes Linux x86 Systems




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A new variant of the data-wiping malware known as AcidRain has emerged, specifically tailored to target Linux x86 devices.

Dubbed AcidPour, this variant represents a notable evolution, compiled specifically for Linux x86 devices, as highlighted by Juan Andres Guerrero-Saade from SentinelOne in a series of posts on X.

Unlike its predecessor AcidRain, which initially surfaced during the Russo-Ukrainian war and targeted KA-SAT modems from U.S. satellite company Viasat, AcidPour employs a distinct codebase and focuses on Linux x86 architecture.

Originally an ELF binary compiled for MIPS architectures, AcidRain demonstrated capabilities in wiping filesystems and known storage device files across Linux distributions by recursively scanning common directories.

Attributed to Russia by the Five Eyes nations, along with Ukraine and the European Union, the cyber attack has now evolved with AcidPour, aiming to erase content from RAID arrays and Unsorted Block Image (UBI) file systems by targeting file paths like “/dev/dm-XX” and “/dev/ubiXX,” respectively.

Image

J. A. Guerrero-Saade – X post

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

While the specific targets of AcidPour remain unclear, SentinelOne has notified Ukrainian agencies, although the extent of the attacks is yet to be determined.

This discovery highlights once again the prevalent use of wiper malware to incapacitate targets, as threat actors continue to diversify their attack methods to maximize impact.

Director of Cybersecurity at the U.S. National Security Agency, Rob Joyce, issued a warning regarding AcidPour, labeling it as a more potent variant of AcidRain, with broader hardware and operating system coverage.

Simultaneously, the AhnLab Security Intelligence Center (ASEC) unveiled a concerning trend wherein threat actors are leveraging brute-force and dictionary attacks against inadequately secured Linux systems to establish backdoor accounts for persistent access.




...



📌 Rowhammer strikes networks, Bolton strikes security jobs, and Nigel Thornberry strikes Chrome, and more


📈 44.36 Punkte

📌 Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded 'AcidPour' Malware


📈 37.92 Punkte

📌 AcidPour Malware greift Te­le­kom­mu­ni­ka­ti­ons­netz in der Ukraine an


📈 37.92 Punkte

📌 malware researchers at flashpoint revealed that at least since 2016, a pos malware dubbed dmsniff has flown under the radar.


📈 28.67 Punkte

📌 Exclusive: MalwareMustDie analyzes a new IoT malware dubbed Linux/ AirDropBot


📈 26.55 Punkte

📌 Experts spotted a new stealthy Linux malware dubbed Shikitega


📈 26.55 Punkte

📌 IBM COBOL for Linux on x86 1.1 brings COBOL capabilities to the Linux on x86 environment


📈 24.71 Punkte

📌 #0daytoday #Linux/x86 - Polymorphic linux x86 Shellcode (92 Bytes) [shellcode #0day #Exploit]


📈 24.71 Punkte

📌 Linux Mint Debian Edition 4 to Be Dubbed "Debbie," New Linux Mint Logo Unveiled


📈 24.44 Punkte

📌 Experts discovered a new tiny Pos Malware dubbed Pinkkite


📈 24.06 Punkte

📌 Experts discovered a new tiny Pos Malware dubbed Pinkkite


📈 24.06 Punkte

📌 APT33 devised a code injection technique dubbed Early Bird to evade detection by anti-malware tools


📈 24.06 Punkte

📌 A new Mac malware dubbed Tarmac has been distributed via malvertising campaigns


📈 24.06 Punkte

📌 New malware dubbed Drovorub doing rounds say FBI and NSA


📈 24.06 Punkte

📌 Researchers uncovered a new Malware Builder dubbed APOMacroSploit


📈 24.06 Punkte

📌 New Malware Dubbed SessionManager Targeting Microsoft IIS Servers in the Wild


📈 24.06 Punkte

📌 17 Android Apps on Google Play Store, dubbed DawDropper, were serving banking malware


📈 24.06 Punkte

📌 Mystery Data Breach Dubbed 'db8151dd' Exposes Records of 22 Million People


📈 22.79 Punkte

📌 What it takes to run a 32-bit x86 program on a 64-bit x86 Linux system


📈 22.22 Punkte

📌 Linux Kernel up to 4.14.7 KVM arch/x86/kvm/x86.c memory corruption


📈 22.22 Punkte

📌 Linux Kernel up to 4.19.2 System Call arch/x86/kvm/x86.c vcpu_scan_ioapic denial of service


📈 22.22 Punkte

📌 CVE-2015-7513 | Linux Kernel 4.3 PIT Counter arch/x86/kvm/x86.c divide by zero (USN-2886-1 / BID-79901)


📈 22.22 Punkte

📌 HadesDbg - A Linux x86/x86-64 debugger to handle forking processes


📈 22.22 Punkte

📌 Linux Kernel 4.3 PIT Counter arch/x86/kvm/x86.c Denial of Service


📈 22.22 Punkte

📌 Linux Kernel 3.8.0/3.8.1/3.8.2/3.8.3/3.8.4 arch/x86/kvm/x86.c kvm_set_msr_common memory corruption


📈 22.22 Punkte

📌 Linux Kernel 4.3 PIT Counter arch/x86/kvm/x86.c Denial of Service


📈 22.22 Punkte

📌 Linux Kernel 3.8.0/3.8.1/3.8.2/3.8.3/3.8.4 arch/x86/kvm/x86.c kvm_set_msr_common resource management


📈 22.22 Punkte

📌 Linux Kernel bis 4.14.7 KVM arch/x86/kvm/x86.c Pufferüberlauf


📈 22.22 Punkte

📌 CVE-2023-1513 | Linux Kernel on 32-bit KVM arch/x86/kvm/x86.c kvm_vcpu_ioctl_x86_get_debugregs initialization


📈 22.22 Punkte

📌 CVE-2023-1637 | Linux Kernel on x86 Speculative Execution x86/power/cpu.c pm_cpu_check covert timing channel


📈 22.22 Punkte

📌 GNOME 3.26 Linux Desktop to Be Dubbed Manchester, After GUADEC 2017's Host City


📈 21.94 Punkte

📌 GNOME 3.26 Linux Desktop to Be Dubbed Manchester, After GUADEC 2017's Host City


📈 21.94 Punkte











matomo