S1167 AcidPour
AcidPour is a variant of AcidRain designed to impact a wider range of x86 architecture Linux devices. AcidPour is an x86 ELF binary that expands on the targeted devices and locations in AcidRain by including items such as Unsorted Block Image (UBI), Deice Mapper (DM), and various flash memory references. Based on this expanded targeting, AcidPour can impact a variety of device types including IoT, networking, and ICS embedded device types.2 AcidPour is a wiping payload associated with the Sandworm Team threat actor, and potentially linked to attacks against Ukrainian internet service providers (ISPs) in 2023.1
| Item | Value |
|---|---|
| ID | S1167 |
| Associated Names | |
| Type | MALWARE |
| Version | 1.0 |
| Created | 25 November 2024 |
| Last Modified | 17 April 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1485 | Data Destruction | AcidPour can perform an in-depth wipe of victim filesystems and attached storage devices through either data overwrite or calling various IOCTLS to erase them, similar to AcidRain.2 |
| enterprise | T1561 | Disk Wipe | - |
| enterprise | T1561.001 | Disk Content Wipe | AcidPour includes functionality to overwrite victim devices with the content of a buffer to wipe disk content.2 |
| enterprise | T1083 | File and Directory Discovery | AcidPour can identify specific files and directories within the Linux operating system corresponding with storage devices for follow-on wiping activity, similar to AcidRain.2 |
| enterprise | T1070 | Indicator Removal | - |
| enterprise | T1070.004 | File Deletion | AcidPour includes a self-delete function where the malware deletes itself from disk after execution and program load into memory.2 |
| enterprise | T1120 | Peripheral Device Discovery | AcidPour includes functionality to identify MMC and SD cards connected to the victim device.2 |
| enterprise | T1082 | System Information Discovery | AcidPour can identify various system locations and mapped devices on Linux systems as a precursor to wiping activity.2 |
| enterprise | T1529 | System Shutdown/Reboot | AcidPour includes functionality to reboot the victim system following wiping actions, similar to AcidRain.2 |
Groups That Use This Software
| ID | Name | References |
|---|---|---|
| G0034 | Sandworm Team | AcidPour is associated with Sandworm Team.2 |
References
-
CERT-UA. (2023, October 15). Peculiarities of destructive Sandworm cyber attacks against Ukrainian providers (CERT-UA#7627). Retrieved November 25, 2024. ↩
-
Juan Andrés Guerrero-Saade & Tom Hegel. (2024, March 21). AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine. Retrieved November 25, 2024. ↩↩↩↩↩↩↩↩↩