Malware

AcidBox, a malware that borrows Turla APT exploit, hit Russian organizations

New AcidBox Malware employed in targeted attacks leverages an exploit previously associated with the Russian-linked Turla APT group.

Palo Alto Networks researchers analyzed a new malware, dubbed AcidBox, that was employed in targeted attacks and that leverages an exploit previously associated with the Russian-linked Turla APT group.

The Turla APT group (aka SnakeUroburosWaterbugVenomous Bear and KRYPTON) has been active since at least 2007 targeting diplomatic and government organizations and private businesses in the Middle East, Asia, Europe, North and South America, and former Soviet bloc nations.

The list of previously known victims is long and includes also the Swiss defense firm RUAG, US Department of State, and the US Central Command.

The Turla group was the first APT that has abused a third-party device driver to disable the Windows  Driver Signature Enforcement (DSE) implemented to prevent the loading of unsigned drivers.

The exploit used by Turla, referred to as CVE-2008-3431, abuses two vulnerabilities, but only one was ever fixed in the aforementioned CVE.

The other vulnerability was chained by Turla operators with the CVE-2008-3431 flaw in the first version of their exploit.

A later second version of the exploit targets the unknown vulnerability only that is also being exploited by an unknown threat actor that appears to be unrelated to Turla. The vulnerability allows attackers to exploit newer versions of the VirtualBox VBoxDrv.sys driver as well.

“In February 2019, Unit 42 found that a yet-to-be-known threat actor — unbeknownst to the infosec community — discovered that the second unpatched vulnerability can not only exploit VirtualBox VBoxDrv.sys driver v1.6.2, but also all other versions up to v3.0.0. Furthermore, our research shows that this unknown actor exploited VirtualBox driver version 2.2.0 to target at least two different Russian organizations in 2017, which we are revealing for the first time.” reads the analysis published by Palo Alto Networks. “We anticipate this was done because the driver version 2.2.0 wasn’t known to be vulnerable and thus most likely is not on the radar of security companies being exploited.”

The previously unknown threat actor targeted at least two different Russian organizations in 2017 by exploiting version 2.2.0 of the driver. The hackers delivered a previously undetected malware family, tracked as AcidBox.

The researchers believe that the malware was employed only in targeted attacks because it hasn’t found other victims of the threat actors.

Experts believe that the AcidBox malware is part of a bigger toolset used by a sophisticated threat actor.

Experts believe the unknown threat actor is not tied to Turla, collaborating with other security firms, Palo Alto Network identified three user-mode samples of the malware (64-bit DLLs that load the main worker from the Windows registry), and a kernelmode payload drive.

The samples have a compilation timestamp of May 9, 2017, and were likely employed by attackers in attacks in 2017. The experts did not find newer AcidBox samples, they have no information about new operations conducted by the unknown threat actor.

“While AcidBox doesn’t use any fundamentally new methods, it breaks the myth that only VirtualBox VBoxDrv.sys 1.6.2 can be used for Turla’s exploit. Appending sensitive data as an overlay in icon resources, abusing the SSP interface for persistence and injection and payload storage in the Windows registry puts it into the category of interesting malware.” concludes the report.

“The samples we dubbed AcidBox are only part of a bigger toolkit which we, unfortunately, could not identify. However, we provide two Yara rules for detection and threat hunting. “

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Turla)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

4 hours ago

Pwn2Own Berlin 2025: total prize money reached $1,078,750

Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…

9 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 day ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

1 day ago