Security News > 2020 > June > Mysterious 'AcidBox' Malware Used Turla Exploit to Target Russian Organizations

Mysterious 'AcidBox' Malware Used Turla Exploit to Target Russian Organizations
2020-06-19 11:18

Targeted attacks delivering a new piece of malware leveraged an exploit previously associated with the Russian-linked Turla hacking group, Palo Alto Networks reveals.

Believed to be operating on behalf of the Russian Federal Security Service and also known as Waterbug, Venomous Bear and KRYPTON, Turla was the first threat actor known to have abused a third-party device driver to disable Driver Signature Enforcement, a security feature introduced in Windows Vista to prevent the loading of unsigned drivers.

The adversary targeted at least two different Russian organizations in 2017 by exploiting version 2.2.0 of the driver, likely because this iteration wasn't known to be vulnerable.

The attackers deployed a previously unknown malware family, which the researchers named AcidBox.

A complex piece of malware part of a bigger toolset, AcidBox is likely associated with an advanced threat actor and might still be in use today, provided that the attacker is still active.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/9CV289vYiGA/mysterious-acidbox-malware-used-turla-exploit-target-russian-organizations