Researchers Uncovers Malware Behind Viasat Attack

April 1, 2022

Viasat officials have confirmed the report by SentinelOne researchers that the malware, known as “AcidRain,” was used in a cyberattack that crippled thousands of Viasat customers’ modems.

AcidRain, a modern malware attributed to Russian state threat actors was discovered under the name “ukrop” for one of AcidRain’s source binaries.

According to SentinelOne researchers Juan Andres Guerrero-Saade and Max van Amerongen, the malware is an executable file for MIPS, the hardware architecture for the modems used by Viasat customers.

The researchers also discovered similarities between AcidRain and a “dstr,” the name of a wiper module for VPNFilter.

On Wednesday, Viasat confirmed the researchers’ investigation. According to Viasat, the attackers gained unauthorized access to a trust management segment of the company’s KA SAT network.

The attackers gained access by exploiting a misconfigured VPN after which they expanded their reach to other segments.

“The attacker moved sideways through this trusted management network to a specific network segment used to manage and operate the network, and then used this network access to execute legitimate, targeted management commands on a large number of residential modems simultaneously,” Viasat explained.

For more information read the original story in ArsTechnica.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn