Linux Malware: The Truth About This Growing Threat [Updated] - The Modern Linux Threat Landscape in a Nutshell

    Date 09 Jun 2020
    Posted By Brittany Day

    Article Index

    The Modern Linux Threat Landscape in a Nutshell

    Unfortunately, despite the heralded security of the Linux operating system, gone are the days where threats such as malware and viruses are not a serious concern for Linux users. Attackers have come to view Linux servers as yet another viable target that often provides a valuable return on investment. In March of 2018, 15,762 new Linux malware variants were developed - a notable increase from the 4,706 new variants developed in March of 2017.

    The evolution of malware research in recent years has offered superior visibility into attacks threatening Linux servers. It should be noted that a vulnerable server of any sort is an open door for data and credential theft, DDoS attacks, cryptocurrency mining and web traffic redirection. Most significantly, it can be used to host malicious command and control (C&C) servers.

    Just over a year ago, bringing to conclusion a collaborative three-year effort, security researchers identified various OpenSSH backdoors - including the notorious Linux/Ebury backdoor - which could be used to compromise servers with dangerous malware. Simultaneously, ESET researchers exposed 21 Linux-based malware families, 12 of which were previously undocumented. In a sense, these findings confirmed an evolving, increasingly dangerous array of threats facing Linux users and their systems.

    Csm AV TEST  Development New Malware Linux 4c33b4be92

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.