Linux Malware: The Truth About This Growing Threat [Updated] - Tips and Tools for Defending Linux Servers Against Malware

    Date 09 Jun 2020
    2255
    Posted By Brittany Day

    Article Index

    Tips and Tools for Defending Linux Servers Against Malware:

    With attacks targeting Linux servers becoming increasingly common and dangerous, defending against malware and other advanced threats is more critical than ever in maintaining a secure Linux system. Some tips and best practices for securing Linux servers include:

    • Double check all cloud configurations - user misconfiguration and lack of visibility are the top causes of attacks in the cloud.
    • Ensure that remote access portals are properly secured - many network-level attacks where criminals need root or admin powers are made possible because attackers find their way in through a legitimate, insecure remote access portal.
    • Create a complete inventory of all devices connected to a network, and update all security software used on these devices frequently.
    • Make sure that all external-facing services are fully patched. Be aware that firewall security is not a substitute for an organization’s own cloud security measures.
    • Set special rules in your firewall to block control packets specific to Cloud Snooper.
    • Enable multi-factor authentication on all security dashboards or control panels used internally to prevent threat actors from disabling security software in the case of an attack.
    • Review system logs regularly. It’s rare that threat actors are able to take over servers without leaving some trace of their actions – such as log entries showing unexpected or unauthorized kernel drivers being activated. Keep in mind, however, that criminals who already have root powers can tamper with your logging configuration and the logs themselves, making it more difficult to spot malicious activity.
    • Remember that a comprehensive, defense-in-depth approach to security is essential in protecting your system from modern, advanced exploits.

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.