Linux Malware: The Truth About This Growing Threat [Updated] - How to Rapidly and Accurately Identify and Eliminate Linux Malware

    Date 09 Jun 2020
    2266
    Posted By Brittany Day

    Article Index

    How to Rapidly and Accurately Identify and Eliminate Linux Malware

    If malware does get downloaded on your system, being able to rapidly and accurately identify and eliminate it is critical to protecting yourself, your users and your files. Luckily, there are various effective open-source tools that can be used to detect and remove malware on your system. They include:

    • Linux Malware Detect: Linux Malware Detect is a malware scanner that can be used to detect malware in shared Linux environments. It utilizes threat data from network edge intrusion detection systems to identify and extract malware that is actively being used in attacks and generates signatures for detection. This tool also derives threat data from user submissions and community resources. 
    • The Rootkit Hunter & Check Rootkit: The Rootkit Hunter (Rkhunter) and Check Rootkit (chkrootkit) are tools that scan local systems, identifying any potentially malicious software such as malware and viruses that masks its existence on a system.
    • Volatility: Volatility is an open-source memory forensics framework for incident response and malware analysis.
    • Lynis: Lynis is a command-line application that scans a local or remote system to help an auditor identify potential security issues.
    • Kali Linux: Kali Linux is a Linux distribution used for penetration testing, ethical hacking and digital forensics. The included security penetration and management tools can be used for network discovery and other research purposes, as well as to identify potential vulnerabilities. Kali Linux includes many of the other tools mentioned here.
    • Cuckoo Sandbox is an excellent sandbox for malware analysis. This tool allows you to safely execute possible malware samples, and it provides a comprehensive report on the code executed.

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.