HolesWarm Malware Exploits Unpatched Windows, Linux Servers
The HolesWarm botnet cryptominer has already compromised 1,000-plus clouds since June.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
The HolesWarm botnet cryptominer has already compromised 1,000-plus clouds since June.
The BlackMatter gang has joined the ranks of ransomware operations to develop a Linux encryptor that targets VMware's ESXi virtual machine platform. As more businesses move to this type of platform for their servers, we expect to continue to see ransomware developers focus primarily on Windows machines - but also create a dedicated Linux encryptor targeting ESXi.
The Uptycs Threat Research team outlines how malicious Linux shell scripts are used to cloak attacks and how defenders can detect these threats and mitigate their risk of suffering an attack.
Hackers are turning coding languages such as Go, Rust, Nim and DLang into next-gen malware targeting Linux and Windows systems, enabling them to avoid signature detection and add layers of obfuscation.
The infamous cross-platform LemonDuck crypto-mining malware has continued to refine and improve upon its techniques to strike both Linux and Windows OSes by setting its sights on older vulnerabilities, while simultaneously latching on to a variety of spreading mechanisms to maximize the effectiveness of its campaigns.
The ransomware gang behind the notorious attack on CD Projekt Red is now using a Linux variant that targets VMware's ESXi virtual machine platform for maximum damage.
Learn about common defense evasion techniques used in malicious shell scripts and how Uptycs detects them.