32.Lock Code Circular

The ransomware plague has been the talk of the cybersecurity town since the emergence of CryptoLocker back in 2013 - and these attacks are increasingly targeting Linux users. Learn about some notorious Linux ransomware variants and get advice on how to secure your system against this growing threat.

A combination of military-grade encryption and effective extortion mechanisms makes every ransomware attack potentially disastrous as the victim runs the risk of losing essential data down the line.

Whereas the vast majority of ransom Trojans zero in on Windows PCs, some strains focus on devices running other operating systems instead. The Linux ecosystem is a steadily expanding battlefield in this regard. This might seem like a marginal tactic at first sight, but once you explore the wiki facet of the matter, the attackers’ logic starts making a whole lot of sense.

Linux is widely deployed on servers that administer enterprise networks, massive databases, and web services. In plain words, these devices are juicy targets to take hostage. Their owners are mostly businesses or governmental institutions with sizeable budgets that can afford to pay for reverting to regular operation.