Linux Ransomware – Notorious Cases and Ways to Protect

    Date 25 Jun 2020
    448
    Posted By Brittany Day
    LS Hmepg 337x500 32

    The ransomware plague has been the talk of the cybersecurity town since the emergence of CryptoLocker back in 2013 - and these attacks are increasingly targeting Linux users. Learn about some notorious Linux ransomware variants and get advice on how to secure your system against this growing threat.

    A combination of military-grade encryption and effective extortion mechanisms makes every ransomware attack potentially disastrous as the victim runs the risk of losing essential data down the line.

    Whereas the vast majority of ransom Trojans zero in on Windows PCs, some strains focus on devices running other operating systems instead. The Linux ecosystem is a steadily expanding battlefield in this regard. This might seem like a marginal tactic at first sight, but once you explore the wiki facet of the matter, the attackers’ logic starts making a whole lot of sense.

    Linux is widely deployed on servers that administer enterprise networks, massive databases, and web services. In plain words, these devices are juicy targets to take hostage. Their owners are mostly businesses or governmental institutions with sizeable budgets that can afford to pay for reverting to regular operation.

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"3","type":"x","order":"1","pct":37.5,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"4","type":"x","order":"2","pct":50,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]