Fact-checked by Grok 2 weeks ago

Linux malware

Linux malware refers to malicious software designed to infect, disrupt, or compromise operating systems and their derivatives, exploiting vulnerabilities to achieve unauthorized access, data theft, or system control. While less prevalent than on other operating systems like Windows, these threats target the open-source nature of Linux, which powers about 66% of web servers, a significant portion of public cloud workloads, nearly 100% of supercomputers, and a dominant share of embedded devices, making it a prime vector for cyberattacks despite its reputation for enhanced security features. The evolution of malware has accelerated with the proliferation of Internet-connected devices and cloud infrastructure, transitioning from sporadic incidents to sophisticated campaigns by advanced persistent threats (APTs) and cybercriminals. Early concerns emerged around 2015 as a growing issue amid rising embedded device adoption, but by 2023, attack attempts on systems increased by 62% compared to 2022, driven by exploits like (CVE-2021-44228). In 2025, encounters with exploits more than doubled year-over-year, with over 4,000 (CVEs) detected monthly, highlighting a surge in critical OS and third-party application exploits used for initial access and . Key types of Linux malware include , cryptominers, rootkits, backdoors, and web shells. In environments, ELF-based binaries targeting theft and data wiping have seen active development, with a 388% rise in related alerts in 2024. These threats often employ evasion techniques to bypass traditional defenses, underscoring the need for ongoing vigilance in Linux ecosystems. While Linux's modular and tools like SELinux provide robust mitigation options, the diversity of architectures and static linking in malware samples complicate detection efforts.

Introduction

Definition and Scope

Linux malware encompasses any malicious software engineered to infiltrate, disrupt, or exploit Linux-based operating systems, including self-replicating programs such as and non-replicating threats like backdoors that target the , major distributions such as and , or embedded systems in resource-constrained environments. This definition highlights the adaptability of such threats to Linux's open-source architecture, where malware often leverages permissive file permissions, scripting languages like , or system calls to achieve unauthorized access or control. The scope of Linux malware spans diverse computing ecosystems, from traditional installations to high-stakes deployments, cloud platforms like AWS EC2, container orchestration systems such as and , and devices powering smart infrastructure. Distinctions exist between user-space attacks, which operate within applications and processes to steal or activity, and kernel-space exploits that directly manipulate operating system functions for elevated privileges and stealth. As of 2025, holds approximately 3% of the global , reflecting its niche but growing presence among individual users and developers, yet it powers over 78% of web-facing servers and exceeds 80% of cloud instances on platforms like AWS EC2, rendering it a for cybercriminals seeking widespread enterprise disruption, , or operations. Key persistence techniques unique to Linux environments involve exploiting the init system—prevalent in most modern distributions—for creating rogue services or timers that restart malicious processes post-reboot, or injecting loadable modules (LKMs) to embed code directly into the for low-level evasion and longevity. These mechanisms underscore Linux malware's emphasis on system integration over superficial infection, amplifying risks in interconnected, always-on infrastructures.

History and Evolution

The first known Linux virus, Bliss, appeared in 1997 and attempted to infect executable files on Linux systems, but its impact was minimal owing to the open-source community's vigilant scrutiny and Linux's limited adoption on desktops at the time. Early threats like this demonstrated proof-of-concept potential rather than widespread proliferation, as Linux's architecture and user permissions hindered easy propagation. In the 2000s, Linux malware evolved toward server-focused exploits, exemplified by the Slapper worm in 2002, which leveraged vulnerabilities in web servers and libraries to create backdoors and propagate across systems. This period highlighted a strategic shift as gained prominence in web hosting and enterprise infrastructure, drawing attackers to high-value targets like internet-facing servers rather than individual users. The brought a rise in sophisticated, targeted attacks on , influenced by state-sponsored operations akin to Stuxnet's focus on industrial control systems, with APT groups deploying specialized tools such as Turla's Penguin backdoor in 2014 for espionage and the Equation group's DOUBLEFANTASY implant in 2015 against government and . Cross-platform threats also proliferated, enabling to exploit servers as pivots into Windows-dominated networks, underscoring Linux's role in hybrid environments. Post-2020, Linux malware surged amid accelerated migrations, which amplified 's dominance in virtualized and containerized deployments, exposing more systems to remote exploits. incidents exemplified this trend, with reporting a 62% increase in Linux-targeted attacks from the first half of 2022 to 2023, often via misconfigurations in services like AWS and . In 2025, encounters with Linux exploits more than doubled year-over-year, with over 4,000 (CVEs) detected monthly, highlighting a continued surge in critical OS and third-party application exploits. Key evolutionary drivers include Linux's open-source model, which facilitates rapid vulnerability patching through global collaboration, often containing threats before they escalate. Conversely, the ecosystem's diverse distributions—ranging from to —hinder standardized defenses, as security tools and updates must adapt to varying package managers and configurations, complicating enterprise-wide protection.

Types of Malware

Viruses and Worms

Viruses in the Linux ecosystem are self-replicating malicious programs that attach themselves to legitimate executable files, typically (Executable and Linkable Format) binaries, to spread when the host files are executed. Unlike traditional viruses on other platforms, Linux viruses must navigate the system's permissions and multi-user environment, often targeting user-accessible files or exploiting weak configurations to infect executables via entry points such as appending code or modifying the binary structure. The mechanics involve scanning for uninfected files, injecting viral code that executes the original program while propagating the virus to other files, though many early examples were rudimentary and self-limiting due to their destructive nature. A seminal example is the Bliss virus, discovered in 1997 and considered the first real-world Linux virus. Released around mid-1996, Bliss infects ELF executables by overwriting their content with its 17,892 bytes of code, rendering the host programs non-functional and thus hindering widespread propagation. It spreads primarily through software exchanges among Linux users, often via administrative accounts, and demonstrates early attempts at Linux-specific infection by targeting the ELF format prevalent in Linux distributions at the time. While not highly contagious, Bliss highlighted vulnerabilities in file sharing practices and prompted antivirus vendors like McAfee to add detection signatures by February 1997. Worms, in contrast, operate as standalone entities without needing to attach to files, propagating autonomously across networks by exploiting vulnerabilities in services and self-replicating to remote systems. On , worm mechanics typically include automated scanning for open ports, such as port 22 for SSH, followed by exploitation of buffer overflows or weak to gain access, copy the worm , and execute it remotely. Propagation may leverage scheduled tasks like jobs for periodic scanning or persistence, or target kernel vulnerabilities for elevated privileges, allowing the worm to spread rapidly in interconnected environments like servers. These traits exploit 's common deployment as networked servers with exposed services, differing from file-based viruses by emphasizing network autonomy over attachment. An early influential worm with relevance to Unix-like systems, including precursors to modern , is the from 1988, which scanned networks for vulnerable hosts using exploits in services like fingerd and , leading to self-replication across approximately 6,000 machines—about 10% of the at the time—and causing denial-of-service through resource exhaustion. For specifically, the Lion worm in 2001 exemplifies network propagation by scanning TCP port 53 for vulnerable DNS servers, exploiting a remote to install a backdoor on port 27374 and a , thereby enabling password theft and further spread. Such worms often resulted in minor denial-of-service effects in the and early due to limited scale, but modern variants have evolved to facilitate recruitment by coordinating infected devices for larger attacks.

Trojans and Rootkits

Trojans in the ecosystem are malicious programs that masquerade as legitimate software to deceive users or administrators into installing them, often granting attackers unauthorized access. These threats commonly exploit trust in package management systems, appearing as innocuous updates or utilities. For instance, backdoored RPM or DEB packages can be distributed through compromised repositories or third-party sources, embedding hidden payloads that establish upon . A prominent example is the supply chain compromise, where versions 5.6.0 and 5.6.1 of the data compression library contained malicious code inserted upstream, potentially allowing remote code execution via SSH connections on affected distributions. Similarly, a backdoored version of the software targeted users for over three years, stealing sensitive information like passwords through a stealthy infostealer. Rootkits represent a class of stealthy focused on and concealment, enabling sustained unauthorized control by hiding their presence and activities from detection tools. In environments, rootkits achieve this through modifications at the or level, often leveraging system-specific features for persistence and evasion. User-mode rootkits, such as those employing LD_PRELOAD , intercept functions like open() or read() by preloading malicious shared objects, allowing them to filter outputs from utilities like or without altering the . In contrast, kernel-mode rootkits inject code via loadable kernel modules (LKMs), directly altering core structures for deeper concealment. Key mechanics of rootkits include hiding processes and files by manipulating the /proc filesystem—such as altering directory entries in /proc to exclude malicious PIDs—or the syscall table to divert calls like sys_getdents and sys_readdir, preventing of attacker artifacts. Persistence is maintained through boot-time mechanisms, including modifications to /etc/init.d scripts that reload the on startup or patching the image (vmlinuz) on disk to embed malicious across reboots. A unique aspect of rootkits is their exploitation of (SUID) binaries, which run with elevated privileges; attackers can abuse misconfigured SUID programs to escalate to root access, injecting components that then conceal further exploits. Historically, the Adore rootkit, released in as one of the first LKM-based kernel s for , exemplifies these techniques by 15 system calls to hide files, processes, and connections while supporting VFS layer redirection for enhanced stealth. Adore and its successor Adore-NG demonstrate early innovations in self-hiding modules and log filtering, influencing later rootkit designs. Rootkits like these are occasionally integrated into botnets for coordinated attacks, though their primary role remains individual system compromise.

Ransomware and Botnets

Ransomware on Linux systems typically operates by encrypting critical filesystems, such as , rendering data inaccessible until a is paid in . These attacks exploit the prevalence of in server environments, where attackers gain initial access through vulnerabilities or misconfigurations before deploying encryption payloads. A notable example is the RansomEXX variant from 2020, an executable designed specifically for Linux-based operating systems, which encrypts user files and appends ransom notes demanding payment. This strain, also known as Netwalker in some contexts, shares code similarities with earlier ransomware like Defray777, which targeted hypervisors by shutting down virtual machines and encrypting VMFS datastores. Linux ransomware has adapted to modern infrastructures, particularly by exploiting container escapes in environments like to propagate beyond isolated pods and encrypt host-level data. Attackers leverage kernel vulnerabilities, such as CVE-2022-0185, to break out of containers and access the underlying host, enabling widespread encryption across clustered systems. Ransomware activity has surged in 2025, with overall incidents rising 36% in the third quarter compared to the previous year, driven by attacks on and virtualized environments. Botnets on Linux consist of networks of compromised devices, often servers or IoT endpoints, coordinated by command-and-control (C2) servers to perform distributed denial-of-service (DDoS) attacks or cryptocurrency mining. These structures typically use protocols like IRC or HTTP for communication, allowing operators to issue commands remotely while evading detection through dynamic C2 infrastructure. Variants of the Mirai botnet, originally a worm-like malware, have evolved to target Linux-based IoT devices, propagating via weak credentials and exploits to amass large-scale bot armies for DDoS operations. Linux botnets frequently employ SSH for propagation, stealing private keys from compromised hosts to access additional systems without brute-force attempts, thereby maintaining stealth. Examples include Mirai derivatives that scan for vulnerable SSH services on and server ports, using harvested keys to join devices to the . SSH brute-force operations within these botnets scan millions of IP addresses daily, generating up to 57 million attack attempts per day across global networks. This scale underscores their economic motivations, with bot herders monetizing through DDoS-for-hire services or mining operations that leverage the computational power of infected devices.

Infection Vectors

Software Vulnerabilities

Software vulnerabilities in systems, particularly those in the and critical applications, provide with entry points for initial access or . Kernel-level flaws, often involving memory corruption such as overflows or use-after-free errors in modules, enable attackers to gain elevated privileges once local access is obtained. For instance, CVE-2024-1086 is a use-after-free in the 's netfilter: nf_tables component that permits local by exploiting improper memory handling during table operations. Similar techniques to the earlier (CVE-2016-5195), which involved race conditions in mechanisms, have been adapted in modern exploits to achieve remote code execution (RCE) through manipulation, allowing to bypass security boundaries. The (CVE-2022-0847), a flaw enabling arbitrary read/write access to pages, exemplifies how handling errors can lead to for payloads. Application-level weaknesses further compound these risks, especially in widely deployed services like . Unpatched instances of are prime targets due to their remote access nature; the regreSSHion vulnerability (CVE-2024-6387) introduces a signal handler in the sshd server on glibc-based systems, enabling unauthenticated RCE with privileges before completes. This flaw, affecting versions from 8.5p1 to 9.7p1, stems from a of a 2006 issue and allows attackers to inject and execute arbitrary code remotely, facilitating malware deployment without user interaction. In 2025, the (CISA) Known Exploited Vulnerabilities (KEV) catalog underscores the persistence of these threats, listing seven exploited vulnerabilities actively targeted by adversaries, including the aforementioned use-after-free in netfilter. Other entries involve race conditions and memory errors, such as CVE-2025-38352, a (TOCTOU) issue in posix-cpu-timers that enables . These cataloged flaws highlight how kernel bugs remain operational risks, with exploitation observed in and advanced persistent threats. Mitigation challenges arise from the heterogeneous Linux ecosystem, where diverse distribution patching cycles create windows of exposure. (RHEL) follows a structured, model with patches backported to stable releases over 10 years, prioritizing enterprise stability. In contrast, emphasizes a conservative release cycle, with major versions every two years and extended security support for older stables, but updates can lag due to rigorous testing. This variability—RHEL's controlled enterprise patching versus 's community-driven approach—often results in prolonged vulnerability exposure across mixed environments, as not all users apply patches promptly, amplifying opportunities. Buffer overruns in web server contexts, such as those in or modules, can also serve as gateways for but are typically chained with network delivery methods.

Social Engineering Attacks

Social engineering attacks represent a significant threat to systems by exploiting user trust and behavior rather than technical flaws, often leading to installation or credential compromise. These methods are increasingly prevalent in Linux environments, where users, particularly system administrators, manage like servers and cloud instances. Attackers craft scenarios that mimic legitimate interactions, such as urgent notifications or trusted software distributions, to bypass the platform's robust features. According to cybersecurity analyses, social engineering accounts for a growing portion of Linux infections due to the human element's vulnerability across operating systems. Phishing variants tailored to users frequently involve lures containing malicious attachments disguised as distribution-specific packages, such as .deb files for Debian-based systems or .rpm for derivatives. These attachments pose as essential updates or utilities from official repositories, exploiting users' reliance on package managers like apt or yum. For instance, in 2025, campaigns delivered through archives with injected filenames that evaded detection, installing the VShell backdoor for remote access. Similarly, APT36, a threat group, used spear- s in July 2025 to target BOSS deployments in Indian defense sectors, tricking users into executing payloads that enabled persistence. Fake update prompts, often distributed via compromised lists or forums, further amplify this vector by simulating official distro alerts. Supply chain social tactics focus on deceiving developers and maintainers to introduce tainted code into legitimate packages, leveraging the open-source nature of ecosystems. Attackers build long-term relationships to compromise credentials, allowing backdoor insertion in upstream repositories. A prominent case is the 2024 XZ Utils incident, where a spent over two years cultivating trust with the sole maintainer through contributions and communication, ultimately gaining commit rights to embed a backdoor in versions 5.6.0 and 5.6.1 of the liblzma library. This near-successful compromise could have affected millions of distributions, underscoring the risks of social influence in supply chains akin to those seen in Python's PyPI but adapted for tools. The OpenSSF highlighted this as a classic social engineering takeover, prompting alerts on maintainer and project security. Targeting user profiles, especially sysadmins, spear-phishing campaigns aim to steal SSH keys, granting attackers seamless, passwordless entry to remote servers. These attacks personalize lures based on professional roles, such as alerts about package vulnerabilities or server migrations requiring credential verification. By creating urgency—e.g., claims of imminent downtime or compliance issues—phishers prompt victims to upload keys to fake portals or run scripts that exfiltrate them. While direct Linux-specific examples are documented in broader credential theft reports, frameworks note SSH key modification as a persistence technique often initiated via such phishing, prevalent in enterprise Linux setups. The effectiveness of social in Linux malware dissemination stems from psychological tactics like urgency and authority impersonation, such as "immediate security patch required" messages that pressure quick action without verification. Trend Micro's Linux Threat Landscape Report identifies as a key deception method, contributing to a 62% rise in detected attempts linked to social engineering from Q1 2022 to 2023. Such trends emphasize the need for user training, as these attacks exploit trust in Linux's perceived .

Web and Script-Based Threats

Web and script-based threats represent a significant for Linux malware, particularly given the operating system's prevalence in environments, where and power over 60% of the world's websites. These attacks leverage the web's accessibility to deliver malicious payloads without requiring direct user interaction beyond normal browsing or server operations. Malicious code, often in or , is injected into legitimate sites, exploiting vulnerabilities in browsers or server configurations to establish footholds on systems. Drive-by downloads occur when users visit compromised websites, triggering automatic execution of malicious or code that exploits outdated browser plugins, such as vulnerable versions of on distributions. For instance, attackers inject scripts into web pages that exploit browser rendering engines or extensions, silently downloading payloads like cryptocurrency miners without user consent. These attacks have been documented in campaigns targeting users via SEO-optimized malicious sites, where redirects to exploit kits that probe for unpatched vulnerabilities in browser components. Script-based malware, commonly written in or , provides an initial foothold on systems by executing lightweight, evasive code for tasks like resource hijacking. A notable example is PyCryptoMiner, a botnet that spreads via SSH to vulnerable JBoss servers on , deploying base64-encoded scripts to mine cryptocurrency and establishing persistence through jobs that run every six hours. Similarly, malicious PyPI packages such as modularseven-1.0, driftme-1.0, and catme-1.0 target developers, fetching remote scripts to download and execute coin miners, modifying ~/.bashrc for persistence and causing significant performance degradation. These scripts often use jobs to schedule mining operations, blending into legitimate system processes to avoid detection. Web shells, such as the PHP-based C99.php, serve as persistent backdoors on compromised web servers, allowing remote command execution through HTTP requests. Uploaded via file inclusion vulnerabilities, C99.php provides attackers with a interface for file management, database access, and commands, often evading initial scans due to its small footprint and techniques like encoding. In environments, these shells are commonly placed in web roots like /var/www/html, enabling attackers to pivot to deeper system compromises. Attacks on Linux web servers frequently target configurations in Apache and Nginx, including exploits of .htaccess files to override security directives and enable malicious script execution. For example, misconfigured .htaccess in Apache allows attackers to inject PHP code into non-executable directories, bypassing restrictions and facilitating backdoor installation on Linux-hosted sites. In 2025, such vulnerabilities in Apache HTTP Server 2.4.x, including improper handling of HTTP/2 requests, have been actively exploited to deliver script payloads, with nine new CVEs reported emphasizing the need for timely patching. Nginx, lacking native .htaccess support, faces analogous risks through misconfigured location blocks that permit arbitrary script uploads. Emerging trends highlight the rise of fileless scripts on , which operate entirely in memory to evade antivirus detection by avoiding disk writes. VShell, a fileless backdoor delivered via attachments with crafted filenames triggering execution, downloads and runs ELF binaries in-memory on systems, supporting multiple architectures like x86 and ARM for broad targeting. Similarly, perfctl, a multipurpose dropper discovered in 2024, has infected millions of servers by injecting scripts into running processes, using process hollowing to mask operations and propagate via network shares. These techniques exploit 's scripting flexibility, with attackers leveraging tools like for in-memory persistence, underscoring the shift toward detection-resistant threats. Propagation through cross-site scripting (XSS) amplifies these threats by enabling on -hosted web applications, where injected steals authentication tokens for further infections. In reflected or stored XSS scenarios, attackers embed scripts in user inputs, which servers reflect back to victims, allowing cookie theft and unauthorized access to admin panels for uploading additional malware like web shells. On servers running applications, this can lead to lateral movement, as hijacked sessions enable credential dumping and script deployment across connected systems.

Cross-Platform and Supply Chain Attacks

Cross-platform refers to malicious software designed to operate across multiple operating systems, including , by leveraging languages or frameworks that are not tied to a single platform. These threats often use polyglot binaries or scripts that can execute on , Windows, and macOS, exploiting shared libraries or environments to maintain persistence and evade detection. For instance, malware written in language that compiles to platform-independent binaries, enables attackers to deploy the same across diverse systems with minimal modifications. A prominent example is SysJoker, a backdoor discovered in 2021 that targets Windows, , and macOS by masquerading as legitimate system processes and establishing command-and-control communication. Similarly, CrossRAT, identified in 2018, supports cross-platform deployment on Windows, , and macOS, allowing capabilities such as file manipulation, screenshot capture, and through dynamic link libraries. More recently, BlackLock ransomware, active in 2025, uses Go to infect Windows, , and hypervisors, encrypting files and demanding ransoms while exploiting virtualization for broader impact. Supply chain attacks on involve compromising trusted upstream sources, such as open-source repositories or package managers, to inject into software builds distributed to users. In 2024, the incident exemplified this, where a maintainer subtly altered the compression library's over years to embed a backdoor, affecting numerous distributions before detection. This attack highlighted vulnerabilities in open-source contribution models, as the malicious code was propagated through official channels like and integrated into distro packages. By 2025, similar tactics targeted package ecosystems; for example, malicious versions of utilities like arch-wiki-lite delivered Chaos to users via compromised repositories. Linux-specific implications of these attacks are amplified in containerized and virtualized environments. Hub, a primary for Linux container images, has hosted malicious payloads, with nearly 20% of repositories in 2024 spreading through tampered base images used in supply chains. The backdoor persisted in at least 35 Debian-based images as of August 2025, enabling remote code execution in container deployments. Distro mirrors face risks too, as seen in the backdoor's brief impact on package updates in 2024. Additionally, 2025 saw modular kits emerge for multi-OS deployment, often via Actions workflows that inject payloads into builds, increasing the for cloud-native applications. These threats pose heightened risks to virtualized hosts, such as those running , where cross-platform can pivot from guest systems to hypervisors, compromising entire infrastructures. For example, BlackLock's 2025 campaigns exploited ESXi's to encrypt virtual machine disks, underscoring the need for isolated verification in hybrid environments. Overall, such attacks exploit Linux's reliance on open-source ecosystems, demanding rigorous artifact signing and dependency scanning to mitigate widespread infiltration.

Early Linux Malware

The earliest documented Linux malware emerged in the mid-1990s as proof-of-concept demonstrations rather than widespread threats, reflecting the operating system's nascent adoption primarily among technically proficient users. In the fall of 1996, Staog became the first known , developed by the Australian group VLAD. Written in , Staog targeted ELF executables and attempted to gain privileges by exploiting kernel vulnerabilities such as buffer overflows in the mount and tip utilities, as well as the suidperl bug. It infected running binaries and included references to its creators, but its rudimentary design limited propagation, and no in-the-wild infections were reported by early 1997. By the early 2000s, self-propagating worms began targeting specific distributions, underscoring Linux's growing server presence. The Ramen worm, discovered in January 2001, specifically attacked unpatched 6.2 and 7.0 systems by exploiting vulnerabilities in rpc.statd, wu-ftpd, and LPRng services. Once installed, it defaced web pages with messages promoting the "RameN Crew," scanned networks for additional victims using 27374, and weakened by editing files like /etc/hosts.deny. Rootkits also proliferated during this period; for instance, the t0rn , active around 2000–2003, replaced system utilities such as , , and to conceal intrusions and backdoors, often delivered via exploited services. These tools exemplified early stealth techniques, including (LKM) modifications to alter system calls without altering binaries. These incidents, while confined to fewer than 10 major cases by 2010, revealed Linux's susceptibility to and network-based attacks despite its open-source nature, which facilitated rapid vulnerability disclosure and patching. Their limited spread—impacting far less than 1% of systems overall—stemmed from user expertise, diverse distributions, and the need for root access, preventing mass infections common in other ecosystems. Nonetheless, they highlighted the necessity for advanced access controls, influencing the maturation of (MAC) frameworks like SELinux, initially developed by the NSA in the late 1990s and integrated into the kernel by 2003, and AppArmor, introduced by in the early to enforce path-based policies and mitigate unauthorized escalations.

Recent Developments (2010s–2020s)

In the 2010s, Linux malware increasingly targeted , including adaptations of the wiper for environments commonly used in systems. A variant of Shamoon 2, identified in 2017, focused on products to propagate destructively across networked systems, building on earlier campaigns that disrupted energy sector operations. This evolution highlighted the shift toward modular wipers capable of evading detection in industrial control environments. A prominent example was the 2018 VPNFilter botnet, a sophisticated Linux-based that infected over 500,000 routers and devices globally. Attributed to Russian state-sponsored actors, VPNFilter enabled surveillance, , and device bricking via multiple stages, including a loader and architecture for command-and-control. Entering the 2020s, threats diversified to include desktop surveillance and virtualization exploits. In 2019, EvilGnome emerged as a modular backdoor disguised as a GNOME shell extension, targeting Linux desktops with keylogging, screenshot capture, and audio recording capabilities. Developed by the Russian-linked Gamaredon group, it evaded detection by major antivirus solutions at the time and represented a rare focus on end-user Linux systems rather than servers. By 2022, the RansomEXX ransomware (also known as Defray) adapted for Linux environments, specifically targeting VMware ESXi hypervisors to encrypt virtual machines in cloud and enterprise setups. This ELF-based variant spread via exploited vulnerabilities and weak credentials, demanding ransoms in Bitcoin and underscoring the growing viability of Linux as a ransomware vector. In early 2025, DripDropper appeared as a downloader exploiting the CVE-2023-46604 vulnerability in Apache ActiveMQ on cloud Linux hosts. After gaining access, it self-patches the flaw to block competitors, uses Dropbox for command-and-control via compromised accounts, and facilitates persistence across thousands of instances for further payload delivery. State-sponsored campaigns amplified these threats, with groups like APT28 (also known as Fancy Bear) deploying Linux-specific tools for espionage. APT28 utilized the Fysbis backdoor in 2016 for persistent access on Linux systems, enabling file exfiltration and command execution, and later the Drovorub platform in operations through 2020, which included kernel modules for stealthy rootkit functionality on enterprise Linux distributions. Crypto-jacking persisted as a lucrative tactic, exemplified by 2021 campaigns deploying XMRig miners on Linux servers via vulnerabilities like CVE-2021-26084 in Atlassian Confluence, hijacking resources for Monero mining while maintaining low visibility. Overall, Linux malware shifted from experimental desktop threats to sophisticated attacks on servers and cloud infrastructure throughout the and , driven by the platform's dominance in and ecosystems. Antivirus reports documented a 62% rise in Linux detections from early 2022 to 2023, reflecting broader increases in targeted campaigns against high-value assets. This trend emphasized modular designs and evasion techniques, prioritizing persistence in virtualized and distributed environments over widespread consumer impact. In 2025, Linux malware has increasingly targeted cloud and containerized environments, exploiting vulnerabilities in orchestration tools to achieve broader system compromise. Critical flaws in Docker Desktop, such as CVE-2025-9074, enable container escapes by allowing malicious containers to access the host Docker Engine API via SSRF techniques, potentially leading to full host takeover on Linux-based setups. Similarly, vulnerabilities in runC, the container runtime used by Docker and Kubernetes, including three high-severity issues disclosed in November 2025, permit attackers to bypass isolation and inject code into the host kernel, facilitating malware persistence across container clusters. In Kubernetes environments, severe flaws in Chaos Mesh—a chaos engineering tool for testing resilience—collectively tracked under CVEs like CVE-2025-59358 through CVE-2025-59361, allow unauthenticated pod injections and full cluster hijacking by enabling arbitrary code execution within pods, often used by malware to propagate laterally in Linux-hosted cloud infrastructure. Fileless and modular malware variants have gained prominence, residing primarily in memory to evade traditional disk-based scans and antivirus tools. These attacks leverage Linux-specific mechanisms like memfd_create() to create anonymous memory files for payload execution without filesystem artifacts, complicating forensic detection. A notable example is the Auto-Color backdoor, discovered in late 2024 and active into 2025, which employs modular command-and-control (C2) structures for tasks like reverse shells and file exfiltration while using libc hooking and process hiding to maintain stealth on infected Linux systems. Complementing this, Go-language malware has emerged as a modular threat vector; for instance, typosquatted Go packages mimicking legitimate libraries like "hypert" deliver cross-platform payloads to Linux users, executing in-memory to steal credentials and establish persistence via environment variables. Another Go-based example, the VShell backdoor, uses RAR archive filename weaponization for initial infection and modular plugins for evasion on Linux servers. The integration of (AI) into Linux malware marks a significant evolution, enabling dynamic evasion tactics such as machine learning-driven polymorphism to alter code signatures in real-time and avoid signature-based detection. The Koske malware, an AI-generated Linux threat uncovered in mid-2025, incorporates LLM-assisted and userland rootkits to hijack system calls like readdir(), hiding malicious artifacts while adapting to defensive responses. AI enhancements have also bolstered operations, including SSH brute-force campaigns; tools like AI-powered credential stuffers automate and scale attacks by predicting weak configurations and optimizing guesses. According to the H1 2025 Malware and Vulnerability Trends report, traditional stealers like Vidar and have declined significantly, dropping off the top lists due to improved takedowns and detection, while incidents have risen amid growing enterprise adoption of servers. This shift underscores a broader trend toward sophisticated, environment-specific threats, with cloud-focused exploiting container vulns to encrypt images and demand higher ransoms.

Detection and Mitigation

Antivirus and Endpoint Protection Tools

Antivirus and endpoint protection tools for systems focus on detecting, preventing, and remediating malware threats tailored to the environment, including binaries and kernel-level exploits. These tools employ a combination of signature-based scanning, which matches files against known patterns, and or behavioral analysis to identify suspicious activities without relying on predefined signatures. Open-source options like provide essential scanning capabilities for filesystems and executables, while commercial solutions such as Intercept X offer advanced real-time behavioral monitoring to block exploits and on servers. ClamAV, an open-source antivirus engine, excels in scanning filesystems for malware, including binaries commonly targeted by Linux threats, through its command-line tools and daemon-based architecture. It supports on-demand and scheduled scans of directories, archives, and attachments, detecting trojans, , and viruses via a regularly updated signature database. Intercept X for Linux servers integrates and behavioral analysis to monitor process execution in real-time, preventing fileless attacks and lateral movement by analyzing deviations from normal system behavior. Endpoint detection and response (EDR) tools extend protection beyond traditional antivirus by focusing on runtime monitoring and threat hunting. , an open-source runtime security tool, uses events via or kernel modules to detect anomalous behaviors indicative of , such as unauthorized process injections or network connections, making it suitable for containerized and cloud-native environments. provides EDR capabilities for through its lightweight sensor, integrating behavioral analytics, , and cloud-based threat intelligence to identify and respond to , including rootkits, across endpoints. In November 2025, Kaspersky released an antivirus solution for home users, emphasizing protection against rising exploits in desktop and personal devices. In terms of effectiveness, signature-based methods in tools like achieve reported detection rates of over 95% for known malware samples according to some sources, though independent tests indicate rates around 60-70% for Linux-specific threats. Heuristic and behavioral approaches in Intercept X and Falcon improve coverage for unknown variants, with AI-enhanced security tools reporting up to 98% efficacy against known threats and over 80% for novel ones per industry analyses, though specific tool performance varies in benchmarks; however, exploiting memory or scripts remains a challenge, often evading file-scanning mechanisms. Deployment of these tools typically involves daemon processes for continuous operation, such as ClamAV's clamd for scanning and freshclam for automated signature updates every few hours to maintain freshness against evolving threats. In resource-constrained IoT devices running Linux, challenges arise from high CPU and memory demands during scans, necessitating optimized configurations or lighter variants to avoid performance degradation.

System Hardening and Best Practices

System hardening involves configuring systems to minimize vulnerabilities and limit the potential impact of through built-in security features and policies, rather than relying on external software. This approach emphasizes proactive measures such as access controls, network restrictions, and regular maintenance to reduce the and enforce the principle of least privilege. By implementing these practices, administrators can significantly enhance resilience against exploits targeting environments, including servers, desktops, and embedded devices. Core hardening practices include enabling firewalls to control inbound and outbound traffic, thereby blocking unauthorized access that could introduce malware. Tools like or its user-friendly frontend allow for a default deny policy, where all traffic is blocked except explicitly permitted services, such as SSH on port 22. For instance, configuring UFW with sudo ufw default deny incoming and sudo ufw allow 22/tcp restricts exposure to common attack vectors like remote code execution. Similarly, and SELinux provide (MAC) to confine applications and prevent malware from escalating privileges or accessing unauthorized resources. uses path-based profiles to limit programs like web servers to specific files, operating in enforce mode to block violations in real-time, while SELinux employs label-based policies for finer-grained role-based access control, defaulting to enforcing mode on distributions like . Regular kernel updates via distribution tools, such as apt update && apt upgrade on Debian-based systems or dnf update on , address known vulnerabilities promptly; best practices recommend scheduled maintenance windows, testing in staging environments, and rollback procedures to ensure stability post-update. At the user level, adhering to the principle of least privilege restricts accounts to minimal necessary permissions, exemplified by disabling direct root logins over SSH to prevent attackers from gaining full system control with a single compromised credential. This is achieved by editing /etc/ssh/sshd_config to set PermitRootLogin no and restarting the SSH service, forcing users to authenticate as non-privileged accounts and escalate via only when required, thereby mitigating risks from brute-force attacks or credential theft. Complementing this, the auditd daemon enables comprehensive system auditing for by logging events like file accesses and system calls; rules such as -w /etc/passwd -p wa -k identity monitor sensitive files, allowing security teams to identify unusual patterns indicative of malware or lateral movement through tools like ausearch for log analysis. For advanced environments, container security can be bolstered using profiles in to filter system calls at the kernel level, enforcing a of allowed operations to contain potential breaches within isolated workloads. A custom profile might permit execve and fork while denying clone for process creation, applied via docker run --security-opt seccomp=profile.json, reducing the risk of container escapes by malware. In and contexts, secure boot ensures only trusted and kernels load during initialization, using hardware-fused public keys to verify signatures of bootloaders like U-Boot and root filesystems via mechanisms such as dm-verity, preventing tampered code from executing on resource-constrained devices. As of 2025, recommendations emphasize (MFA) for SSH to add a second verification factor beyond passwords or keys, implemented via modules like , which generates time-based one-time passwords (TOTP) scanned from a after initial . Configuration involves installing the module, generating user-specific secrets with google-authenticator, and updating /etc/pam.d/sshd to require pam_google_authenticator.so. Additionally, adopting zero-trust models as outlined by NIST SP 800-207 promotes continuous verification of all access requests, regardless of origin, through micro-segmentation and least-privilege enforcement, effectively shrinking the in networks by assuming breach and limiting lateral movement.

Addressing Cross-OS Threats

In mixed operating system environments, Linux systems can encounter threats originally designed for Windows through compatibility layers and shared infrastructure, necessitating targeted defenses to prevent lateral movement or exploitation. Windows-specific malware, such as Win32 executables, may execute on Linux via emulation tools like Wine or Proton, which translate Windows API calls to POSIX equivalents, potentially allowing malicious payloads to access Linux filesystems if not properly isolated. A study evaluating Wine's security found that certain Windows ransomware samples achieved partial success rates of up to 40% in encrypting files within the emulated environment, highlighting the risks of inadequate process isolation between Windows binaries and the host Linux kernel. Similarly, Proton, built on Wine for gaming compatibility, inherits these vulnerabilities, as untrusted executables could exploit the layer to perform unauthorized file operations or network activities on the Linux host. Dual-use malware droppers deployed on Linux hosts can also scan for and target Windows virtual machines running on hypervisors like KVM, exploiting shared resources or weak isolation to propagate infections. For instance, cross-platform threats such as XBash combine botnet, ransomware, and coinmining capabilities to infect both Linux servers and Windows guests in virtualized setups, using techniques like SMB scanning to detect and exploit Windows instances from the Linux host. In such scenarios, attackers leverage KVM's ioctl interfaces to probe for guest VMs, potentially injecting payloads that evade host-based detection by operating within the guest environment. Recent variants, including those from Agenda ransomware, demonstrate this by deploying Linux binaries on Windows systems via tools like WinSCP, but the reverse—Linux-based droppers affecting Windows VMs—has been observed in hybrid infrastructures where malware enumerates virtual devices to drop compatible exploits. Real-world scenarios underscore these risks, particularly in environments with shared filesystems. Conti ransomware variants have targeted Linux file servers using NTFS shares, where the Linux edition encrypts accessible Windows-formatted volumes, disrupting operations across OS boundaries as seen in attacks on ESXi hypervisors hosting mixed workloads. By 2025, hybrid cloud attacks have surged, with Kaspersky reporting a notable increase in exploits affecting both Linux and Windows users, often involving cross-platform ransomware like Gunra that propagates via shared cloud storage or virtual networks. These incidents exploit the interoperability of hybrid setups, such as AWS or Azure environments running Linux hosts with Windows guests, leading to data exfiltration or encryption across platforms. To mitigate these cross-OS threats, sandboxing virtual machines with provides robust isolation, emulating hardware to contain Windows payloads without compromising the host, as recommended for dynamic in controlled environments. Tools like Cuckoo Sandbox further enhance this by automating the of Windows executables within guest VMs on a host, generating detailed behavioral reports on network activity, file changes, and registry manipulations while maintaining host integrity through barriers. For compatibility layers, best practices include disabling Wine or Proton for untrusted files and restricting their access to isolated directories, as these layers can inadvertently expose the filesystem to Windows-style exploits. Additionally, monitoring shared resources—such as mounts or shares—using tools like centralized and port scanners helps detect anomalous cross-OS access patterns early, preventing propagation in mixed environments.

References

  1. [1]
    [PDF] Unix/Mac/Linux OS Malware | HHS.gov
    Oct 15, 2020 · Unix and Unix-like systems drive most of today's computer systems. • Vulnerabilities and malware. • Threat mitigation o Comprehensive security ...
  2. [2]
    The Linux Threat Landscape Report | Trend Micro (US)
    From the first quarter of 2022 to 2023, our Midyear Security Report cited that our sensors detected a 62% increase in Linux ransomware attack attempts.
  3. [3]
    An Introduction to Linux-based malware - SANS Technology Institute
    Abstract Although rarely making news headlines Linux malware is a growing problem. As a result, Linux systems are left in an insecure state with minimal ...
  4. [4]
    An increased number of Linux and Windows users are encountering ...
    Aug 26, 2025 · New Kaspersky data has shown that more Windows and Linux users faced vulnerability exploits in the first half of 2025 compared to 2024.
  5. [5]
    [PDF] Understanding Linux Malware - Yanick Fratantonio
    Our goal is not to differentiate between different classes of malware or different malware families (i.e., to distinguish botnets from backdoors from ransomware ...
  6. [6]
    [PDF] Malware Analysis Report - CISA
    Sep 5, 2023 · This artifact, belonging to the SALTWATER malware family, is a 32-bit Linux Shared Object (.so) file. The malware can intake data over the ...
  7. [7]
    The Evolution of Linux Binaries in Targeted Cloud Operations
    This article explores the types of malicious binaries that threat actors are developing for use in attacks against Linux-based environments.<|control11|><|separator|>
  8. [8]
    2025 Linux Malware: How to Detect, Prevent, & Defend - TuxCare
    Jul 14, 2025 · Linux malware is rising fast in 2025, targeting servers, containers, and IoT devices with ransomware, cryptojackers, and rootkits.Key Takeaways · The Most Dangerous Types of... · How Malware Gets In...
  9. [9]
    Rising Malware Threats to Linux - Understanding Risks and Defenses
    Mar 19, 2025 · Linux is considered a highly secure operating system, but Linux users are no longer immune to malware, ransomware and other pervasive security threats.
  10. [10]
    Linux Detection Engineering - A Sequel on Persistence Mechanisms
    Aug 29, 2024 · Researchers from AON recently discovered a malware called "sedexp" that achieves persistence using Udev rules - a technique rarely seen in ...
  11. [11]
    Kernel Modules & Extensions - Red Canary Threat Report
    Kernel modules and extensions offer adversaries a reliable means of establishing persistence on Linux systems ... EndpointStop ransomware and malware · Cloud ...
  12. [12]
    Desktop OS Market Share Worldwide | Statcounter
    This graph shows the market share of desktop operating systems worldwide from Oct 2024 - Oct 2025. Windows has 66.25%, OS X has 14.07% and Unknown has ...
  13. [13]
    Linux Statistics 2025: Desktop, Server, Cloud & Community Trends
    Aug 3, 2025 · Linux-based operating systems make up 3.7% of the desktop market share. Red Hat Enterprise Linux (RHEL) holds 43.1% of the enterprise Linux ...Global Desktop Operating... · Linux in Mobile Devices · Top Linux Distributions by...
  14. [14]
    Persistence, Tactic TA0003 - Enterprise | MITRE ATT&CK®
    Oct 17, 2018 · Adversaries may maintain persistence through executing malicious content triggered using udev rules. Udev is the Linux kernel device manager ...
  15. [15]
    Five years ago: McAfee finds first known Linux virus | ZDNET
    Feb 7, 2002 · First published 10 February, 1997. Called Bliss, the virus is important because it is the first to attack Linux, a freeware variant of Unix ...
  16. [16]
    Worm:Linux/Slapper - F-Secure
    Slapper is a network worm that spreads on Linux machines by using a flaw discovered in August 2002 in OpenSSL libraries. The worm was found in Eastern Europe ...
  17. [17]
    [PDF] An analysis of the slapper worm - Core Security
    On 28 June 2002, the Apache Scalper worm was discovered in the wild, spreading through Internet Web servers running the Apache Web server daemon on FreeBSD ...
  18. [18]
    An overview of targeted attacks and APTs on Linux | Securelist
    Sep 10, 2020 · If an attacker is able to compromise a server running Linux, they not only gain access to data stored on the server but can also target endpoints connected to ...Missing: 2010s | Show results with:2010s
  19. [19]
    Defenders Be Prepared: Cyberattacks Surge Against Linux Amid ...
    Sep 6, 2022 · "Malware targeting Linux-based systems is fast becoming an attacker's way into high-value, multi-cloud environments," VMware warned. Even so, ...Defenders Be Prepared... · Surging Linux, Vmware Esxi... · Protecting Linux...Missing: post- 2020<|control11|><|separator|>
  20. [20]
    Why Linux Security Matters - Yellow Tail Tech
    Why is Linux considered more secure than other operating systems? Linux's open-source code allows global review and fast patching of vulnerabilities. It ...
  21. [21]
    Linux Endpoint Security: What You Need to Know in 2025 - Cynet
    Malware: Malicious software targeting Linux has increased significantly. Notable malware types include: Ransomware: Encrypts data, demanding payment for ...
  22. [22]
    McAfee finds first known Linux virus - ZDNET
    Feb 10, 1997 · Bliss manifests itself by overwriting Linux executables with its own code every time it is executed. Files cannot be recovered and files created ...
  23. [23]
    Linux Faithful Defuse Bliss Panic | WIRED
    Feb 26, 1997 · An anti-virus software company is busily backpedalling after announcing earlier this month that it had discovered and countered the first Linux virus.
  24. [24]
    Virus:Linux/Bliss.A threat description - Microsoft Security Intelligence
    Mar 23, 2007 · This threat can perform a number of actions of a malicious actor's choice on your device. Find out ways that malware can get on your device.Missing: 1997 mechanics
  25. [25]
    [PDF] The Lion Worm - GIAC Certifications
    3-betas. The worm scans for vulnerable systems via TCP port 53. It installs the t0rn rootkit, sets up a web page on port 27374, and sends ...Missing: mechanics | Show results with:mechanics
  26. [26]
    The Morris Worm - FBI.gov
    Nov 2, 2018 · The worm only targeted computers running a specific version of the Unix operating system, but it spread widely because it featured multiple ...
  27. [27]
    "Lion" worm stalks Linux machines | ZDNET
    Mar 23, 2001 · A dangerous worm that can steal passwords from Linux servers is rapidly spreading across the Internet and could infect other machines, ...Missing: mechanics | Show results with:mechanics
  28. [28]
    Reported Supply Chain Compromise Affecting XZ Utils Data ... - CISA
    Mar 29, 2024 · CISA and the open source community are responding to reports of malicious code being embedded in XZ Utils versions 5.6.0 and 5.6.1.
  29. [29]
    Free Download Manager backdoored – a possible supply chain ...
    Sep 12, 2023 · Kaspersky researchers analyzed a Linux backdoor disguised as Free Download Manager software that remained under the radar for at least three ...
  30. [30]
    Dynamic Linker Hijacking, Sub-technique T1574.006 - Enterprise
    Hijack Execution Flow: Dynamic Linker Hijacking. Other sub-techniques of Hijack Execution Flow (12) ...
  31. [31]
    Linux Incident Response - Introduction to Rootkits - SANS Institute
    Nov 22, 2023 · 1. Loadable Kernel Module Rootkits (LKM): These rootkits subvert Linux kernel functionality by injecting malicious code directly into the kernel ...
  32. [32]
    [PDF] UNIX and Linux based Rootkits Techniques and Countermeasures
    Apr 30, 2004 · 3.3 Adore-NG 1.41. The rootkit Adore-NG is a recode of the original Adore and will serve as the third example in version 1.41 for Linux. The ...
  33. [33]
    [PDF] Linux kernel rootkits: protecting the systems Ring-Zero
    May 2, 2004 · The paper's contents try to provide a general overview of rootkits, its main goals and evolution. The very specific and technical details are ...
  34. [34]
    Privilege Escalation via SUID/SGID | Elastic Security [8.19]
    SUID/SGID are Unix/Linux permissions that allow users to execute files with the file owner's or group's privileges, often root. Adversaries exploit ...
  35. [35]
    RansomEXX Trojan attacks Linux systems | Securelist
    Nov 6, 2020 · We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled by Linux-based operating ...Missing: ESXi | Show results with:ESXi
  36. [36]
    RansomEXX (Malware Family) - Malpedia
    RansomExx is a ransomware family that targeted multiple companies starting in mid-2020. It shares commonalities with Defray777.
  37. [37]
    New Ransomware Tactic: Adversaries Target ESXi Servers
    Feb 26, 2021 · SPRITE SPIDER and CARBON SPIDER began deploying Linux versions of Defray777 and Darkside, respectively, designed specifically to affect ESXi.
  38. [38]
    Container Breakouts: Escape Techniques in Cloud Environments
    Jul 18, 2024 · This article reviews container escape techniques, assesses their possible impact and reveals how to detect these escapes from the perspective of endpoint ...Executive Summary · How Do Containers Work? · Container Escapes
  39. [39]
    Kubernetes Container Escape Using Linux Kernel Exploit
    Jan 31, 2022 · Researchers have found a heap base buffer overflow flaw (CVE-2022-0185) in Linux kernel function. Learn more about the recent vulnerability ...
  40. [40]
    Ransomware hits record highs: Healthcare, government, tech ...
    Oct 17, 2025 · In the third quarter of 2025, ransomware activity reached a new record, rising 36% from the same period in 2024, with 270 publicly disclosed ...
  41. [41]
    [PDF] Understanding the Mirai Botnet - USENIX
    Aug 16, 2017 · While DDoS was Mirai's flavor of abuse, future strains of IoT malware could leverage access to compromised routers for ad fraud, cameras for.
  42. [42]
    New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux ...
    Feb 17, 2023 · A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices.
  43. [43]
    Akamai Blog | FritzFrog: P2P Botnet Hops Back on the Scene
    Feb 10, 2022 · A FritzFrog attack starts with an SSH brute force, and continues with a file being dropped and executed. This file immediately starts ...<|control11|><|separator|>
  44. [44]
    [PDF] Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks
    Experience over 463 days shows that CAUDIT successfully blocks an average of. 57 million attack attempts on a daily basis using the proposed. BHR. This ...
  45. [45]
    The Ghosts of Mirai | FortiGuard Labs - Fortinet
    Jun 24, 2021 · IoT malware scans the Internet for IoT devices that use default or weak usernames and passwords. They also seek to exploit known—and sometimes ...
  46. [46]
  47. [47]
  48. [48]
  49. [49]
    regreSSHion Bug: RCE Vulnerability in OpenSSH's Server | Qualys
    regreSSHion (CVE-2024-6387) is an unauthenticated RCE vulnerability in OpenSSH's server, affecting glibc-based Linux systems. Full root access is granted.
  50. [50]
    Linux Kernel Vulnerabilities Exploited in 2025: CISA KEV Insights
    Oct 14, 2025 · Explore key Linux kernel vulnerabilities exploited in 2025 including critical insights and remediation advice.
  51. [51]
    CVE-2025-38352 Detail - NVD
    Jul 22, 2025 · In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_ ...
  52. [52]
    Red Hat (RHEL) vs. Debian - Which OS is better? - IONOS
    Dec 4, 2024 · The winner in the Red Hat vs. Debian comparison depends on your specific needs. Debian is a well-known Linux distribution for good reason, offering a broad ...
  53. [53]
    System Stability and Updates: How Debian and Red Hat Handle ...
    In this article, we will delve into the ways Debian vs Red Hat manage security patches, updates, and system stability.
  54. [54]
    Debian vs Redhat: A Walk Through - Tricky Enough
    May 14, 2023 · Release cycles for Debian are slower and more flexible than other Linux distributions. A phase for testing and bug-fixing commonly follows a ...Debian vs Redhat · Differences between Debian... · Release cycle · Licensing
  55. [55]
    The Dirty Pipe vulnerability: Overview, detection, and remediation
    Mar 10, 2022 · Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your systems.
  56. [56]
    Linux Malware Delivered via Malicious RAR Filenames Evades ...
    Aug 22, 2025 · Phishing emails with RAR archives exploit Linux filename injection to deliver VShell backdoor, bypassing antivirus defenses.
  57. [57]
    Phishing Attack : Deploying Malware on Indian Defense BOSS Linux
    Jul 4, 2025 · APT36's latest campaign showcases a significant advancement in Linux-targeted malware delivery by combining phishing, social engineering, and ...
  58. [58]
    Lessons from XZ Utils: Achieving a More Sustainable Open Source ...
    Apr 12, 2024 · The XZ Utils compromise – a multi-year effort by a malicious threat actor to gain the trust of the package's maintainer and inject a backdoor – highlighted the ...
  59. [59]
    Open Source Security (OpenSSF) and OpenJS Foundations Issue ...
    Apr 15, 2024 · The OpenSSF and OpenJS Foundations issue an alert for social engineering takeovers of open source projects, as the XZ Utils cyberattack is ...
  60. [60]
    SOC Threat Radar — July 2025 | Barracuda Networks Blog
    Jul 10, 2025 · Linux systems are vulnerable to attack. Recent reports suggest that the number of vulnerabilities in Linux systems increased by 3,300 in 2025 — ...
  61. [61]
    I am Goot (Loader) - Cybereason
    GootLoader is a malware loader known to abuse JavaScript ... Threat actors abuse SEO poisoning to attract users toward drive-by download of GootLoader stagers.
  62. [62]
    Javascript Malware: How does it work, and how can it be mitigated?
    Sep 13, 2012 · is drive-by download the only technique used by JS malware ? ... Malware techiques via Linux Chrome and its effects, non-root · 1 · How Do I ...malware - Drive-by downloads - Information Security Stack ExchangeHow does mime-sniffing enable a drive by download attack?More results from security.stackexchange.com
  63. [63]
    New Python-Based Crypto-Miner Botnet Flying Under the Radar - F5
    Jan 3, 2018 · A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
  64. [64]
    Three New Malicious PyPI Packages Deploy CoinMiner on Linux ...
    Jan 3, 2024 · FortiGuard Labs cover the attack phases of three new PyPI packages that bear a resemblance to the culturestreak PyPI package discovered ...Missing: cron jobs
  65. [65]
    New Linux Malware Campaign Exploits Oracle Weblogic to Mine ...
    Sep 13, 2024 · Researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining and deliver botnet malware.
  66. [66]
    [PDF] Detect and Prevent Web Shell Malware - DoD
    Jun 9, 2020 · Web shell malware is a long-standing, pervasive threat that continues to evade many security tools. Cyber actors deploy web shells by exploiting ...
  67. [67]
    What is a Web Shell? C99 Explained - CybelAngel
    Sep 22, 2025 · How do attackers upload a webshell? What are the signs of a webshell on a server? How can you prevent webshell attacks? Why are webshells so ...
  68. [68]
    Vulnerability Summary for the Week of May 26, 2025 - CISA
    Jun 2, 2025 · The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week.
  69. [69]
    5 Critical Apache Vulnerabilities: Risks, Examples & Fixes Explained
    Sep 19, 2025 · As of now in 2025, nine vulnerabilities have already been discovered in Apache HTTP Server 2.4.x versions, compared to 14 vulnerabilities ...
  70. [70]
    8 CVEs Fixed in Apache HTTP Server July 2025 Update
    Jul 14, 2025 · On July 10, 2025, the Apache Software Foundation released Apache HTTP Server version 2.4.64, addressing eight vulnerabilities affecting previous versions.
  71. [71]
    The Silent, Fileless Threat of VShell - Trellix
    In this blog post, we'll dissect a real-world, Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive ...
  72. [72]
    Near-'perfctl' Fileless Malware Targets Millions of Linux Servers
    Oct 2, 2024 · A multipurpose and mysterious malware dropper has been terrorizing Linux servers worldwide for years, infecting untold thousands of victims.
  73. [73]
  74. [74]
    What is Cross Site Scripting (XSS)? - SentinelOne
    Jul 21, 2025 · Cross-site scripting also referred to as XSS, is a security vulnerability that allows an attacker to inject malicious scripts into web pages viewed by clients.
  75. [75]
    BlackLock Ransomware Actively Targeting Windows, Linux, and ...
    Sep 22, 2025 · BlackLock is a sophisticated cross-platform ransomware strain developed in Go that targets Windows, Linux, and VMware ESXi systems.
  76. [76]
    New SysJoker Backdoor Targets Windows, Linux, and macOS - Intezer
    Jan 11, 2022 · In December 2021, we discovered a new multi-platform backdoor that targets Windows, Mac, and Linux that we have named SysJoker.
  77. [77]
    CrossRAT, A new cross platform malware
    Jan 26, 2018 · Cross-platform deployment, targeting Windows, Linux, and OSX operating systems; Manipulate file systems; Take screenshots; Run arbitrary DLLs ...
  78. [78]
    Persistent Risk: XZ Utils Backdoor Still Lurking in Docker Images
    Aug 12, 2025 · Security incidents affecting the software supply chain are more frequent than ever. This is one of the key motivations for building the Binarly ...Missing: attack | Show results with:attack
  79. [79]
    Why Software Supply Chain Security Fails in Linux Distributions
    Oct 1, 2025 · In 2025, several of those packages were found to deliver the Chaos RAT malware. Malicious versions of utilities such as arch-wiki-lite and ...
  80. [80]
    Nearly 20% of Docker Hub Repositories Spread Malware ... - JFrog
    Apr 30, 2024 · Attackers are using Docker Hub for malicious campaigns of various types, including spreading malware, phishing and scams.Missing: Linux | Show results with:Linux
  81. [81]
    Docker Hub still hosts dozens of Linux images with the XZ backdoor
    Aug 12, 2025 · The XZ-Utils backdoor, first discovered in March 2024, is still present in at least 35 Linux images on Docker Hub, potentially putting users ...
  82. [82]
    Software Supply Chain Attacks - Cyber Defense Magazine
    Sep 9, 2025 · Kali Linux: Users who updated their installations between March 26th and 29th, 2024, were impacted by the attack. Arch Linux: Certain versions ...Missing: malware | Show results with:malware
  83. [83]
    Linux/Staog - F‑Secure
    This virus spreads only under Linux operating system, infecting Elf-style executables. Found in the fall of 1996, Staog is the first known Linux virus.
  84. [84]
    Viruses: not a Linux problem? | Securelist
    Sep 12, 2005 · One of the early Linux viruses, Staog, uses a vulnerability to get root access to the system. Slapper uploads itself as a uuencoded source ...
  85. [85]
    [PDF] The Ramen Worm and it sUse of rpc.statd, wu-ftpd and LPRng ...
    Feb 7, 2001 · The Ramen Worm is a self-replicating package of malicious software (malware) affecting unpatched Red Hat Linux 6.2 and 7.0 systems. The worm has ...Missing: Staog | Show results with:Staog
  86. [86]
    [PDF] Linux RootKits For Beginners - From Prevention to Removal
    Jan 23, 2003 · A rootkit is a collection of tools used to mask intrusion and obtain admin access by overwriting commands like ls, ps, and netstat.Missing: early | Show results with:early
  87. [87]
    A Second variant of Shamoon 2 targets virtualization products
    Jan 10, 2017 · A new strain of the Shamoon 2 malware was spotted by the security experts at Palo Alto Networks, this variant targets virtualization products.
  88. [88]
    VPNFilter botnet: a SophosLabs analysis - Sophos News
    May 24, 2018 · A technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.<|separator|>
  89. [89]
    EvilGnome: Rare Malware Spying on Linux Desktop Users - Intezer
    Jul 17, 2019 · We have named the implant EvilGnome, for its disguise as a Gnome extension. The malware is currently fully undetected across all major security solutions.
  90. [90]
    Ransomware Spotlight: RansomEXX | Trend Micro (US)
    May 17, 2022 · RansomEXX is a ransomware variant that gained notoriety after a spate of attacks in 2020 and continues to be active today.
  91. [91]
    How DripDropper Linux malware moves through the cloud
    Aug 19, 2025 · Red Canary detected an adversary exploiting CVE-2023-46604 in Apache ActiveMQ to gain persistent access on cloud Linux systems, patching the ...
  92. [92]
    A Look Into Fysbis: Sofacy's Linux Backdoor
    Feb 12, 2016 · The Sofacy group, also known as APT28 and Sednit, is a fairly well known cyber espionage group believed to have ties to Russia.
  93. [93]
    NSA and FBI Expose Russian Previously Undisclosed Malware ...
    Aug 13, 2020 · The National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a new Cybersecurity Advisory about previously ...Missing: tools | Show results with:tools
  94. [94]
    Attackers exploit CVE-2021-26084 for XMRig crypto mining on ...
    Sep 13, 2021 · The vulnerability allows an unauthenticated attacker to perform remote command execution by taking advantage of an insecure handling of OGNL (Object-Graph ...
  95. [95]
    Linux Malware Stats and Facts for 2024 - Comparitech
    May 13, 2024 · The Trend Micro Linux Threat Landscape Report states that ransomware attacks aimed at Linux increased by 62% between 2022 and 2023. The security ...
  96. [96]
    Looking Back on the Last Decade of Linux APT Attacks - Intezer
    Sep 16, 2020 · Looking back on the previous decade of Linux APT attacks to get a better understanding of the trends that might shape the current decade.
  97. [97]
    Docker Desktop 4.44.3: Important Container Escape Vuln CVE-2025 ...
    Aug 26, 2025 · The vulnerabilities patched in this release go straight to the core of container security. They could allow attackers to break through.
  98. [98]
  99. [99]
    Total Kubernetes cluster hijacking likely with severe Chaos Mesh flaws
    Sep 17, 2025 · Open-source cloud-native Chaos Engineering platform Chaos Mesh was discovered to be impacted by four serious vulnerabilities collectively ...
  100. [100]
    Detecting Linux memfd_create() Fileless Malware with Command ...
    Jul 8, 2020 · Fileless Linux malware is difficult to detect. It's designed to inject itself into a running Linux system and leave no traces on the disk.
  101. [101]
    Auto-Color: An Emerging and Evasive Linux Backdoor
    Feb 24, 2025 · The new Linux malware named Auto-color uses advanced evasion tactics. Discovered by Unit 42, this article cover its installation, ...Executive Summary · Telemetry and Source... · Malware Startup and Installation
  102. [102]
    Linux, macOS users infected with malware posing as legitimate Go ...
    Mar 7, 2025 · Threat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems.
  103. [103]
    VShell Linux Backdoor - The PolySwarm Blog
    Aug 29, 2025 · VShell is a sophisticated Go-based backdoor targeting Linux systems through a novel infection chain that weaponizes filenames in RAR archives.
  104. [104]
    Koske Malware Detection: New AI-Generated Linux Threat in the Wild
    Jul 29, 2025 · Detect the Koske Linux malware developed using AI for cryptomining using curated Sigma rules from SOC Prime Platform.Missing: credible | Show results with:credible
  105. [105]
    How New AI Agents Will Transform Credential Stuffing Attacks
    Mar 4, 2025 · AI-powered credential stuffing could worsen in 2025, as attackers scale automation to breach accounts. Defending identity security is now ...
  106. [106]
    H1 2025 Malware and Vulnerability Trends - Recorded Future
    Aug 28, 2025 · The first half of 2025 (H1 2025) reflected a rapidly evolving threat landscape defined by the convergence of persistent legacy threats and ...Malware Trends · Mobile Malware · Ransomware
  107. [107]
    ClamAV Documentation: Introduction
    ClamAV is designed to scan files quickly. · Real time protection (Linux only). · ClamAV detects millions of viruses, worms, trojans, and other malware, including ...Scanning · Installing ClamAV · On-Access Scanning · Upgrading - ClamAV...
  108. [108]
    Intercept X for Server: Technical Specifications - Sophos
    Sophos Intercept X delivers unparalleled protection from advanced attacks against your Windows and Linux server workloads.
  109. [109]
    Scanning - ClamAV Documentation
    clamd is a multi-threaded daemon that uses libclamav to scan files for viruses. Scanning behavior can be fully configured to fit most needs by modifying clamd.Missing: ELF | Show results with:ELF
  110. [110]
    Tech Specs - Sophos Endpoint with XDR and MDR
    Strongest protection. Simple licensing. Sophos Endpoint delivers unparalleled defense against advanced cyberattacks on your endpoints and servers.
  111. [111]
    Enhanced Linux and container security for Sophos Intercept X for ...
    Apr 14, 2022 · We are pleased to announce that Intercept X Advanced for Server with XDR now includes enhanced visibility for Linux hosts and container workloads.Missing: real- time<|control11|><|separator|>
  112. [112]
    The best antivirus for Linux servers in 2025 - BitLaunch
    Apr 26, 2023 · ClamAV is the most commonly recommended free Linux antivirus. It is free and open source, uses and tends to catch over 95% of known malware samples.
  113. [113]
    How AI-Driven Linux Security Tools Detect Threats Before They Strike
    Jun 11, 2025 · ... detection rates of up to 98% for known threats and exceeding 80% for new and unknown exploits. This represents a huge leap from traditional ...
  114. [114]
  115. [115]
    AMP for Endpoints: ClamAV Virus Definition Options in Linux - Cisco
    Jul 19, 2019 · Using a smaller set reduces computing overhead and makes it possible to run AMP on resource constrained systems. Despite the performance ...Missing: challenges | Show results with:challenges
  116. [116]
    Security implications of running windows software on a Linux system ...
    Apr 26, 2018 · The study results provide evidence that Wine can pose serious security implications when used to run Windows software in a Linux environment.
  117. [117]
    The success rate of windows malware in wine - ResearchGate
    The purpose of this study is to assess the security of the Linux operating system that uses Wine as a compatibility layer against ransomware attacks. Then to ...
  118. [118]
    Automated Malware Analysis - Cuckoo Sandbox
    Sep 6, 2017 · Cuckoo has become the goto solution for generic behavior analysis, the time has come to also focus on more specific payloads and variants.
  119. [119]
    Xbash Combines Botnet, Ransomware, Coinmining in Worm that ...
    Sep 17, 2018 · Unit 42 researchers have found a new malware family that is targeting Linux and Microsoft Windows servers that we have named XBash.
  120. [120]
    Virtualization/Sandbox Evasion: System Checks - MITRE ATT&CK®
    DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie ...
  121. [121]
    Agenda Ransomware Deploys Linux Variant on Windows Systems ...
    Oct 23, 2025 · Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems.
  122. [122]
    Conti Group Targets ESXi Hypervisors With its Linux Variant - Trellix
    Apr 20, 2022 · Analysis of Conti leaks revealed that the threat actors are continuously adjusting and improving their Linux variant of ransomware and it is ...
  123. [123]
  124. [124]
    Sandboxing in Virtual Machines for Malware Analysis - GeeksforGeeks
    Oct 7, 2025 · Setting Up a Sandbox in an Isolated Virtual Machine · Place the suspicious binary or malware sample in a dedicated folder (e.g., sample_name ).
  125. [125]
    8 Cross-OS Environment Security Best Practices - MSP360
    Apr 21, 2020 · 1. Scan for Viruses · 2. Centralize Identity Management · 3. Monitor for Network-Based Threats · 4. Scan Ports for Vulnerabilities · 5. Encrypt Data.