Sunday, September 8, 2024
Search results for:

Linux malware

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In 2022, Linux malware incidents...

ANY.RUN Sandbox Now Let SOC & DFIR Teams Analyze Sophisticated Linux Malware

The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for malware...

Hackers Deployed never-before-seen Linux Malware Attacking Government Entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor...

Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack

ESET researchers have recently discovered that Linux users targeted with malware in the new "Operation DreamJob" Lazarus campaign for the first time. The group behind...

New Windows Subsystem For Linux Malware Steals Credentials & Record Keystrokes

There has been an increasing amount of interest in targeting the Windows Subsystem for Linux (WSL), due to the fact that they continue to...

NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware

Recently, NSA, along with FBI, has revealed a Russian APT28 Linux malware named "Drovorub." The experts asserted that this malware is managed by the...

New Linux Malware “EvilGnome” Spying on Linux Desktop Users and Steal Sensitive Files

Researchers discovered a new Linux malware called "EvilGnome" with previously unseen functionalities that capable of creating a backdoor and spying the Linux desktop users. Based...

Hackers Use Linux Malware HiddenWasp to Attack Linux Systems for Gaining Remote Access

A new sophisticated, unique Linux malware dubbed HiddenWasp used in targeted attacks against victim's who are already under attack or gone through a heavy...