Thursday, February 27, 2025

Linux malware

FreakOut Malware that Exploits Critical Vulnerabilities in Linux Devices

Check Point Research (CPR) encountered that ongoing attacks involve a new malware variant, called ‘FreakOut.’The purpose behind these attacks is to create an IRC...

NSA Revealed A Russian APT28 Hackers Made Previously Undisclosed Stealthy “Drovorub” Linux Malware

Recently, NSA, along with FBI, has revealed a Russian APT28 Linux malware named "Drovorub." The experts asserted that this malware is managed by the...

REMnux – A Linux-based Malware Analysis Toolkit for Malware Researchers

REMnux is a Linux distro for malware researchers that has a curated collection of free tools used for examining executables, documents, scripts, and other...

Lazarus APT Group Uses Cross-platform Malware Framework to Launch Attack Against Corporate Entities

Lazarus APT group believed to be run by the North Korean government, the group know to be active since 2009. The group is financially...

5 APT Hacker Groups Attack Linux Servers, Windows and Android Platform Using RAT’s For Past 10 Years

Researchers uncovered a new cross-platform attack from 5 different APT groups that work for the Chinese Government targets the Linux servers, Windows and Android...

Lazarus APT Hackers Group Attack Linux & Windows Platform Using Dacls RAT

Researchers discovered a previously unknown fully functional Remote Access Trojan called "Dacls" from infamous Lazarus APT hackers group to attack Linux and Windows Platform.This...

Momentum Botnet Attacks Linux Devices and Recruit them as Botnet to Launch DDoS Attacks Using 36 Different Methods

Security researchers from Trend Micro observed a new malware activity targeting devices running the Linux platform, the malware samples found to be connected with...

Multi-Platform Malware “ACBackdoor” Attack Both Windows & Linux Users PC by Executing Arbitrary Code

Researchers discovered a previously undetected multi-platform malware called ACbackdoor that has both Linux and Windows Variant to infect the respective users and steal sensitive...