Linux 🐧.. No more safe .. windfall coming !

Here we had covered lot many threats , Vulnerability related to Windows a lot and covered little about linux . It’s not mean that later OS is safer .. it’s started raining threats in linux. Researchers predicted still worst have to come .

Linux users have been warned to up their security protection following new research which found the system could be facing a significant rise in cyber threats.

A rise in the amount of criminals targeting Linux, which is often thought to be safer and more secure than other operating systems.

Linux security

The trend in attacks is particularly worrying as more organisations choose Linux for strategically important servers and systems over Windows.

Researchers found Linux systems could potentially be at risk from advanced persistent threats (APTs) and targeted attacks from hackers that have created specifically Linux-focused tools.

A dozen APT actors, including dangerous threat groups such as Lazarus, have been observed to use Linux malware or some Linux-based modules in recent years, diversifying their attacks across multiple operating systems in a bid to maximize returns.

The company notes that there is a myth that Linux, being a less popular operating system, is unlikely to be targeted by malware. However this is often not the case, with smaller, more targeted attacks becoming the norm, especially in systems using multiple operating systems, where access to an infected device could allow hackers into endpoints running Windows or macOS.

Lazarus, which is reportedly based in North Korea, the group used Linux malware to carry out widespread attacks and attempts to target multiple organisations in the US and Europe.

“Aiming to secure their systems, IT and security departments are using Linux more often than before. Threat actors are responding to this with the creation of sophisticated tools that are able to penetrate such systems. Cybersecurity experts to take this trend into account and implement additional measures to protect their servers and workstations.”

Maintaining a list of trusted software sources and avoid using unencrypted update channels, and not running binaries and scripts from untrusted sources will be some of the escape route from both g threat

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s