A new Mirai botnet variant tracked as ‘V3G4’ targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of service) attacks. The malware spreads by ...
Since at least May 2021, stealthy Linux malware called AVrecon was used to infect over 70,000 Linux-based small office/home office (SOHO) routers and add them to a botnet designed to steal bandwidth ...
Chinese hackers have built new all-in-one malware to target Linux devices, a new report from cybersecurity researchers ESET, have said. The WolfsBane malware features a dropper, launcher, a backdoor, ...
A botnet targeting Internet of Things devices running on the Linux operating system works by brute forcing credentials and downloading cryptomining software. See Also: Cracking the Code: Securing ...
ESET researchers have recently discovered a new Linux backdoor, named WolfsBane, that is being used by the China-aligned Gelsemium APT group. This is the first known instance of Gelsemium using Linux ...
The identification of a Linux variant of PingPull malware, as well as the recent use of the Sword2033 backdoor, shows Alloy Taurus continues to evolve its operations in support of its espionage ...
A hidden malware operation has infiltrated the Linux community for a solid three years without raising alarms, says Kaspersky, a Russian cybersecurity firm. Despite Linux being hailed as a secure ...
Two well-documented Chinese backdoors have recently been modified to operate on Linux systems. The advanced persistent threat (APT) "Gelsemium" is a decade old now, and the new malware tied to the ...
A newly uncovered malware campaign targeting both Windows and Linux systems has revealed advanced evasion and credential theft techniques, according to the Sysdig Threat Research Team (TRT). The ...
Threat actors are typosquatting popular Go packages such as Hypert and Layout to drop malware on Linux and macOS systems. In a new typosquatting campaign, threat actors are seen using malicious Go ...
The Linux Foundation last week emailed all of its users, warning them that an attacker had compromised LinuxFoundation.org and Linux.com, as well as their subdomains. The attacker may also have stolen ...
Using the “less” Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher. At first ...