Linux Hacks & Cracks
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
New Linux security threats mark critical junctures that challenge existing policies and test security protocols to their limit. One such milestone was the recent discovery of Bootkitty, the first known UEFI bootkit explicitly designed to target Linux systems, unlike many of those targeting Windows systems in recent years. Bootkitty's appearance illustrates a crucial shift as its prevalence underscores an ever-increasing sophistication and diversity of threats facing Linux administrators and infosec professionals, signaling an urgent need for tailored defenses to protect these environments.
Security researchers have discovered a sophisticated strain of malware targeting Linux servers dubbed Perfctl. Its dual purpose is mining cryptocurrency and proxyjacking.
WolfsBane, the latest Linux variant of the Gelsevirine backdoor, marks a historic turning point in cybersecurity. Attributed to the Gelsemium advanced persistent threat (APT) group, this Linux-based threat broadened their focus from being exclusively Windows-centric since 2014. With sophisticated cyber espionage campaigns by this APT group dating back to 2014, this recent shift to targeting Linux systems is an alarming move considering Linux's widespread deployment across critical infrastructure environments and enterprises.
Recently, cybersecurity researchers discovered a Linux variant of the Helldown ransomware strain. This finding signals that threat actors have begun targeting VMware and Linux systems as attack vectors, indicating an increased focus on such platforms for attacks targeting Linux-based machines.
Security threats continue to emerge from every corner of the cyber universe, with malicious actors constantly innovating new techniques to breach systems and remain undetected. One such creative attack is an emerging campaign dubbed "CRON#TRAP," which uses emulated Linux environments to execute malicious commands stealthily.
Cisco Talos' recent discovery of a Rust variant of the Akira ransomware targeting ESXi servers demonstrates how quickly modern cyber threats evolve. Akira ransomware is one of the most formidable. According to their research, Its operators have continuously developed their tactics, techniques, and procedures (TTPs), solidifying their position as notorious adversaries.
Recent advancements by cybersecurity researchers have shed additional light on Cicada3301, an emerging and formidable ransomware-as-a-service (RaaS) threat. Thanks to an analysis conducted by Group-IB researchers who gained access to its affiliate panel on the dark web, a deeper understanding of Cicada3301's operations, targets, and potential effects on the cyber threat landscape has been achieved, enabling businesses to prepare themselves for this emerging risk more effectively.
U.S. authorities are on high alert as they investigate an alleged Chinese state-sponsored hack targeting major U.S. telecommunications companies. This attack has reignited debate about encryption backdoors, an ongoing contention among security practitioners.
As malware threats evolve to increasingly target Linux systems, admins and organizations must stay up-to-date on the latest Linux malware variants and strategies for detecting and preventing attacks. Security researcher HaxRob recently discovered a new Linux variant of the FASTCash malware, which targets payment switches to enable unauthorized ATM withdrawals.
Open-source projects are renowned for their collaborative nature and widespread adoption, yet more sophisticated supply chain attacks target them than ever. Checkmarx researchers recently identified that malicious actors are exploiting entry points into popular package ecosystems such as PyPI (Python's package index) and npm (Node.js package manager) to Trojanize command-line interface (CLI) commands from running.
Elastic researchers recently identified an advanced Linux malware campaign targeting Apache2 web servers, underscoring the need for sysadmins and cybersecurity specialists to be increasingly aware of the growing Linux malware threat. Constant vigilance in cybersecurity is necessary to guard systems from emerging attacks, especially as cyber threats continue to advance and become more challenging to detect.
A new variant of the Mallox ransomware, which traditionally targeted Windows systems, has been observed targeting Linux environments. This ransomware strain is based on the leaked source code of the Kryptina ransomware.
Security researchers have recently observed an alarming resurgence of TeamTNT, a notorious hacking group known for targeting cloud infrastructures. Their latest campaign zeroes in on Virtual Private Server (VPS) environments running CentOS, particularly version 7.
Ransomware has long been a severe threat to organizations and admins alike. Recently, cybersecurity researchers discovered a new variant called Cicada3301, which some experts believe has links with BlackCat (aka ALPHV) due to similarities in operations. Cicada3301 is a Rust-based ransomware that targets Windows and Linux/ESXi hosts.
As cybersecurity evolves, so too has its threats. Symantec recently identified an emerging threat aimed at Linux systems. This new type of ransomware (called double extortion by its creators) encrypts files and exfiltrates and holds onto data, demanding ransom payments in return. Such sophisticated cybercriminal tactics highlight their audacity while attacking many enterprise and cloud environments - an audacious move by cybercriminals targeting such essential infrastructure as server farms.
The Play ransomware group, well-known for its double-extortion tactics, recently unveiled a Linux variant targeting ESXi environments. This development represents a significant evolution of ransomware strategies, and admins and businesses must understand these threats to implement effective defenses against them.
Security professionals and system administrators face growing cyber threats in today's digital environment, making defending systems increasingly challenging. A recent discovery by Phylum revealed a sophisticated large-scale operation targeting Node Package Manager (npm), GitHub repositories, and Content Delivery Networks (CDNs) via trojanized versions of the jQuery JavaSecript library.
Cybersecurity threats continue to emerge regularly, and Promon's security team recently identified one such novel threat, Snowblind. This malware targets Android apps used for banking apps in Southeast Asia using an unconventional exploit method involving seccomp, a Linux kernel feature. Snowblind first surfaced through Promon partner i-Sprint's discovery and represents a significant shift in attack vectors in that region.
The recent discovery of a backdoor in Linux's xz compression tool has shed light on cybercriminals' ingenious methods of gaining entry and remaining undetected within critical infrastructure foundations. The xz backdoor presents an acute threat to security and system integrity, and its creators leveraged sophisticated methods to remain undetected.
Wordfence security researchers recently shed light on an infamous supply chain attack that may have affected as many as 36,000 WordPress websites. Five widely used plugins were infected with malware, which opened a backdoor that allowed attackers to manipulate SEO elements and gain administrative access. This shocking discovery should warn developers, administrators, and website owners about the dangers lurking within software supply chains.