Here is a story that shows you always have to keep your guard up when dealing with cyber-security, as the threat landscape is constantly changing and the threat actors will always choose vectors that are in the news. This particular attack comes right back here to Smart Thinking – malware …
The “Swiss Army Knife” of Linux malware
Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …
New ransomware in the wild
A new strain of malware/ransomware has been discovered by the MalwareHunterTeam – who have Tweeted out details and images. The ransomware is being called RedAlert, or N13V, and target Windows and Linux VMWare ESXi servers. New RedAlert Ransomware targets Windows, Linux VMware ESXi servers (bleepingcomputer.com) Double extortion Similar to other …
Linux botnet runs crypto-miner malware
Linus servers are everywhere on the Internet, providing the infrastructure and hosting the Web sites and services we all use. So stealth malware that steals the performance of Linux machines is an issue for admins everywhere. Even though this attack appears to be tailored to specific targets, if you are …
Stealth Linux malware – using new methods of evasion
The discovery of Linux backdoor malware is unusual as it uses stealth techniques that have not been seen before. This malware is extremely hard to detect as it does a very efficient job of cleaning the infected systems of any traces of it’s operations. Once infected the malware gives high …
Continue reading “Stealth Linux malware – using new methods of evasion”