Linux malware

There are 16 articles related to this topic
16

Operation Windigo: “Good job, ESET!” says malware author

Following the recognition at Virus Bulletin 2014 of ESET’s research on Operation Windigo, I took the opportunity to ask Marc-Etienne Léveillé – who worked directly on the Operation Windigo report a few questions. Marc-Etienne is a malware researcher at ESET.

read more
15

How to resolve Shellshock on Mac OS X, web servers and more

The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patched to prevent abuse by malicious persons. Here's advice about what to do and links to more in-depth resources.

read more
14

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

read more
13

Darkleech and the Android Master Key: making a hash of it

I made a comment recently that was subsequently quoted in a recent ESET blog – Android “master key” leaves 900 million devices vulnerable, researchers claim – and it appears that comment may have confused one or two people. What I actually said was this: “Security based on application whitelisting relies on an accurate identification of

read more
12

The Home Campaign: overstaying its welcome

The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.

read more
11

Linux/Cdorked.A malware: Lighttpd and nginx web servers also affected

Some 400 web servers found infected with Linux/Cdorked.A. including 50 in Alexa’s top 100,000 websites. And this backdoor has been applied to Lighttpd and nginx binaries in addition to Apache.

read more
10

Linux Apache malware: Why it matters to you and your business

This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.

read more
9

The stealthiness of Linux/Cdorked: a clarification

We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive "other than its modified httpd binary" which can be scanned for detection in several ways.

read more
8

Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole

Analysis of a malicious backdoor serving Blackhole exploit pack found on Linux Apache webserver compromised by malware dubbed Linux/Cdorked.A, together with remediation tool and techniques.

read more
7

Linux/SSHDoor.A Backdoored SSH daemon that steals passwords

In his summary of New Year predictions by security researchers here at ESET, Stephen Cobb pointed to expanded efforts by malware authors to target the Linux operating system. Looks like that might be right: A blog post published by Sucuri yesterday describes a backdoored version of the SSH daemon discovered on compromised servers. Interestingly, this

read more

Follow us

HOT TOPICS

Android

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Android ransomware

The latest ESET discovery of the first known Android lock-screen-type ransomware that spreads in the wild and sets the phone's PIN lock is examined.

arrests

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Ashley Madison

Cheating network Ashley Madison has been hacked, compromising the private details of the service's owners and 37 million users. The site, which has the slogan “Life is short. Have an affair.”, was attacked by a group calling itself the Impact Team, which claims to have gained complete access to the company’s databases – including user names, addresses and profiles, as well as company documents, emails and more.

Banking malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Barack Obama

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Bitcoin

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

BlackEnergy

On December 23rd, 2015, around half of the homes in the Ivano-Frankivsk region in Ukraine (population around 1.4 million) were left without electricity for a few hours. According to the Ukrainian news media outlet TSN, the cause of the power outage was a “hacker attack” utilizing a “virus”.

blackphone

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Botnet

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Brazil

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Celebgate

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

credit card fraud

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

crime

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Cybercrime

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

cycling

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Darkode

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

DEF CON

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

domain registrar

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

eNom

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

fa

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Facebook

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Facebook security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Fappening

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Google Play porn clicker

Google Play porn clicker, described as a large-scale campaign, belong to a single family of malicious apps masquerading as popular games and/or applications. They are designed and systematically modified to bypass Google’s security checks.

Google security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

hack

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

hacking

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

healthcare

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Healthcare IT security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Heartbleed

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Internet of Things

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

interview

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

lessons

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Linux malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Malware

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Mobile

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Mobile connectivity

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Mr. Robot

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

North Korea

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

password

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

payment cards

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

phishing

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Phone scams

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Pokémon GO

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

prison

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

privacy

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

scam

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Seguridad en IoT

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

sony

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Sony Pictures

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

spam

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Stegano exploit kit

Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of malicious ads, is capable of performing this dirty job.

Target

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Team Sky

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

threats

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

tor

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Tour de France

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

twitter

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

two factor authentication

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Valentine's Day

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

vm

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Vulnerabilidades

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Wi-Fi security

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Windigo

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

windows

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Windows XP

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences

Copyright © 2016 ESET, All Rights Reserved.