Tag: malware

  • Secure your Linux Laptop or PC

    Secure your Linux Laptop or PC

    How to Make Your Linux Laptop More Secure in 7 Steps. Chances are that part of the reason you broke away from Microsoft and switched to Linux is the open-source OS’s reputation for greater security. That doesn’t mean your Linux distro is impenetrable, though, and certainly not out of the box. Here are seven steps…

  • New Malware Is Going After VMware Systems

    New Malware Is Going After VMware Systems

    This dangerous new Linux malware is going after VMware systems with multiple extortion attempts. Cybersecurity researchers from Trend Micro recently found a Linux variant of the dreaded Play ransomware strain targeting VMWare ESXi environments. In a technical breakdown, Trend Micro’s Threat Hunting team said this was the first time Play was seen targeting ESXi environments,…

  • Malware Variant Targets ESXi Environments

    Malware Variant Targets ESXi Environments

    In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution. Discovered in June 2021, The TargetCompany ransomware is tracked by Trend Micro as “Water Gatpanapun” and has a leak site under the name “Mallox.” We have…

  • Linux Commands for Malware Analysis

    Linux Commands for Malware Analysis

    6 Linux Commands I Use for Malware AnalysisVlad Ananin of ANY.RUN shares his favorite Linux commands that help him in analyzing malware. Linux cybersecurity analysts spend countless hours dissecting malicious software to understand its functionality, origin, and impact. Here are six Linux commands that help me in this process, which I believe every professional in…

  • New kernel vulnerability grants root privileges

    New kernel vulnerability grants root privileges

    A recently discovered vulnerability in the Linux kernel could allow an attacker to gain root privileges. Exploits are available for several Linux distributions, but the vulnerability does not appear to be fully patched. The Linux world has barely recovered from the security fiasco surrounding a backdoor based on the XZ compression tools before a new…

  • Timeline of the xz Open Source attack

    Timeline of the xz Open Source attack

    Editor’s Note: Linking this very important post-mortem of how a malicious group of hackers created a backdoor on an important OS repository. Full source is at the bottom. Thanks to Kevin G. for sending this to us. Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent,…