Linux malware
View on WikipediaLinux malware includes viruses, Trojans, worms and other types of malware that affect the Linux family of operating systems. Linux, Unix and other Unix-like computer operating systems are generally regarded as very well-protected against, but not immune to, computer viruses.[1][2]
Linux vulnerability
[edit]Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.[2]
In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target. Rick Moen, an experienced Linux system administrator, counters that:
[That argument] ignores Unix's dominance in a number of non-desktop specialties, including Web servers and scientific workstations. A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen.[3]
In 2008 the quantity of malware targeting Linux was noted as increasing. Shane Coursen, a senior technical consultant with Kaspersky Lab, said at the time, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system ... The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS."[4]
Tom Ferris, a researcher with Security Protocols, commented on one of Kaspersky's reports, stating, "In people's minds, if it's non-Windows, it's secure, and that's not the case. They think nobody writes malware for Linux or Mac OS X. But that's not necessarily true."[4]
Some Linux users do run Linux-based anti-virus software to scan insecure documents and email which comes from or is going to Windows users. SecurityFocus's Scott Granneman stated:
...some Linux machines definitely need anti-virus software. Samba or NFS servers, for instance, may store documents in undocumented, vulnerable Microsoft formats, such as Word and Excel, that contain and propagate viruses. Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users.[1]
Because they are predominantly used on mail servers which may send mail to computers running other operating systems, Linux virus scanners generally use definitions for, and scan for, all known viruses for all computer platforms. For example, the open source ClamAV "Detects ... viruses, worms and trojans, including Microsoft Office macro viruses, mobile malware, and other threats."[5]
Cases of malware intended for Microsoft Windows systems posing a danger to Linux systems when run through compatibility layers such as Wine, while uncommon, have been recorded.[6]
Viruses and trojan horses
[edit]The viruses listed below pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be temporarily infected, as the Linux kernel is memory resident and read-only. Any infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.
This is true for any malicious program that is run without special steps taken to limit its privileges. It is trivial to add a code snippet to any program that a user may download and let this additional code download a modified login server, an open mail relay, or similar program, and make this additional component run any time the user logs in. No special malware writing skills are needed for this. Special skill may be needed for tricking the user to run the (trojan) program in the first place.
The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who try to ensure that their repository is malware-free. Subsequently, to ensure safe distribution of the software, checksums are made available. These make it possible to reveal modified versions that may have been introduced by e.g. hijacking of communications using a man-in-the-middle attack or via a redirection attack such as ARP or DNS poisoning. Careful use of these digital signatures provides an additional line of defense, which limits the scope of attacks to include only the original authors, package and release maintainers and possibly others with suitable administrative access, depending on how the keys and checksums are handled. Reproducible builds can ensure that digitally signed source code has been reliably transformed into a binary application.
Worms and targeted attacks
[edit]The classical threat to Unix-like systems are vulnerabilities in network daemons, such as SSH and web servers. These can be used by worms or for attacks against specific targets. As servers are patched quite quickly when a vulnerability is found, there have been only a few widespread worms of this kind. As specific targets can be attacked through a vulnerability that is not publicly known there is no guarantee that a certain installation is secure. Also servers without such vulnerabilities can be successfully attacked through weak passwords.
Web scripts
[edit]Linux servers may also be used by malware without any attack against the system itself, where e.g. web content and scripts are insufficiently restricted or checked and used by malware to attack visitors. Some attacks use complicated malware to attack Linux servers, but when most get full root access then hackers are able to attack by[7] modifying anything like replacing binaries or injecting modules. This may allow the redirection of users to different content on the web.[8] Typically, a CGI script meant for leaving comments, could, by mistake, allow inclusion of code exploiting vulnerabilities in the web browser.
Buffer overruns
[edit]Older Linux distributions were relatively sensitive to buffer overflow attacks: if the program did not care about the size of the buffer itself, the kernel provided only limited protection, allowing an attacker to execute arbitrary code under the rights of the vulnerable application under attack. Programs that gain root access even when launched by a non-root user (via the setuid bit) were particularly attractive to attack. However, as of 2009 most of the kernels include address space layout randomization (ASLR), enhanced memory protection and other extensions making such attacks much more difficult to arrange.
Cross-platform viruses
[edit]An area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an OpenOffice.org virus called Badbunny.
Stuart Smith of Symantec wrote the following:
What makes this virus worth mentioning is that it illustrates how easily scripting platforms, extensibility, plug-ins, ActiveX, etc, can be abused. All too often, this is forgotten in the pursuit to match features with another vendor... The ability for malware to survive in a cross-platform, cross-application environment has particular relevance as more and more malware is pushed out via Web sites. How long until someone uses something like this to drop a JavaScript infecter on a Web server, regardless of platform?[9]
Social engineering
[edit]As is the case with any operating system, Linux is vulnerable to malware that tricks the user into installing it through social engineering. In December 2009 a malicious waterfall screensaver that contained a script that used the infected Linux PC in denial-of-service attacks was discovered.[10]
Go-written malware
[edit]The IBM Security Report: Attacks on Industries Supporting COVID-19 Response Efforts Double had as a key point that "Cybercriminals Accelerate Use of Linux Malware – With a 40% increase in Linux-related malware families in the past year, and a 500% increase in Go-written malware in the first six months of 2020, attackers are accelerating a migration to Linux malware, that can more easily run on various platforms, including cloud environments." That these cybercriminals are increasingly using Linux and Unix to target hospitals and allied industries (that rely on these systems and cloud networks) that they are increasingly vulnerable during the COVID-19 crisis, such as the Red Cross cyberattack.[11]
Anti-virus applications
[edit]
There are a number of anti-virus applications available which will run under the Linux operating system. Most of these applications are looking for exploits which could affect users of Microsoft Windows.
For Microsoft Windows-specific threats
[edit]These applications are useful for computers (typically, servers) which will pass on files to Microsoft Windows users. They do not look for Linux-specific threats.
- Avast! (proprietary; freeware version available)
- AVG (proprietary; freeware version available)
- Avira (proprietary; freeware version was available, discontinued due to lack of demand)[12]
- BitDefender (proprietary; freeware version available)
- ClamAV (free and open source software)[13]
- Comodo (proprietary; freeware version available)[14]
- Crowdstrike (Proprietary)
- Dr.Web (proprietary)[15]
- F-Prot (proprietary; freeware version available)[16]
- F-Secure Linux (proprietary)
- Kaspersky Linux Security (proprietary)[17]
- McAfee VirusScan Enterprise for Linux (proprietary)[18]
- Panda Security for Linux (proprietary)[19]
- Sophos (proprietary)
- Symantec AntiVirus for Linux (proprietary)[20]
- Trend Micro ServerProtect for Linux (proprietary)
For Linux-specific threats
[edit]These applications look for actual threats to the Linux computers on which they are running.
- chkrootkit (free and open source software)[21]
- ClamAV (free and open source software)[22]
- Comodo (proprietary)[23]
- Crowdstrike (proprietary)
- Dr.Web (proprietary)[15]
- ESET (proprietary)[24][25][26][27][citation needed]
- Kaspersky Virus Removal Tool (KVRT) for Linux (free)[28]
- Linux Malware Detect[29]
- lynis (open source auditing)[30][31]
- rkhunter (free and open source software)[32]
- Samhain (free and open source software)[33]
- Sophos (proprietary)[34][35]
Linux malware can also be detected (and analyzed) using memory forensics tools, such as:
- Forcepoint (proprietary)[36]
- Volatility[37] (free and open source software)[38]
Threats
[edit]The following is a partial list of known Linux malware. However, few if any are in the wild, and most have been rendered obsolete by Linux updates or were never a threat. Known malware is not the only or even the most important threat: new malware or attacks directed to specific sites can use vulnerabilities previously unknown to the community or unused by malware.
Botnets
[edit]- Mayhem – 32/64-bit Linux/FreeBSD multifunctional botnet[39]
- Linux.Remaiten – a threat targeting the Internet of things.[40][41][42]
- Mirai (malware) – a DDoS botnet spreads through telnet service and designed to infect Internet of Things (IoT).[43][44][45][46]
- GafGyt/BASHLITE/Qbot – a DDoS botnet spreads through SSH and Telnet service weak passwords, firstly discovered during bash Shellshock vulnerability.[47]
- LuaBot – a botnet coded with modules component in Lua programming language, cross-compiled in C wrapper with LibC, it aims for Internet of Things in ARM, MIPS and PPC architectures, with the usage to DDoS, spreads Mirai (malware) or selling proxy access to the cyber crime.[48][49]
- Hydra,[50] Aidra,[51] LightAidra[52] and NewAidra[53] – another form of a powerful IRC botnet that infects Linux boxes.
- EnergyMech 2.8 overkill mod (Linux/Overkill) – a long-lasting botnet worm designed to infect servers with its bot and operated through IRC protocol, for the purposes of DDoSing and spreading itself.[54]
Ransomware
[edit]- Linux.Encoder.1[55][56]
- Lilocked[57][58]
Rootkits
[edit]- Snakso – a 64-bit Linux webserver rootkit[59]
- Pigmy Goat - used in Sophos Firewall in 2024 [60]
Trojans
[edit]- Effusion – 32/64-bit injector for Apache/Nginx webservers, (7 Jan 2014)[61]
- Hand of Thief – Banking trojan, 2013,[62][63]
- Kaiten – Linux.Backdoor.Kaiten trojan horse[64]
- Rexob – Linux.Backdoor.Rexob trojan[65]
- Waterfall screensaver backdoor – on gnome-look.org[66]
- Tsunami.gen – Backdoor.Linux.Tsunami.gen[67]
- Turla – HEUR:Backdoor.Linux.Turla.gen[68][69]
- Xor DDoS[70] – a trojan malware that hijacks Linux systems and uses them to launch DDoS attacks which have reached loads of 150+ Gbps.[71]
- Hummingbad – has infected over 10 million Android operating systems. User details are sold and adverts are tapped on without the user's knowledge thereby generating fraudulent advertising revenue.[72]
- NyaDrop – a small Linux backdoor compiled from a Linux shellcode to be used to infect Linux boxes with bigger size Linux malware.[73]
- PNScan – Linux trojan designed to aim routers and self-infecting to a specific targeted network segment in a worm-like form[74]
- SpeakUp – a backdoor trojan that infects six different Linux distributions and macOS devices.[75]
Viruses
[edit]- 42[76][77]
- Arches[78]
- Alaeda – Virus.Linux.Alaeda[79]
- Binom – Linux/Binom[80]
- Bliss – requires root privileges
- Brundle[81]
- Bukowski[82]
- Caveat[83][84]
- Cephei – Linux.Cephei.A (and variants)[85]
- Coin[86][87]
- Hasher[88][89]
- Lacrimae (aka Crimea)[90][91]
- Nuxbee – Virus.Linux.Nuxbee.1403[92]
- PiLoT[93][94]
- Podloso – Linux.Podloso (The iPod virus)[95][96]
- RELx[97]
- Rike – Virus.Linux.Rike.1627[98]
- RST – Virus.Linux.RST.a[99] (known for infecting Korean release of Mozilla Suite 1.7.6 and Thunderbird 1.0.2 in September 2005[100])
- Staog, the first computer virus on Linux
- Vit – Virus.Linux.Vit.4096[101]
- Winter – Virus.Linux.Winter.341[102]
- Winux (also known as Lindose and PEElf)[103]
- Wit virus[104]
- Zariche – Linux.Zariche.A (and variants)[105]
- ZipWorm – Virus.Linux.ZipWorm[106]
Worms
[edit]- Adm – Net-Worm.Linux.Adm[107]
- Adore[108]
- Bad Bunny – Perl.Badbunny[9][109]
- Cheese – Net-Worm.Linux.Cheese[110]
- Devnull
- Kork[111]
- Linux/Lion
- Linux.Darlloz – targets home routers, set-top boxes, security cameras and industrial control systems.[112][113]
- Linux/Lupper.worm[114]
- Mighty – Net-Worm.Linux.Mighty[115]
- Millen – Linux.Millen.Worm[116]
- Ramen worm - targeted only Red Hat Linux distributions versions 6.2 and 7.0
- Slapper[117]
- SSH Bruteforce[118]
See also
[edit]References
[edit]- ^ a b Granneman, Scott (October 2003). "Linux vs. Windows Viruses". Archived from the original on 5 March 2021. Retrieved 6 March 2008.
- ^ a b Yeargin, Ray (July 2005). "The short life and hard times of a linux virus". Archived from the original on 1 May 2008. Retrieved 6 December 2015.
- ^ "Virus Department". Archived from the original on 25 December 2015. Retrieved 24 December 2015.
- ^ a b Patrizio, Andy (April 2006). "Linux Malware On The Rise". Archived from the original on 5 February 2012. Retrieved 8 March 2008.
- ^ ClamAV (2010). "Clam AntiVirus 0.96 User Manual" (PDF). Archived (PDF) from the original on 19 February 2011. Retrieved 22 February 2011.
- ^ Duncan, Rory; Schreuders, Z. Cliffe (1 March 2019). "Security implications of running windows software on a Linux system using Wine: a malware analysis study". Journal of Computer Virology and Hacking Techniques. 15 (1): 39–60. doi:10.1007/s11416-018-0319-9. ISSN 2263-8733.
- ^ Prince, Brian (5 January 2013). "Stealthy Apache Exploit Redirects Victims to Blackhole Malware".
- ^ Prince, Brian (1 May 2013). "Stealthy Apache Exploit Redirects Victims to Blackhole Malware". eWeek. Retrieved 19 November 2014.
- ^ a b Smith, Stuart (June 2007). "Bad Bunny". Archived from the original on 24 March 2008. Retrieved 20 February 2008.
- ^ Kissling, Kristian (December 2009). "Malicious Screensaver: Malware on Gnome-Look.org". Archived from the original on 13 December 2009. Retrieved 12 December 2009.
- ^ "IBM Security Report: Attacks on Industries Supporting COVID-19 Response Efforts Double". IBM Newsroom.
- ^ "Discontinuation of Antivirus solutions for Linux systems on June 30th 2016". Archived from the original on 14 December 2017. Retrieved 14 October 2014.
- ^ "ClamAV". Archived from the original on 22 July 2013. Retrieved 22 February 2011.
- ^ Comodo Group (2015). "Comodo Antivirus for Linux". Archived from the original on 11 December 2015. Retrieved 17 October 2012.
- ^ a b "Dr.Web anti-virus for Linux". Dashke. Archived from the original on 27 February 2019. Retrieved 25 May 2010.
- ^ FRISK Software International (2011). "F-PROT Antivirus for Linux x86 / BSD x86". Archived from the original on 4 December 2011. Retrieved 13 December 2011.
- ^ "Kaspersky Linux Security - Gateway, mail and file server, workstation protection for Linux/FreeBSD". Kaspersky Lab. Archived from the original on 24 June 2011. Retrieved 11 February 2009.
- ^ "McAfee VirusScan Enterprise for Linux". McAfee. Archived from the original on 18 December 2016. Retrieved 27 December 2012.
- ^ "Panda Security Antivirus Protection for Linux". Panda Security. Archived from the original on 29 January 2009. Retrieved 13 January 2009.
- ^ Symantec (January 2009). "System requirements for Symantec AntiVirus for Linux 1.0". Archived from the original on 29 April 2007. Retrieved 7 March 2009.
- ^ "chkrootkit -- locally checks for signs of a rootkit". www.chkrootkit.org. Archived from the original on 13 January 2020. Retrieved 7 September 2019.
- ^ "ClamavNet". www.clamav.net. Archived from the original on 22 July 2013. Retrieved 3 December 2008.
- ^ "COMODO Antivirus for Linux (CAVL) v1.1.268025.1 is released!". comodo.com. 28 February 2013. Archived from the original on 18 November 2018. Retrieved 12 June 2014.
- ^ "ESET File Security - Antivirus Protection for Linux, BSD, and Solaris". Eset. Archived from the original on 18 November 2018. Retrieved 26 October 2008.
- ^ "ESET Mail Security - Linux, BSD, and Solaris mail server protection". Eset. Archived from the original on 12 May 2008. Retrieved 26 October 2008.
- ^ "ESET NOD32 Antivirus for Linux Gateway Devices". Eset. Archived from the original on 10 May 2008. Retrieved 26 October 2008.
- ^ "ESET NOD32 Antivirus 4 for Linux Desktop". Eset. Archived from the original on 21 July 2015. Retrieved 12 June 2014.
- ^ "KVRT for Linux: Malware scanner for Linux systems". 30 May 2024.
- ^ https://www.rfxn.com/projects/linux-malware-detect/ Archived 2020-01-15 at the Wayback Machine R-fx Networks project page of LMD
- ^ "Lynis - Security auditing and hardening tool for Linux/Unix". cisofy.com. Archived from the original on 4 February 2020. Retrieved 9 January 2017.
- ^ "Lynis: Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. - CISOf." 7 September 2019. Archived from the original on 5 February 2020. Retrieved 9 January 2017 – via GitHub.
- ^ "Root Kit Hunter". Archived from the original on 5 March 2013.
- ^ "samhain The SAMHAIN file integrity / host-based intrusion detection system". Retrieved 3 October 2021.
- ^ "Botnets, a free tool and 6 years of Linux/Rst-B | Naked Security". Nakedsecurity.sophos.com. 13 February 2008. Archived from the original on 27 January 2019. Retrieved 11 August 2013.
- ^ "Free Linux Malware Scanner | Lightweight Agent for Linux Malware Detection and Removal | Sophos". www.sophos.com. Archived from the original on 17 January 2020. Retrieved 30 October 2015.
- ^ "Forcepoint". Forcepoint. Archived from the original on 23 January 2020. Retrieved 7 September 2019.
- ^ volatilesystems.com Archived 2011-02-17 at the Library of Congress Web Archives
- ^ "Google Code Archive - Long-term storage for Google Code Project Hosting". code.google.com. Archived from the original on 27 August 2019. Retrieved 7 September 2019.
- ^ Kovalev et al (17 July 2014), Mayhem – a hidden threat for *nix web servers Archived 2016-01-06 at the Wayback Machine, Virus Bulletin
- ^ Michal Malík; Marc-Etienne M.Léveillé (30 March 2016). "Meet Remaiten - a Linux bot on steroids targeting routers and potentially other IoT devices". WeLiveSecurity. Archived from the original on 5 November 2018. Retrieved 4 November 2018.
- ^ "Threat Detail - ESET Virusradar". virusradar.com. Archived from the original on 15 April 2016. Retrieved 3 April 2016.
- ^ Mohit Kumar (31 March 2016). "Advanced Malware targeting Internet of the Things and Routers". The Hacker News. Archived from the original on 3 April 2016. Retrieved 3 April 2016.
- ^ njccic (28 December 2016). "Mirai Botnet". The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). Archived from the original on 12 December 2016. Retrieved 28 December 2016.
- ^ Krebs, Brian (21 September 2016). "KrebsOnSecurity Hit With Record DDoS". Brian Krebs. Archived from the original on 15 November 2016. Retrieved 17 November 2016.
- ^ Hackett, Robert (3 October 2016). "Why a Hacker Dumped Code Behind Colossal Website-Trampling Botnet". Fortune.com. Archived from the original on 22 October 2016. Retrieved 19 October 2016.
- ^ Newman, Lily Hay. "What We Know About Friday's Massive East Coast Internet Outage". WIRED. Archived from the original on 22 October 2016. Retrieved 21 October 2016.
- ^ Liam Tung (25 September 2014). "First attacks using shellshock Bash bug discovered". ZDNet. Archived from the original on 21 December 2014. Retrieved 25 September 2014.
- ^ Catalin Cimpanu (5 September 2016). "LuaBot Is the First DDoS Malware Coded in Lua Targeting Linux Platforms". Softpedia. Archived from the original on 6 September 2016. Retrieved 5 September 2016.
- ^ Catalin Cimpanu (17 September 2016). "LuaBot Author Says His Malware Is "Not Harmful"". Softpedia. Archived from the original on 18 September 2016. Retrieved 17 September 2016.
- ^ Infodox (12 June 2012). "Hydra IRC bot, the 25 minute overview of the kit". Insecurety Research. Archived from the original on 7 February 2014. Retrieved 12 June 2012.
- ^ Dan Goodin (21 March 2013). "Guerilla researcher created epic botnet to scan billions of IP addresses". Ars Technica. Archived from the original on 20 March 2013. Retrieved 21 March 2013.
- ^ John Leyden (9 September 2014). "Use home networking kit? DDoS bot is BACK... and it has EVOLVED". The Register. Archived from the original on 12 September 2014. Retrieved 9 September 2014.
- ^ John Leyden (31 October 2016). "A successor to Mirai? Newly discovered malware aims to create fresh IoT botnet". The Register. Archived from the original on 1 November 2016. Retrieved 31 October 2016.
- ^ unixfreaxjp (28 November 2016). "MMD-0061-2016 - EnergyMech 2.8 Overkill Mod". MalwareMustDie. Archived from the original on 19 January 2017. Retrieved 28 November 2016.
- ^ "Linux.Encoder.1". drweb.com. Archived from the original on 17 November 2015. Retrieved 10 November 2015.
- ^ Lucian Constantin (10 November 2015). "First Linux ransomware program cracked, for now". Computerworld. Archived from the original on 12 November 2015. Retrieved 10 November 2015.
- ^ "Lilocked". Archived from the original on 7 September 2019. Retrieved 7 September 2019.
- ^ Goud, Naveen (6 September 2019). "LiLocked Ransomware hits Linux Servers". Archived from the original on 21 February 2021. Retrieved 7 September 2019.
- ^ Leyden, John ( 21 November 2012), Evildoers can now turn all sites on a Linux server into silent hell-pits Archived 2016-11-16 at the Wayback Machine, The Register, retrieved 21 November 2012
- ^ "Custom "Pygmy Goat" malware used in Sophos Firewall hack on govt network".
- ^ Kovalev et al Effusion – a new sophisticated injector for Nginx web servers Archived 2016-01-06 at the Wayback Machine, Virus Bulletin
- ^ rsa.com. "Thieves Reaching for Linux—"Hand of Thief" Trojan Targets Linux #INTH3WILD » Speaking of Security - The RSA Blog and Podcast". Blogs.rsa.com. Archived from the original on 15 August 2013. Retrieved 11 August 2013.
- ^ Vaughan, Steven J. "Linux desktop Trojan 'Hand of Thief' steals in". ZDNet. Archived from the original on 16 November 2014. Retrieved 11 August 2013.
- ^ Florio, Elia (February 2006). "Linux.Backdoor.Kaiten". Archived from the original on 14 May 2013. Retrieved 8 March 2008.
- ^ Florio, Elia (December 2007). "Linux.Backdoor.Rexob". Archived from the original on 14 May 2013. Retrieved 8 March 2008.
- ^ Vervloesem, Koen (December 2009). "Linux malware: an incident and some solutions". Archived from the original on 18 November 2016. Retrieved 16 September 2010.
- ^ "Backdoor.Linux.Tsunami.gen". Securelist. Archived from the original on 6 January 2016. Retrieved 9 May 2014.
- ^ "The 'Penquin' Turla - Securelist". securelist.com. 8 December 2014. Archived from the original on 20 November 2015. Retrieved 10 November 2015.
- ^ Joey-Elijah Sneddon (9 December 2014). "Yes, This Trojan Infects Linux. No, It's Not The Tuxpocalypse - OMG! Ubuntu!". OMG! Ubuntu!. Archived from the original on 1 October 2015. Retrieved 10 November 2015.
- ^ unixfreaxjp.wirehack7, shibumi (29 September 2014). "Linux/XOR.DDoS : Fuzzy reversing a new China ELF". MalwareMustDie. Archived from the original on 2 October 2014. Retrieved 29 September 2014.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Akamai Technologies (29 September 2015). "OR DDoS Botnet Launching 20 Attacks a Day From Compromised Linux Machines, Says Akamai". Archived from the original on 18 March 2016. Retrieved 18 March 2016.
- ^ Samuel Gibbs (6 July 2016). "HummingBad malware infects 10m Android devices". TheGuardian.com. Archived from the original on 19 June 2019. Retrieved 6 July 2016.
- ^ David Bisson (17 October 2016). "NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malware". Graham Cluley. Archived from the original on 5 November 2018. Retrieved 4 November 2018.
- ^ Catalin Cimpanu (25 August 2016). "PNScan Linux Trojan Resurfaces with New Attacks Targeting Routers in India". Softpedia. Archived from the original on 26 August 2016. Retrieved 25 August 2016.
- ^ Tara Seals (4 February 2019). "SpeakUp Linux Backdoor Sets Up for Major Attack". Archived from the original on 29 November 2019. Retrieved 4 February 2019.
- ^ herm1t (August 2008). "Linux.42: Using CRC32B (SSE4.2) instruction in polymorphic decryptor". Archived from the original on 7 January 2011.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (September 2008). "Life, the Universe, and Everything". Archived from the original on 13 August 2012. Retrieved 17 January 2010.
- ^ herm1t (August 2006). "Infecting ELF-files using function padding for Linux". Archived from the original on 22 January 2012.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Kaspersky Lab (May 2007). "Virus.Linux.Alaeda". Archived from the original on 13 July 2009. Retrieved 8 March 2008.
- ^ McAfee (December 2004). "Linux/Binom". Archived from the original on 24 January 2005. Retrieved 8 March 2008.
- ^ Rieck, Konrad and Konrad Kretschmer (August 2001). "Brundle Fly 0.0.1 - A Good-Natured Linux ELF Virus". Archived from the original on 14 May 2008. Retrieved 8 March 2008.
- ^ de Almeida Lopes, Anthony (July 2007). "Project Bukowski". Archived from the original on 14 May 2013. Retrieved 8 March 2008.
- ^ herm1t (February 2008). "Caveat virus". Archived from the original on 23 December 2018. Retrieved 17 January 2010.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (July 2009). "Can you spare a seg?". Archived from the original on 17 January 2012.
- ^ TMZ (January 2019). "Linux.Cephei - ESET Virusradar". Archived from the original on 5 July 2018.
- ^ herm1t (October 2007). "Reverse of a coin: A short note on segment alignment". Archived from the original on 3 March 2012. Retrieved 17 January 2010.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (September 2009). "Heads or tails?". Archived from the original on 17 January 2012.
- ^ herm1t (October 2007). "Hashin' the elves". Archived from the original on 10 October 2014. Retrieved 17 January 2010.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (August 2009). "Making a hash of things". Archived from the original on 17 January 2012.
- ^ herm1t (June 2008). "README". Archived from the original on 6 February 2012.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (February 2008). "Crimea river". Archived from the original on 17 January 2012.
- ^ Kaspersky Lab (December 2001). "Virus.Linux.Nuxbee.1403". Archived from the original on 2 March 2012. Retrieved 8 March 2008.
- ^ herm1t (November 2007). "INT 0x80? No, thank you!". Archived from the original on 23 December 2018. Retrieved 17 January 2010.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Ferrie, Peter (September 2009). "Flying solo". Archived from the original on 17 January 2012.
- ^ Ferrie, Peter (April 2007). "Linux.Podloso". Archived from the original on 30 May 2013. Retrieved 8 March 2008.
- ^ Ferrie, Peter (April 2007). "The iPod virus". Archived from the original on 2 March 2008. Retrieved 8 March 2008.
- ^ herm1t (December 2009). "From position-independent to self-relocatable viral code". Archived from the original on 24 May 2019. Retrieved 7 May 2010.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Kaspersky Lab (August 2003). "Virus.Linux.Rike.1627". Archived from the original on 2 March 2012. Retrieved 8 March 2008.
- ^ Kaspersky Lab (January 2002). "Virus.Linux.RST.a". Archived from the original on 7 November 2007. Retrieved 8 March 2008.
- ^ "The ways of viruses in Linux HOW SAFE?" (PDF). Archived from the original (PDF) on 17 May 2014. Retrieved 21 August 2009.
- ^ Kaspersky Lab (March 2000). "Virus.Linux.Vit.4096". Archived from the original on 7 November 2007. Retrieved 8 March 2008.
- ^ Kaspersky Lab (October 2000). "Virus.Linux.Winter.341". Archived from the original on 10 November 2007. Retrieved 8 March 2008.
- ^ Rautiainen, Sami; et al. (March 2001). "F-Secure Virus Descriptions: Lindose". Archived from the original on 21 June 2008. Retrieved 8 March 2008.
- ^ "The Wit Virus: A virus built on the ViT ELF virus" (PDF). Archived (PDF) from the original on 3 March 2016. Retrieved 31 December 2008.
- ^ TMZ (January 2015). "Linux.Zariche - ESET Virusradar". Archived from the original on 30 November 2018. Retrieved 23 January 2015.
- ^ Kaspersky Lab (January 2001). "Virus.Linux.ZipWorm". Archived from the original on 13 July 2009. Retrieved 8 March 2008.
- ^ Kaspersky Lab (May 2001). "Net-Worm.Linux.Adm". Archived from the original on 30 October 2007. Retrieved 8 March 2008.
- ^ Rautiainen, Sami (April 2001). "F-Secure Virus Descriptions: Adore". Archived from the original on 12 May 2013. Retrieved 8 March 2008.
- ^ Smith, Stuart (May 2007). "Perl.Badbunny". Archived from the original on 14 May 2013. Retrieved 8 March 2008.
- ^ Kaspersky Lab (May 2001). "Net-Worm.Linux.Cheese". Archived from the original on 28 October 2007. Retrieved 8 March 2008.
- ^ Rautiainen, Sami (April 2001). "F-Secure Virus Descriptions: Kork". Archived from the original on 12 May 2013. Retrieved 8 March 2008.
- ^ Mohit Kumar (30 November 2013). "Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability". The Hacker News. Archived from the original on 30 November 2018. Retrieved 4 December 2013.
- ^ Joe Casad (3 December 2013). "New Worm Attacks Linux Devices". Linux Magazine. Archived from the original on 6 December 2013. Retrieved 4 December 2013.
- ^ McAfee (June 2005). "Linux/Lupper.worm Description". Archived from the original on 24 November 2005. Retrieved 10 October 2010.
- ^ Kaspersky Lab (October 2002). "Net-Worm.Linux.Mighty". Archived from the original on 7 November 2007. Retrieved 8 March 2008.
- ^ Perriot, Frederic (February 2007). "Linux.Millen.Worm". Archived from the original on 16 May 2013. Retrieved 8 March 2008.
- ^ Rautiainen, Sami; et al. (September 2002). "F-Secure Virus Descriptions: Slapper". Archived from the original on 27 June 2012. Retrieved 8 March 2008.
- ^ Voss, Joel (December 2007). "SSH Bruteforce Virus by AltSci Concepts". Retrieved 13 March 2008.[permanent dead link]
External links
[edit]- Linuxvirus on the Official Ubuntu Documentation
Linux malware
View on GrokipediaIntroduction
Definition and Scope
Linux malware encompasses any malicious software engineered to infiltrate, disrupt, or exploit Linux-based operating systems, including self-replicating programs such as worms and non-replicating threats like backdoors that target the Linux kernel, major distributions such as Ubuntu and CentOS, or embedded systems in resource-constrained environments.[6][7] This definition highlights the adaptability of such threats to Linux's open-source architecture, where malware often leverages permissive file permissions, scripting languages like Bash, or system calls to achieve unauthorized access or control. The scope of Linux malware spans diverse computing ecosystems, from traditional desktop installations to high-stakes server deployments, cloud platforms like AWS EC2, container orchestration systems such as Docker and Kubernetes, and IoT devices powering smart infrastructure. Distinctions exist between user-space attacks, which operate within applications and processes to steal data or monitor activity, and kernel-space exploits that directly manipulate core operating system functions for elevated privileges and stealth.[8][9] As of 2025, Linux holds approximately 3% of the global desktop market share, reflecting its niche but growing presence among individual users and developers, yet it powers over 78% of web-facing servers and exceeds 80% of cloud instances on platforms like AWS EC2, rendering it a high-value target for cybercriminals seeking widespread enterprise disruption, data exfiltration, or cryptojacking operations.[10][11] Key persistence techniques unique to Linux environments involve exploiting the systemd init system—prevalent in most modern distributions—for creating rogue services or timers that restart malicious processes post-reboot, or injecting loadable kernel modules (LKMs) to embed code directly into the kernel for low-level evasion and longevity.[12][8] These mechanisms underscore Linux malware's emphasis on system integration over superficial infection, amplifying risks in interconnected, always-on infrastructures.History and Evolution
The first known Linux virus, Bliss, appeared in 1997 and attempted to infect executable files on Linux systems, but its impact was minimal owing to the open-source community's vigilant scrutiny and Linux's limited adoption on desktops at the time.[13] Early threats like this demonstrated proof-of-concept potential rather than widespread proliferation, as Linux's architecture and user permissions hindered easy propagation. In the 2000s, Linux malware evolved toward server-focused exploits, exemplified by the Slapper worm in 2002, which leveraged vulnerabilities in Apache web servers and OpenSSL libraries to create backdoors and propagate across Unix-like systems.[14] This period highlighted a strategic shift as Linux gained prominence in web hosting and enterprise infrastructure, drawing attackers to high-value targets like internet-facing servers rather than individual users.[15] The 2010s brought a rise in sophisticated, targeted attacks on Linux, influenced by state-sponsored operations akin to Stuxnet's focus on industrial control systems, with APT groups deploying specialized tools such as Turla's Penguin backdoor in 2014 for espionage and the Equation group's DOUBLEFANTASY implant in 2015 against government and critical infrastructure.[16] Cross-platform threats also proliferated, enabling malware to exploit Linux servers as pivots into Windows-dominated networks, underscoring Linux's role in hybrid environments.[16] Post-2020, Linux malware surged amid accelerated cloud migrations, which amplified Linux's dominance in virtualized and containerized deployments, exposing more systems to remote exploits.[17] Ransomware incidents exemplified this trend, with Trend Micro reporting a 62% increase in Linux-targeted attacks from the first half of 2022 to 2023, often via misconfigurations in cloud services like AWS and Azure.[3] In 2025, encounters with Linux exploits more than doubled year-over-year, with over 4,000 common vulnerabilities and exposures (CVEs) detected monthly, highlighting a continued surge in critical OS and third-party application exploits.[4] Key evolutionary drivers include Linux's open-source model, which facilitates rapid vulnerability patching through global collaboration, often containing threats before they escalate.[18] Conversely, the ecosystem's diverse distributions—ranging from Ubuntu to Red Hat—hinder standardized defenses, as security tools and updates must adapt to varying package managers and configurations, complicating enterprise-wide protection.[19]Types of Malware
Viruses and Worms
Viruses in the Linux ecosystem are self-replicating malicious programs that attach themselves to legitimate executable files, typically ELF (Executable and Linkable Format) binaries, to spread when the host files are executed. Unlike traditional viruses on other platforms, Linux viruses must navigate the system's permissions and multi-user environment, often targeting user-accessible files or exploiting weak configurations to infect executables via entry points such as appending code or modifying the binary structure. The mechanics involve scanning for uninfected ELF files, injecting viral code that executes the original program while propagating the virus to other files, though many early examples were rudimentary and self-limiting due to their destructive nature.[20] A seminal example is the Bliss virus, discovered in 1997 and considered the first real-world Linux virus. Released around mid-1996, Bliss infects ELF executables by overwriting their content with its 17,892 bytes of code, rendering the host programs non-functional and thus hindering widespread propagation. It spreads primarily through software exchanges among Linux users, often via administrative accounts, and demonstrates early attempts at Linux-specific infection by targeting the ELF format prevalent in Linux distributions at the time. While not highly contagious, Bliss highlighted vulnerabilities in file sharing practices and prompted antivirus vendors like McAfee to add detection signatures by February 1997.[21] Worms, in contrast, operate as standalone entities without needing to attach to host files, propagating autonomously across networks by exploiting vulnerabilities in services and self-replicating to remote systems. On Linux, worm mechanics typically include automated scanning for open ports, such as port 22 for SSH, followed by exploitation of buffer overflows or weak authentication to gain access, copy the worm payload, and execute it remotely. Propagation may leverage scheduled tasks like cron jobs for periodic scanning or persistence, or target kernel vulnerabilities for elevated privileges, allowing the worm to spread rapidly in interconnected environments like servers. These traits exploit Linux's common deployment as networked servers with exposed services, differing from file-based viruses by emphasizing network autonomy over host attachment.[22][23] An early influential worm with relevance to Unix-like systems, including precursors to modern Linux, is the Morris worm from 1988, which scanned networks for vulnerable hosts using exploits in services like fingerd and sendmail, leading to self-replication across approximately 6,000 machines—about 10% of the internet at the time—and causing denial-of-service through resource exhaustion. For Linux specifically, the Lion worm in 2001 exemplifies network propagation by scanning TCP port 53 for vulnerable BIND DNS servers, exploiting a remote buffer overflow to install a backdoor on port 27374 and a rootkit, thereby enabling password theft and further spread. Such worms often resulted in minor denial-of-service effects in the 1990s and early 2000s due to limited scale, but modern variants have evolved to facilitate botnet recruitment by coordinating infected Linux devices for larger attacks.[24][25]Trojans and Rootkits
Trojans in the Linux ecosystem are malicious programs that masquerade as legitimate software to deceive users or administrators into installing them, often granting attackers unauthorized access. These threats commonly exploit trust in package management systems, appearing as innocuous updates or utilities. For instance, backdoored RPM or DEB packages can be distributed through compromised repositories or third-party sources, embedding hidden payloads that establish remote control upon installation. A prominent example is the XZ Utils supply chain compromise, where versions 5.6.0 and 5.6.1 of the data compression library contained malicious code inserted upstream, potentially allowing remote code execution via SSH connections on affected distributions. Similarly, a backdoored version of the Free Download Manager software targeted Linux users for over three years, stealing sensitive information like passwords through a stealthy infostealer.[26][27] Rootkits represent a class of stealthy malware focused on privilege escalation and concealment, enabling sustained unauthorized control by hiding their presence and activities from detection tools. In Linux environments, rootkits achieve this through modifications at the user or kernel level, often leveraging system-specific features for persistence and evasion. User-mode rootkits, such as those employing LD_PRELOAD hijacking, intercept library functions like open() or read() by preloading malicious shared objects, allowing them to filter outputs from utilities like ps or ls without altering the kernel.[28] In contrast, kernel-mode rootkits inject code via loadable kernel modules (LKMs), directly altering core structures for deeper concealment.[29] Key mechanics of Linux rootkits include hiding processes and files by manipulating the /proc filesystem—such as altering directory entries in /proc to exclude malicious PIDs—or hooking the syscall table to divert calls like sys_getdents and sys_readdir, preventing enumeration of attacker artifacts. Persistence is maintained through boot-time mechanisms, including modifications to /etc/init.d scripts that reload the rootkit on startup or patching the kernel image (vmlinuz) on disk to embed malicious code across reboots. A unique aspect of Linux rootkits is their exploitation of setuid (SUID) binaries, which run with elevated privileges; attackers can abuse misconfigured SUID programs to escalate to root access, injecting rootkit components that then conceal further exploits.[30][31][32] Historically, the Adore rootkit, released in 1999 as one of the first LKM-based kernel rootkits for Linux, exemplifies these techniques by hooking 15 system calls to hide files, processes, and connections while supporting VFS layer redirection for enhanced stealth. Adore and its successor Adore-NG demonstrate early innovations in self-hiding modules and log filtering, influencing later rootkit designs. Rootkits like these are occasionally integrated into botnets for coordinated attacks, though their primary role remains individual system compromise.[30][31]Ransomware and Botnets
Ransomware on Linux systems typically operates by encrypting critical filesystems, such as ext4, rendering data inaccessible until a ransom is paid in cryptocurrency.[33] These attacks exploit the prevalence of Linux in server environments, where attackers gain initial access through vulnerabilities or misconfigurations before deploying encryption payloads. A notable example is the RansomEXX variant from 2020, an ELF executable designed specifically for Linux-based operating systems, which encrypts user files and appends ransom notes demanding payment.[33] This strain, also known as Netwalker in some contexts, shares code similarities with earlier ransomware like Defray777, which targeted VMware ESXi hypervisors by shutting down virtual machines and encrypting VMFS datastores.[34][35] Linux ransomware has adapted to modern infrastructures, particularly by exploiting container escapes in environments like Kubernetes to propagate beyond isolated pods and encrypt host-level data.[36] Attackers leverage kernel vulnerabilities, such as CVE-2022-0185, to break out of containers and access the underlying Linux host, enabling widespread encryption across clustered systems.[37] Ransomware activity has surged in 2025, with overall incidents rising 36% in the third quarter compared to the previous year, driven by attacks on cloud and virtualized environments.[38] Botnets on Linux consist of networks of compromised devices, often servers or IoT endpoints, coordinated by command-and-control (C2) servers to perform distributed denial-of-service (DDoS) attacks or cryptocurrency mining.[39] These structures typically use protocols like IRC or HTTP for communication, allowing operators to issue commands remotely while evading detection through dynamic C2 infrastructure.[39] Variants of the Mirai botnet, originally a worm-like malware, have evolved to target Linux-based IoT devices, propagating via weak credentials and exploits to amass large-scale bot armies for DDoS operations.[39][40] Linux botnets frequently employ SSH for propagation, stealing private keys from compromised hosts to access additional systems without brute-force attempts, thereby maintaining stealth.[41] Examples include Mirai derivatives that scan for vulnerable SSH services on IoT and server ports, using harvested keys to join devices to the botnet.[40] SSH brute-force operations within these botnets scan millions of IP addresses daily, generating up to 57 million attack attempts per day across global networks.[42] This scale underscores their economic motivations, with bot herders monetizing through DDoS-for-hire services or mining operations that leverage the computational power of infected Linux devices.[43]Infection Vectors
Software Vulnerabilities
Software vulnerabilities in Linux systems, particularly those in the kernel and critical applications, provide malware with entry points for initial access or privilege escalation. Kernel-level flaws, often involving memory corruption such as buffer overflows or use-after-free errors in modules, enable attackers to gain elevated privileges once local access is obtained. For instance, CVE-2024-1086 is a use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component that permits local privilege escalation by exploiting improper memory handling during table operations.[44] Similar techniques to the earlier Dirty COW vulnerability (CVE-2016-5195), which involved race conditions in copy-on-write mechanisms, have been adapted in modern exploits to achieve remote code execution (RCE) through kernel manipulation, allowing malware to bypass security boundaries. The Dirty Pipe vulnerability (CVE-2022-0847), a pipe buffer flaw enabling arbitrary read/write access to pages, exemplifies how kernel pipe handling errors can lead to privilege escalation for malware payloads.[45] Application-level weaknesses further compound these risks, especially in widely deployed services like OpenSSH. Unpatched instances of OpenSSH are prime targets due to their remote access nature; the regreSSHion vulnerability (CVE-2024-6387) introduces a signal handler race condition in the sshd server on glibc-based systems, enabling unauthenticated RCE with root privileges before authentication completes.[46] This flaw, affecting versions from 8.5p1 to 9.7p1, stems from a regression of a 2006 issue and allows attackers to inject and execute arbitrary code remotely, facilitating malware deployment without user interaction.[47] In 2025, the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog underscores the persistence of these threats, listing seven exploited Linux kernel vulnerabilities actively targeted by adversaries, including the aforementioned use-after-free in netfilter.[48] Other entries involve race conditions and memory errors, such as CVE-2025-38352, a time-of-check to time-of-use (TOCTOU) issue in posix-cpu-timers that enables privilege escalation.[49] These cataloged flaws highlight how kernel bugs remain operational risks, with exploitation observed in ransomware and advanced persistent threats. Mitigation challenges arise from the heterogeneous Linux ecosystem, where diverse distribution patching cycles create windows of exposure. Red Hat Enterprise Linux (RHEL) follows a structured, long-term support model with patches backported to stable releases over 10 years, prioritizing enterprise stability.[50] In contrast, Debian emphasizes a conservative release cycle, with major versions every two years and extended security support for older stables, but updates can lag due to rigorous testing.[51] This variability—RHEL's controlled enterprise patching versus Debian's community-driven approach—often results in prolonged vulnerability exposure across mixed environments, as not all users apply patches promptly, amplifying malware opportunities.[52] Buffer overruns in web server contexts, such as those in Apache or Nginx modules, can also serve as gateways for malware but are typically chained with network delivery methods.[53]Social Engineering Attacks
Social engineering attacks represent a significant threat to Linux systems by exploiting user trust and behavior rather than technical flaws, often leading to malware installation or credential compromise. These methods are increasingly prevalent in Linux environments, where users, particularly system administrators, manage critical infrastructure like servers and cloud instances. Attackers craft scenarios that mimic legitimate interactions, such as urgent security notifications or trusted software distributions, to bypass the platform's robust security features. According to cybersecurity analyses, social engineering accounts for a growing portion of Linux infections due to the human element's vulnerability across operating systems.[3] Phishing variants tailored to Linux users frequently involve email lures containing malicious attachments disguised as distribution-specific packages, such as .deb files for Debian-based systems or .rpm for Red Hat derivatives. These attachments pose as essential updates or utilities from official repositories, exploiting users' reliance on package managers like apt or yum. For instance, in 2025, phishing campaigns delivered Linux malware through RAR archives with injected filenames that evaded detection, installing the VShell backdoor for remote access. Similarly, APT36, a threat group, used spear-phishing emails in July 2025 to target BOSS Linux deployments in Indian defense sectors, tricking users into executing payloads that enabled malware persistence. Fake update prompts, often distributed via compromised email lists or forums, further amplify this vector by simulating official distro alerts.[54][55] Supply chain social tactics focus on deceiving developers and maintainers to introduce tainted code into legitimate packages, leveraging the open-source nature of Linux ecosystems. Attackers build long-term relationships to compromise credentials, allowing backdoor insertion in upstream repositories. A prominent case is the 2024 XZ Utils incident, where a threat actor spent over two years cultivating trust with the sole maintainer through contributions and communication, ultimately gaining commit rights to embed a backdoor in versions 5.6.0 and 5.6.1 of the liblzma library. This near-successful compromise could have affected millions of Linux distributions, underscoring the risks of social influence in supply chains akin to those seen in Python's PyPI but adapted for Linux tools. The OpenSSF highlighted this as a classic social engineering takeover, prompting alerts on maintainer burnout and project security.[56][57] Targeting Linux user profiles, especially sysadmins, spear-phishing campaigns aim to steal SSH keys, granting attackers seamless, passwordless entry to remote servers. These attacks personalize lures based on professional roles, such as alerts about package vulnerabilities or server migrations requiring credential verification. By creating urgency—e.g., claims of imminent downtime or compliance issues—phishers prompt victims to upload keys to fake portals or run scripts that exfiltrate them. While direct Linux-specific examples are documented in broader credential theft reports, MITRE ATT&CK frameworks note SSH key modification as a persistence technique often initiated via such phishing, prevalent in enterprise Linux setups. The effectiveness of social engineering in Linux malware dissemination stems from psychological tactics like urgency and authority impersonation, such as "immediate security patch required" messages that pressure quick action without verification. Trend Micro's Linux Threat Landscape Report identifies phishing as a key deception method, contributing to a 62% rise in detected ransomware attempts linked to social engineering from Q1 2022 to 2023. Such trends emphasize the need for user training, as these attacks exploit trust in Linux's perceived security.[3]Web and Script-Based Threats
Web and script-based threats represent a significant vector for Linux malware, particularly given the operating system's prevalence in web server environments, where Apache and Nginx power over 60% of the world's websites. These attacks leverage the web's accessibility to deliver malicious payloads without requiring direct user interaction beyond normal browsing or server operations. Malicious code, often in JavaScript or PHP, is injected into legitimate sites, exploiting vulnerabilities in browsers or server configurations to establish footholds on Linux systems. Drive-by downloads occur when users visit compromised websites, triggering automatic execution of malicious JavaScript or PHP code that exploits outdated browser plugins, such as vulnerable versions of Firefox on Linux distributions. For instance, attackers inject scripts into web pages that exploit browser rendering engines or extensions, silently downloading payloads like cryptocurrency miners without user consent. These attacks have been documented in campaigns targeting Linux users via SEO-optimized malicious sites, where JavaScript redirects to exploit kits that probe for unpatched vulnerabilities in browser components.[58][59] Script-based malware, commonly written in Bash or Python, provides an initial foothold on Linux systems by executing lightweight, evasive code for tasks like resource hijacking. A notable example is PyCryptoMiner, a Python botnet that spreads via SSH to vulnerable JBoss servers on Linux, deploying base64-encoded scripts to mine Monero cryptocurrency and establishing persistence through cron jobs that run every six hours. Similarly, malicious PyPI packages such as modularseven-1.0, driftme-1.0, and catme-1.0 target Linux developers, fetching remote Bash scripts to download and execute coin miners, modifying ~/.bashrc for persistence and causing significant performance degradation. These scripts often use cron jobs to schedule mining operations, blending into legitimate system processes to avoid detection.[60][61] Web shells, such as the PHP-based C99.php, serve as persistent backdoors on compromised Linux web servers, allowing remote command execution through HTTP requests. Uploaded via file inclusion vulnerabilities, C99.php provides attackers with a web interface for file management, database access, and shell commands, often evading initial scans due to its small footprint and obfuscation techniques like base64 encoding. In Linux environments, these shells are commonly placed in web roots like /var/www/html, enabling attackers to pivot to deeper system compromises.[62][63] Attacks on Linux web servers frequently target configurations in Apache and Nginx, including exploits of .htaccess files to override security directives and enable malicious script execution. For example, misconfigured .htaccess in Apache allows attackers to inject PHP code into non-executable directories, bypassing restrictions and facilitating backdoor installation on Linux-hosted sites. In 2025, such vulnerabilities in Apache HTTP Server 2.4.x, including improper handling of HTTP/2 requests, have been actively exploited to deliver script payloads, with nine new CVEs reported emphasizing the need for timely patching. Nginx, lacking native .htaccess support, faces analogous risks through misconfigured location blocks that permit arbitrary script uploads.[64][65][66] Emerging trends highlight the rise of fileless scripts on Linux, which operate entirely in memory to evade antivirus detection by avoiding disk writes. VShell, a fileless backdoor delivered via email attachments with crafted filenames triggering Bash execution, downloads and runs ELF binaries in-memory on Linux systems, supporting multiple architectures like x86 and ARM for broad targeting. Similarly, perfctl, a multipurpose dropper discovered in 2024, has infected millions of Linux servers by injecting scripts into running processes, using process hollowing to mask operations and propagate via network shares. These techniques exploit Linux's scripting flexibility, with attackers leveraging tools like Bash for in-memory persistence, underscoring the shift toward detection-resistant threats.[67][68] Propagation through cross-site scripting (XSS) amplifies these threats by enabling session hijacking on Linux-hosted web applications, where injected JavaScript steals authentication tokens for further infections. In reflected or stored XSS scenarios, attackers embed scripts in user inputs, which servers reflect back to victims, allowing cookie theft and unauthorized access to admin panels for uploading additional malware like web shells. On Linux servers running PHP applications, this can lead to lateral movement, as hijacked sessions enable credential dumping and script deployment across connected systems.[69][70]Cross-Platform and Supply Chain Attacks
Cross-platform malware refers to malicious software designed to operate across multiple operating systems, including Linux, by leveraging languages or frameworks that are not tied to a single platform. These threats often use polyglot binaries or scripts that can execute on Linux, Windows, and macOS, exploiting shared libraries or virtual machine environments to maintain persistence and evade detection. For instance, malware written in Go, a language that compiles to platform-independent binaries, enables attackers to deploy the same payload across diverse systems with minimal modifications.[71] A prominent example is SysJoker, a backdoor discovered in 2021 that targets Windows, Linux, and macOS by masquerading as legitimate system processes and establishing command-and-control communication. Similarly, CrossRAT, identified in 2018, supports cross-platform deployment on Windows, Linux, and macOS, allowing capabilities such as file manipulation, screenshot capture, and arbitrary code execution through dynamic link libraries. More recently, BlackLock ransomware, active in 2025, uses Go to infect Windows, Linux, and VMware ESXi hypervisors, encrypting files and demanding ransoms while exploiting virtualization for broader impact.[72][73][71] Supply chain attacks on Linux involve compromising trusted upstream sources, such as open-source repositories or package managers, to inject malware into software builds distributed to users. In 2024, the XZ Utils incident exemplified this, where a maintainer subtly altered the compression library's source code over years to embed a backdoor, affecting numerous Linux distributions before detection. This attack highlighted vulnerabilities in open-source contribution models, as the malicious code was propagated through official channels like GitHub and integrated into distro packages. By 2025, similar tactics targeted package ecosystems; for example, malicious versions of utilities like arch-wiki-lite delivered Chaos RAT malware to Linux users via compromised repositories.[74][75] Linux-specific implications of these attacks are amplified in containerized and virtualized environments. Docker Hub, a primary repository for Linux container images, has hosted malicious payloads, with nearly 20% of repositories in 2024 spreading malware through tampered base images used in supply chains. The XZ backdoor persisted in at least 35 Debian-based Docker images as of August 2025, enabling remote code execution in container deployments. Distro mirrors face risks too, as seen in the XZ Utils backdoor's brief impact on Kali Linux package updates in 2024. Additionally, 2025 saw modular malware kits emerge for multi-OS deployment, often via GitHub Actions workflows that inject payloads into Linux builds, increasing the attack surface for cloud-native applications.[76][77][78] These threats pose heightened risks to virtualized Linux hosts, such as those running VMware ESXi, where cross-platform malware can pivot from guest systems to hypervisors, compromising entire infrastructures. For example, BlackLock's 2025 campaigns exploited ESXi's Linux kernel to encrypt virtual machine disks, underscoring the need for isolated supply chain verification in hybrid environments. Overall, such attacks exploit Linux's reliance on open-source ecosystems, demanding rigorous artifact signing and dependency scanning to mitigate widespread infiltration.[71]Notable Examples and Trends
Early Linux Malware
The earliest documented Linux malware emerged in the mid-1990s as proof-of-concept demonstrations rather than widespread threats, reflecting the operating system's nascent adoption primarily among technically proficient users. In the fall of 1996, Staog became the first known Linux virus, developed by the Australian group VLAD. Written in assembly language, Staog targeted ELF executables and attempted to gain root privileges by exploiting kernel vulnerabilities such as buffer overflows in the mount and tip utilities, as well as the suidperl bug. It infected running binaries and included references to its creators, but its rudimentary design limited propagation, and no in-the-wild infections were reported by early 1997.[79][80] By the early 2000s, self-propagating worms began targeting specific distributions, underscoring Linux's growing server presence. The Ramen worm, discovered in January 2001, specifically attacked unpatched Red Hat Linux 6.2 and 7.0 systems by exploiting vulnerabilities in rpc.statd, wu-ftpd, and LPRng services. Once installed, it defaced web pages with messages promoting the "RameN Crew," scanned networks for additional victims using port 27374, and weakened host security by editing files like /etc/hosts.deny. Rootkits also proliferated during this period; for instance, the t0rn rootkit, active around 2000–2003, replaced system utilities such as ls, ps, and netstat to conceal intrusions and backdoors, often delivered via exploited services. These tools exemplified early stealth techniques, including loadable kernel module (LKM) modifications to alter system calls without altering binaries.[81][82][80] These incidents, while confined to fewer than 10 major cases by 2010, revealed Linux's susceptibility to privilege escalation and network-based attacks despite its open-source nature, which facilitated rapid vulnerability disclosure and patching. Their limited spread—impacting far less than 1% of systems overall—stemmed from user expertise, diverse distributions, and the need for root access, preventing mass infections common in other ecosystems. Nonetheless, they highlighted the necessity for advanced access controls, influencing the maturation of mandatory access control (MAC) frameworks like SELinux, initially developed by the NSA in the late 1990s and integrated into the kernel by 2003, and AppArmor, introduced by SUSE in the early 2000s to enforce path-based policies and mitigate unauthorized escalations.[80][82]Recent Developments (2010s–2020s)
In the 2010s, Linux malware increasingly targeted critical infrastructure, including adaptations of the Shamoon wiper for virtualization environments commonly used in SCADA systems. A variant of Shamoon 2, identified in 2017, focused on virtualization products to propagate destructively across networked systems, building on earlier campaigns that disrupted energy sector operations.[83] This evolution highlighted the shift toward modular wipers capable of evading detection in industrial control environments. A prominent example was the 2018 VPNFilter botnet, a sophisticated Linux-based malware that infected over 500,000 IoT routers and NAS devices globally. Attributed to Russian state-sponsored actors, VPNFilter enabled surveillance, data exfiltration, and device bricking via multiple stages, including a loader and plugin architecture for command-and-control.[84] Entering the 2020s, threats diversified to include desktop surveillance and virtualization exploits. In 2019, EvilGnome emerged as a modular backdoor disguised as a GNOME shell extension, targeting Linux desktops with keylogging, screenshot capture, and audio recording capabilities. Developed by the Russian-linked Gamaredon group, it evaded detection by major antivirus solutions at the time and represented a rare focus on end-user Linux systems rather than servers.[85] By 2022, the RansomEXX ransomware (also known as Defray) adapted for Linux environments, specifically targeting VMware ESXi hypervisors to encrypt virtual machines in cloud and enterprise setups. This ELF-based variant spread via exploited vulnerabilities and weak credentials, demanding ransoms in Bitcoin and underscoring the growing viability of Linux as a ransomware vector.[86] In early 2025, DripDropper appeared as a downloader exploiting the CVE-2023-46604 vulnerability in Apache ActiveMQ on cloud Linux hosts. After gaining access, it self-patches the flaw to block competitors, uses Dropbox for command-and-control via compromised accounts, and facilitates persistence across thousands of instances for further payload delivery.[87] State-sponsored campaigns amplified these threats, with groups like APT28 (also known as Fancy Bear) deploying Linux-specific tools for espionage. APT28 utilized the Fysbis backdoor in 2016 for persistent access on Linux systems, enabling file exfiltration and command execution, and later the Drovorub platform in operations through 2020, which included kernel modules for stealthy rootkit functionality on enterprise Linux distributions.[88] [89] Crypto-jacking persisted as a lucrative tactic, exemplified by 2021 campaigns deploying XMRig miners on Linux servers via vulnerabilities like CVE-2021-26084 in Atlassian Confluence, hijacking resources for Monero mining while maintaining low visibility.[90] Overall, Linux malware shifted from experimental desktop threats to sophisticated attacks on servers and cloud infrastructure throughout the 2010s and 2020s, driven by the platform's dominance in enterprise and IoT ecosystems. Antivirus reports documented a 62% rise in Linux ransomware detections from early 2022 to 2023, reflecting broader increases in targeted campaigns against high-value assets.[91] This trend emphasized modular designs and evasion techniques, prioritizing persistence in virtualized and distributed environments over widespread consumer impact.[92]Emerging Trends in 2025
In 2025, Linux malware has increasingly targeted cloud and containerized environments, exploiting vulnerabilities in orchestration tools to achieve broader system compromise. Critical flaws in Docker Desktop, such as CVE-2025-9074, enable container escapes by allowing malicious containers to access the host Docker Engine API via SSRF techniques, potentially leading to full host takeover on Linux-based setups.[93] Similarly, vulnerabilities in runC, the container runtime used by Docker and Kubernetes, including three high-severity issues disclosed in November 2025, permit attackers to bypass isolation and inject code into the host kernel, facilitating malware persistence across container clusters.[94] In Kubernetes environments, severe flaws in Chaos Mesh—a chaos engineering tool for testing resilience—collectively tracked under CVEs like CVE-2025-59358 through CVE-2025-59361, allow unauthenticated pod injections and full cluster hijacking by enabling arbitrary code execution within pods, often used by malware to propagate laterally in Linux-hosted cloud infrastructure.[95] Fileless and modular malware variants have gained prominence, residing primarily in memory to evade traditional disk-based scans and antivirus tools. These attacks leverage Linux-specific mechanisms like memfd_create() to create anonymous memory files for payload execution without filesystem artifacts, complicating forensic detection.[96] A notable example is the Auto-Color backdoor, discovered in late 2024 and active into 2025, which employs modular command-and-control (C2) structures for tasks like reverse shells and file exfiltration while using libc hooking and process hiding to maintain stealth on infected Linux systems.[97] Complementing this, Go-language malware has emerged as a modular threat vector; for instance, typosquatted Go packages mimicking legitimate libraries like "hypert" deliver cross-platform payloads to Linux users, executing in-memory to steal credentials and establish persistence via environment variables.[98] Another Go-based example, the VShell backdoor, uses RAR archive filename weaponization for initial infection and modular plugins for evasion on Linux servers.[99] The integration of artificial intelligence (AI) into Linux malware marks a significant evolution, enabling dynamic evasion tactics such as machine learning-driven polymorphism to alter code signatures in real-time and avoid signature-based detection. The Koske malware, an AI-generated Linux threat uncovered in mid-2025, incorporates LLM-assisted obfuscation and userland rootkits to hijack system calls like readdir(), hiding malicious artifacts while adapting to defensive responses.[100] AI enhancements have also bolstered botnet operations, including SSH brute-force campaigns; tools like AI-powered credential stuffers automate and scale attacks by predicting weak configurations and optimizing password guesses.[101] According to the Recorded Future H1 2025 Malware and Vulnerability Trends report, traditional stealers like Vidar and RedLine have declined significantly, dropping off the top malware lists due to improved takedowns and detection, while Linux ransomware incidents have risen amid growing enterprise adoption of Linux servers.[102] This shift underscores a broader trend toward sophisticated, environment-specific threats, with cloud-focused ransomware exploiting container vulns to encrypt virtual machine images and demand higher ransoms.[19]Detection and Mitigation
Antivirus and Endpoint Protection Tools
Antivirus and endpoint protection tools for Linux systems focus on detecting, preventing, and remediating malware threats tailored to the Unix-like environment, including ELF binaries and kernel-level exploits. These tools employ a combination of signature-based scanning, which matches files against known malware patterns, and heuristic or behavioral analysis to identify suspicious activities without relying on predefined signatures. Open-source options like ClamAV provide essential scanning capabilities for filesystems and ELF executables, while commercial solutions such as Sophos Intercept X offer advanced real-time behavioral monitoring to block exploits and ransomware on Linux servers.[103][104] ClamAV, an open-source antivirus engine, excels in scanning Linux filesystems for malware, including ELF binaries commonly targeted by Linux threats, through its command-line tools and daemon-based architecture. It supports on-demand and scheduled scans of directories, archives, and email attachments, detecting trojans, worms, and viruses via a regularly updated signature database. Sophos Intercept X for Linux servers integrates deep learning and behavioral analysis to monitor process execution in real-time, preventing fileless attacks and lateral movement by analyzing deviations from normal system behavior.[105][106][107] Endpoint detection and response (EDR) tools extend protection beyond traditional antivirus by focusing on runtime monitoring and threat hunting. Falco, an open-source runtime security tool, uses Linux kernel events via eBPF or kernel modules to detect anomalous behaviors indicative of malware, such as unauthorized process injections or network connections, making it suitable for containerized and cloud-native Linux environments. CrowdStrike Falcon provides EDR capabilities for Linux through its lightweight sensor, integrating behavioral analytics, machine learning, and cloud-based threat intelligence to identify and respond to malware, including rootkits, across endpoints. In November 2025, Kaspersky released an antivirus solution for Linux home users, emphasizing protection against rising exploits in desktop and personal devices.[108] In terms of effectiveness, signature-based methods in tools like ClamAV achieve reported detection rates of over 95% for known malware samples according to some sources, though independent tests indicate rates around 60-70% for Linux-specific threats. Heuristic and behavioral approaches in Sophos Intercept X and CrowdStrike Falcon improve coverage for unknown variants, with AI-enhanced Linux security tools reporting up to 98% efficacy against known threats and over 80% for novel ones per industry analyses, though specific tool performance varies in benchmarks; however, fileless malware exploiting memory or scripts remains a challenge, often evading file-scanning mechanisms.[109][110][111][112][113][114][115] Deployment of these tools typically involves daemon processes for continuous operation, such as ClamAV's clamd for scanning and freshclam for automated signature updates every few hours to maintain freshness against evolving threats. In resource-constrained IoT devices running Linux, challenges arise from high CPU and memory demands during scans, necessitating optimized configurations or lighter variants to avoid performance degradation.[105][116]System Hardening and Best Practices
System hardening involves configuring Linux systems to minimize vulnerabilities and limit the potential impact of malware through built-in security features and policies, rather than relying on external software. This approach emphasizes proactive measures such as access controls, network restrictions, and regular maintenance to reduce the attack surface and enforce the principle of least privilege. By implementing these practices, administrators can significantly enhance resilience against exploits targeting Linux environments, including servers, desktops, and embedded devices. Core hardening practices include enabling firewalls to control inbound and outbound traffic, thereby blocking unauthorized access that could introduce malware. Tools like iptables or its user-friendly frontend UFW (Uncomplicated Firewall) allow for a default deny policy, where all traffic is blocked except explicitly permitted services, such as SSH on port 22. For instance, configuring UFW withsudo ufw default deny incoming and sudo ufw allow 22/tcp restricts exposure to common attack vectors like remote code execution. Similarly, AppArmor and SELinux provide mandatory access control (MAC) to confine applications and prevent malware from escalating privileges or accessing unauthorized resources. AppArmor uses path-based profiles to limit programs like web servers to specific files, operating in enforce mode to block violations in real-time, while SELinux employs label-based policies for finer-grained role-based access control, defaulting to enforcing mode on distributions like Red Hat Enterprise Linux. Regular kernel updates via distribution tools, such as apt update && apt upgrade on Debian-based systems or dnf update on Fedora, address known vulnerabilities promptly; best practices recommend scheduled maintenance windows, testing in staging environments, and rollback procedures to ensure stability post-update.
At the user level, adhering to the principle of least privilege restricts accounts to minimal necessary permissions, exemplified by disabling direct root logins over SSH to prevent attackers from gaining full system control with a single compromised credential. This is achieved by editing /etc/ssh/sshd_config to set PermitRootLogin no and restarting the SSH service, forcing users to authenticate as non-privileged accounts and escalate via sudo only when required, thereby mitigating risks from brute-force attacks or credential theft. Complementing this, the auditd daemon enables comprehensive system auditing for anomaly detection by logging events like file accesses and system calls; rules such as -w /etc/passwd -p wa -k identity monitor sensitive files, allowing security teams to identify unusual patterns indicative of malware persistence or lateral movement through tools like ausearch for log analysis.
For advanced environments, container security can be bolstered using seccomp profiles in Docker to filter system calls at the kernel level, enforcing a whitelist of allowed operations to contain potential breaches within isolated workloads. A custom JSON profile might permit execve and fork while denying clone for process creation, applied via docker run --security-opt seccomp=profile.json, reducing the risk of container escapes by malware. In IoT and embedded Linux contexts, secure boot ensures only trusted firmware and kernels load during initialization, using hardware-fused public keys to verify signatures of bootloaders like U-Boot and root filesystems via mechanisms such as dm-verity, preventing tampered code from executing on resource-constrained devices.
As of 2025, recommendations emphasize multi-factor authentication (MFA) for SSH to add a second verification factor beyond passwords or keys, implemented via PAM modules like Google Authenticator, which generates time-based one-time passwords (TOTP) scanned from a mobile app after initial login. Configuration involves installing the module, generating user-specific secrets with google-authenticator, and updating /etc/pam.d/sshd to require pam_google_authenticator.so. Additionally, adopting zero-trust models as outlined by NIST SP 800-207 promotes continuous verification of all access requests, regardless of origin, through micro-segmentation and least-privilege enforcement, effectively shrinking the attack surface in Linux networks by assuming breach and limiting lateral movement.