Home » Ransomware Actors Are Finding New Ways To Target Linux

Ransomware Actors Are Finding New Ways To Target Linux

by Ransomware.org Blog
0 comment

Once upon a time, Linux was thought of as being the most secure from ransomware of all operating systems. This reputation stemmed from its relatively low adoption rate when compared to Microsoft Windows, and the lack of Linux-based programming skills within the general IT community.

However, ransomware developers have an uncanny knack for quickly bounding ahead, and have done so with Linux. The days of Linux being thought of as relatively immune from attack are quickly fading, as attack vectors into the many flavors of this OS begin to spike.

Code Diversity Spells Trouble for Linux Admins

New coding techniques are being used by ransomware developers that allow for quicker turnarounds for the targeting of security flaws. In turn, this provides quicker service for Ransomware-as-a-Service (RaaS) providers so that actors can take advantage of patching cycles or, even worse, the false lull of security that some Linux users still feel.

RaaS providers have taken notice and are addressing their shortcomings in the Linux arena. This is bad news for Linux users. Developers are building products based on specific flavors of Linux, such as RedHat and Ubuntu, and are offering many of the same benefits that Mac-based or Windows-based RaaS customers now have at their fingertips.

The diversity of code being created to exploit different versions of Linux still stick to the proven social engagement techniques used against other platforms. This makes the pillars of education and security best practices the best initial mitigation steps against the expansion of ransomware code.

Virtualization Dependencies Adding Fuel to the Fire

The growing dependency on virtualized environments, both from a user and IoT perspective, has also triggered a growth in Linux-based ransomware incidents. Again, the promise of high security comes into play with these, as do the potential holes in public and hybrid cloud configurations, all serving to pave the way for an increased volume of attacks against Linux-based devices.

Several factors, though not necessarily impactful to just Linux devices, are contributing to the rise in Linux-based ransomware targets. These include:

Virtual machines (VMs) and/or supporting stacks not being turned off when not being usedExpanded use of templates or broad policies, such as Azure Resource Manager and Blueprints, make systems easier to predictImproper usage of horizontal and vertical VM scalingIncorrectly managed shared responsibilities with cloud provider. For example, managing a PaaS model infrastructure as if it were an IaaS infrastructure

The system-wide templates offered by cloud providers reproduce the same flaws in the original to every virtual device created using them. By producing these flaws, attackers can quickly inject malicious code into multiple systems for later execution. Making maters worse, data replication across virtual devices can lead to widespread damage, including the corruption of core hypervisors.

It’s safe to say that Linux administrators must now remain just as vigilant as their Mac or Windows-based colleagues. Although ransomware attackers may have taken the Linux world by surprise, the same core best practices still apply to head off a would-be attack and keep Linux-based systems running with limited risk of compromise.

You may also like

Leave a Comment


Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign