LINUX

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBsPgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner.…

4 years ago
A new Stantinko Bot masqueraded as httpd targeting Linux serversA new Stantinko Bot masqueraded as httpd targeting Linux servers

A new Stantinko Bot masqueraded as httpd targeting Linux servers

Researchers spotted a new variant of an adware and coin-miner botnet operated by Stantinko threat actors that now targets Linux…

4 years ago
RansomExx ransomware now targets also Linux systemsRansomExx ransomware now targets also Linux systems

RansomExx ransomware now targets also Linux systems

The RansomExx Ransomware gang is expanding its operations by creating a new version that is able to infect Linux machines.…

5 years ago
Google researcher found BleedingTooth flaws in Linux BluetoothGoogle researcher found BleedingTooth flaws in Linux Bluetooth

Google researcher found BleedingTooth flaws in Linux Bluetooth

Google security researcher discovered Bluetooth vulnerabilities (BleedingTooth) in the Linux kernel that could allow zero-click attacks. Andy Nguyen, a Google…

5 years ago
IPStorm botnet evolves to infect Android, Linux, and Mac devicesIPStorm botnet evolves to infect Android, Linux, and Mac devices

IPStorm botnet evolves to infect Android, Linux, and Mac devices

Researchers from Intezer reported that the IPStorm botnet has evolved to infect other operating systems, including Android, Linux, and Mac…

5 years ago
CDRThief Linux malware steals VoIP metadata from Linux softswitchesCDRThief Linux malware steals VoIP metadata from Linux softswitches

CDRThief Linux malware steals VoIP metadata from Linux softswitches

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call…

5 years ago
Lemon_Duck cryptomining malware evolves to target Linux devicesLemon_Duck cryptomining malware evolves to target Linux devices

Lemon_Duck cryptomining malware evolves to target Linux devices

A new variant of the infamous Lemon_Duck cryptomining malware has been updated to targets Linux devices. Security researchers from Sophos have spotted a…

5 years ago
FritzFrog cryptocurrency P2P botnet targets Linux servers over SSHFritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

Researchers spotted a new sophisticated peer-to-peer (P2P) botnet, dubbed FritzFrog, that has been actively targeting SSH servers since January 2020.…

5 years ago
FBI and NSA joint report details APT28’s Linux malware DrovorubFBI and NSA joint report details APT28’s Linux malware Drovorub

FBI and NSA joint report details APT28’s Linux malware Drovorub

The FBI and NSA issue joint alert related to new Linux malware dubbed Drovorub that has been used by the…

5 years ago
BootHole issue allows installing a stealthy and persistent malwareBootHole issue allows installing a stealthy and persistent malware

BootHole issue allows installing a stealthy and persistent malware

Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader issue, dubbed BootHole, that can be exploited…

5 years ago