Linux Malware Rates Reach Record Highs

Until recently, cyber criminals have largely ignored Linux compared to other more popular operating systems. However, the new data shows that cyber attack trends are shifting and as more devices and services migrate to Linux, malware has become increasingly prevalent on the OS.

Despite Linux's reputation as the most secure operating system, it is not immune to malware. In fact, Linux malware has become increasingly widespread in recent years as many more devices and servers run on Linux operating systems.  

Linux is regarded as one of the most secure operating systems. But its roller coaster ride of detected incidents since 2021 shows it is not immune to malware. After rising and falling since 2021 Linux malware hit record highs at the end of 2022, showing a growth of 117% over previously reports levels.

However malware attacks targeting Linux are not new. What is changing, though, is the focus cybercriminals now place on Linux in business and industry. Linux malware has become increasingly prevalent in recent years as more devices and servers run on Linux operating systems.

Based on an analysis by researchers at Atlas VPN has shown that the Linux threat landscape is evolving. It shows attackers increasingly see Linux as another worthwhile target.

“Linux users need to be aware of the growing risks, as prioritising system security is more important than ever,” they say. According to data analysis the Atlas VPN team released on January 18th, new Linux malware threats hit record numbers in 2022. Compared to 2021, when 121.6 million samples were detected, new malware numbers overall dropped by 39% to 73.7 million in 2022. Most new Linux malware samples (854,690) were seen in the first quarter of 2022.

But in the second quarter, new malware samples dropped by almost 3% to 833,065. Those Linux detection numbers plummeted again in the third quarter of last year by a staggering 91% to 75,841. But they picked up again in the fourth quarter of 2022, growing by 117% to 164,697.

Malware attacks targeting Linux are not new. What is changing, though, is the focus cyber criminals now place on Linux in business and industry.

Linux malware has become increasingly prevalent in recent years as more devices and servers run on Linux operating systems. While Linux is not as popular among computer users as other operating systems, it runs the back-end systems of many networks, making attacks on Linux highly lucrative.

Users Can Protect Their Systems from Malware

Protecting your computer system from malicious software or malware is a priority. To ensure the safety of your system and information, it is essential to implement several protective measures.  

  • Keeping your operating system and all installed software up to date is the first step in protecting yourself against malware. These updates often include security patches designed to protect against viruses, worms, and other threats.  
  • Your decision to use a non-administrator account on the system by default is also an important safety feature as this will limit any malware damage that malicious programs can cause.  
  • Take extra precautions when clicking links or downloading files online as this could be a source of malware infections. When opening email attachments or images, thoughtful consideration should be taken before doing so. Similarly, if you are asked to download any software from pop-up windows, avoid trusting them outright as they may contain viruses that can infect and damage your personal information.  
  • File-sharing should also be done cautiously. Refrain from sharing potentially confidential data with untrusted sources even if asked for.  
  • Finally, installing a comprehensive cyber protection solution can provide additional safety measures necessary for protecting against potential threats lurking online.

As Linux adoption rises, so will attacks against it. Linux users need to be aware of the growing risks, as prioritising system security is more important than ever.

NordVPN:     NordVPN:      I-HLS:       TechNewsWorld:      DigitFYI:   TechPowerUp:     Daily Host News

You Might Also Read: 

NSA And FBI Warn Of Russian Linux Malware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Is The World’s Third Largest Economy
Hackers Hit Thousands of Computers »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain

SparkLabs Cyber + Blockchain accelerator is located in Washington D.C. which is one of the world's top cybersecurity ecosystems.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Network Intelligence

Network Intelligence

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.