Linux Malware Rates Reach Record Highs

Until recently, cyber criminals have largely ignored Linux compared to other more popular operating systems. However, the new data shows that cyber attack trends are shifting and as more devices and services migrate to Linux, malware has become increasingly prevalent on the OS.

Despite Linux's reputation as the most secure operating system, it is not immune to malware. In fact, Linux malware has become increasingly widespread in recent years as many more devices and servers run on Linux operating systems.  

Linux is regarded as one of the most secure operating systems. But its roller coaster ride of detected incidents since 2021 shows it is not immune to malware. After rising and falling since 2021 Linux malware hit record highs at the end of 2022, showing a growth of 117% over previously reports levels.

However malware attacks targeting Linux are not new. What is changing, though, is the focus cybercriminals now place on Linux in business and industry. Linux malware has become increasingly prevalent in recent years as more devices and servers run on Linux operating systems.

Based on an analysis by researchers at Atlas VPN has shown that the Linux threat landscape is evolving. It shows attackers increasingly see Linux as another worthwhile target.

“Linux users need to be aware of the growing risks, as prioritising system security is more important than ever,” they say. According to data analysis the Atlas VPN team released on January 18th, new Linux malware threats hit record numbers in 2022. Compared to 2021, when 121.6 million samples were detected, new malware numbers overall dropped by 39% to 73.7 million in 2022. Most new Linux malware samples (854,690) were seen in the first quarter of 2022.

But in the second quarter, new malware samples dropped by almost 3% to 833,065. Those Linux detection numbers plummeted again in the third quarter of last year by a staggering 91% to 75,841. But they picked up again in the fourth quarter of 2022, growing by 117% to 164,697.

Malware attacks targeting Linux are not new. What is changing, though, is the focus cyber criminals now place on Linux in business and industry.

Linux malware has become increasingly prevalent in recent years as more devices and servers run on Linux operating systems. While Linux is not as popular among computer users as other operating systems, it runs the back-end systems of many networks, making attacks on Linux highly lucrative.

Users Can Protect Their Systems from Malware

Protecting your computer system from malicious software or malware is a priority. To ensure the safety of your system and information, it is essential to implement several protective measures.  

  • Keeping your operating system and all installed software up to date is the first step in protecting yourself against malware. These updates often include security patches designed to protect against viruses, worms, and other threats.  
  • Your decision to use a non-administrator account on the system by default is also an important safety feature as this will limit any malware damage that malicious programs can cause.  
  • Take extra precautions when clicking links or downloading files online as this could be a source of malware infections. When opening email attachments or images, thoughtful consideration should be taken before doing so. Similarly, if you are asked to download any software from pop-up windows, avoid trusting them outright as they may contain viruses that can infect and damage your personal information.  
  • File-sharing should also be done cautiously. Refrain from sharing potentially confidential data with untrusted sources even if asked for.  
  • Finally, installing a comprehensive cyber protection solution can provide additional safety measures necessary for protecting against potential threats lurking online.

As Linux adoption rises, so will attacks against it. Linux users need to be aware of the growing risks, as prioritising system security is more important than ever.

NordVPN:     NordVPN:      I-HLS:       TechNewsWorld:      DigitFYI:   TechPowerUp:     Daily Host News

You Might Also Read: 

NSA And FBI Warn Of Russian Linux Malware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Is The World’s Third Largest Economy
Hackers Hit Thousands of Computers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Texas Cyber Solutions

Texas Cyber Solutions

Texas Cyber Solutions are elite cybersecurity advisors based in Houston, Texas providing network security solutions, penetration testing, and more.