A New Linux Malware Targeting High-Performance Computing Clusters – Tempemail

High-performance computing clusters belonging to university networks as well as servers associated with government agencies, endpoint security vendors, and internet service providers have been targeted by a newly discovered backdoor that gives attackers the ability to execute arbitrary commands on the systems remotely. Cybersecurity firm ESET named the malware “Kobalos” Continue Reading

FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities – Tempemail

An ongoing malware campaign has been found exploiting recently disclosed vulnerabilities in Linux devices to co-opt the systems into an IRC botnet for launching distributed denial-of-service (DDoS) attacks and mining Monero cryptocurrency. The attacks involve a new malware variant called “FreakOut” that leverages newly patched flaws in TerraMaster, Laminas Project Continue Reading

Wormable Gitpaste-12 Botnet Returns to Target Linux Servers, IoT Devices – Tempemail

A new wormable botnet that spreads via GitHub and Pastebin to install cryptocurrency miners and backdoors on target systems has returned with expanded capabilities to compromise web applications, IP cameras, and routers. Early last month, researchers from Juniper Threat Labs documented a crypto-mining campaign called “Gitpaste-12,” which used GitHub to Continue Reading

The Most Secure Linux for Embedded Systems- Tempemail

By Dan Noland, Star Lab Don’t get upset. We fully acknowledge that the hard-working people who make enterprise type Linux distributions want to help their customers achieve secure systems and they strive to improve the security posture of their distributions all the time. However, there are two major areas where Continue Reading

APT annual review: What the world’s threat actors got up to in 2020- Tempemail

We track the ongoing activities of more than 900 advanced threat actors; you can find our quarterly overviews here, here and here. Here we try to focus on what we consider to be the most interesting trends and developments of the last 12 months. This is based on our visibility Continue Reading

Stantinko Botnet Now Targeting Linux Servers to Hide Behind Proxies – Tempemail

An adware and coin-miner botnet targeting Russia, Ukraine, Belarus, and Kazakhstan at least since 2012 has now set its sights on Linux servers to fly under the radar. According to a new analysis published by Intezer today and shared with The Hacker News, the trojan masquerades as HTTPd, a commonly Continue Reading

RansomEXX Trojan attacks Linux systems- Tempemail

We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled by Linux-based operating systems. After the initial analysis we noticed similarities in the code of the Trojan, the text of the ransom notes and the general approach to extortion, which Continue Reading

TrickBot Linux Variants Active in the Wild Despite Recent Takedown – Tempemail

Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren’t sitting idle. According to new findings shared by cybersecurity firm Netscout, TrickBot’s authors have moved portions of their code to Linux in an attempt to widen the scope of Continue Reading

FinSpy Spyware for Mac and Linux OS Targets Egyptian Organisations – Tempemail

Amnesty International today exposed details of a new surveillance campaign that targeted Egyptian civil society organizations with previously undisclosed versions of FinSpy spyware designed to target Linux and macOS systems. Developed by a German company, FinSpy is extremely powerful spying software that is being sold as a legal law enforcement Continue Reading

Looking for sophisticated malware in IoT devices- Tempemail

One of the motivations for this post is to encourage other researchers who are interested in this topic to join in, to share ideas and knowledge and to help build more capabilities in order to better protect our smart devices. Research background Smart watches, smart home devices and even smart Continue Reading