Like Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. To gain control over a Linux system or to cause any serious consequences to the system itself, the malware would have to gain root access to the system.[2]
In the past, it has been suggested that Linux had so little malware because its low market share made it a less profitable target. Rick Moen, an experienced Linux system administrator, counters that:
[That argument] ignores Unix's dominance in a number of non-desktop specialties, including Web servers and scientific workstations. A virus/trojan/worm author who successfully targeted specifically Apache httpd Linux/x86 Web servers would both have an extremely target-rich environment and instantly earn lasting fame, and yet it doesn't happen.[3]
In 2008 the quantity of malware targeting Linux was noted as increasing. Shane Coursen, a senior technical consultant with Kaspersky Lab, said at the time, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system ... The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS."[4]
Tom Ferris, a researcher with Security Protocols, commented on one of Kaspersky's reports, stating, "In people's minds, if it's non-Windows, it's secure, and that's not the case. They think nobody writes malware for Linux or Mac OS X. But that's not necessarily true."[4]
Some Linux users do run Linux-based anti-virus software to scan insecure documents and email which comes from or is going to Windows users. SecurityFocus's Scott Granneman stated:
...some Linux machines definitely need anti-virus software. Samba or NFS servers, for instance, may store documents in undocumented, vulnerable Microsoft formats, such as Word and Excel, that contain and propagate viruses. Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users.[1]
Because they are predominantly used on mail servers which may send mail to computers running other operating systems, Linux virus scanners generally use definitions for, and scan for, all known viruses for all computer platforms. For example, the open source ClamAV "Detects ... viruses, worms and trojans, including Microsoft Office macro viruses, mobile malware, and other threats."[5]
Cases of malware intended for Microsoft Windows systems posing a danger to Linux systems when run through compatibility layers such as Wine, while uncommon, have been recorded.[6]
Viruses and trojan horses
The viruses listed below pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be temporarily infected, as the Linux kernel is memory resident and read-only. Any infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.
It is worth noting that this is true for any malicious program that is run without special steps taken to limit its privileges. It is trivial to add a code snippet to any program that a user may download and let this additional code download a modified login server, an open mail relay, or similar program, and make this additional component run any time the user logs in. No special malware writing skills are needed for this. Special skill may be needed for tricking the user to run the (trojan) program in the first place.
The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who try to ensure that their repository is malware-free. Subsequently, to ensure safe distribution of the software, checksums are made available. These make it possible to reveal modified versions that may have been introduced by e.g. hijacking of communications using a man-in-the-middle attack or via a redirection attack such as ARP or DNS poisoning. Careful use of these digital signatures provides an additional line of defense, which limits the scope of attacks to include only the original authors, package and release maintainers and possibly others with suitable administrative access, depending on how the keys and checksums are handled. Reproducible builds can ensure that digitally signed source code has been reliably transformed into a binary application.
Worms and targeted attacks
The classical threat to Unix-like systems are vulnerabilities in network daemons, such as SSH and web servers. These can be used by worms or for attacks against specific targets. As servers are patched quite quickly when a vulnerability is found, there have been only a few widespread worms of this kind. As specific targets can be attacked through a vulnerability that is not publicly known there is no guarantee that a certain installation is secure. Also servers without such vulnerabilities can be successfully attacked through weak passwords.
Web scripts
Linux servers may also be used by malware without any attack against the system itself, where e.g. web content and scripts are insufficiently restricted or checked and used by malware to attack visitors. Some attacks use complicated malware to attack Linux servers, but when most get full root access then hackers are able to attack by[7] modifying anything like replacing binaries or injecting modules. This may allow the redirection of users to different content on the web.[8] Typically, a CGI script meant for leaving comments, could, by mistake, allow inclusion of code exploiting vulnerabilities in the web browser.
Buffer overruns
Older Linux distributions were relatively sensitive to buffer overflow attacks: if the program did not care about the size of the buffer itself, the kernel provided only limited protection, allowing an attacker to execute arbitrary code under the rights of the vulnerable application under attack. Programs that gain root access even when launched by a non-root user (via the setuid bit) were particularly attractive to attack. However, as of 2009 most of the kernels include address space layout randomization (ASLR), enhanced memory protection and other extensions making such attacks much more difficult to arrange.
Cross-platform viruses
An area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an OpenOffice.org virus called Badbunny.
What makes this virus worth mentioning is that it illustrates how easily scripting platforms, extensibility, plug-ins, ActiveX, etc, can be abused. All too often, this is forgotten in the pursuit to match features with another vendor... The ability for malware to survive in a cross-platform, cross-application environment has particular relevance as more and more malware is pushed out via Web sites. How long until someone uses something like this to drop a JavaScript infecter on a Web server, regardless of platform?[9]
Social engineering
As is the case with any operating system, Linux is vulnerable to malware that tricks the user into installing it through social engineering. In December 2009 a malicious waterfall screensaver that contained a script that used the infected Linux PC in denial-of-service attacks was discovered.[10]
Go-written malware
The IBM Security Report: Attacks on Industries Supporting COVID-19 Response Efforts Double had as a key point that "Cybercriminals Accelerate Use of Linux Malware – With a 40% increase in Linux-related malware families in the past year, and a 500% increase in Go-written malware in the first six months of 2020, attackers are accelerating a migration to Linux malware, that can more easily run on various platforms, including cloud environments." That these cybercriminals are increasingly using Linux and Unix to target hospitals and allied industries (that rely on these systems and cloud networks) that they are increasingly vulnerable during the COVID-19 crisis, such as the Red Cross cyberattack.[11]
Anti-virus applications
There are a number of anti-virus applications available which will run under the Linux operating system. Most of these applications are looking for exploits which could affect users of Microsoft Windows.
For Microsoft Windows-specific threats
These applications are useful for computers (typically, servers) which will pass on files to Microsoft Windows users. They do not look for Linux-specific threats.
The following is a partial list of known Linux malware. However, few if any are in the wild, and most have been rendered obsolete by Linux updates or were never a threat. Known malware is not the only or even the most important threat: new malware or attacks directed to specific sites can use vulnerabilities previously unknown to the community or unused by malware.
Mirai (malware) – a DDoS botnet spreads through telnet service and designed to infect Internet of Things (IoT).[42][43][44][45]
GafGyt/BASHLITE/Qbot – a DDoS botnet spreads through SSH and Telnet service weak passwords, firstly discovered during bash Shellshock vulnerability.[46]
LuaBot – a botnet coded with modules component in Lua programming language, cross-compiled in C wrapper with LibC, it aims for Internet of Things in ARM, MIPS and PPC architectures, with the usage to DDoS, spreads Mirai (malware) or selling proxy access to the cyber crime.[47][48]
Hydra,[49] Aidra,[50] LightAidra[51] and NewAidra[52] – another form of a powerful IRC botnet that infects Linux boxes.
EnergyMech 2.8 overkill mod (Linux/Overkill) – a long-lasting botnet worm designed to infect servers with its bot and operated through IRC protocol, for the purposes of DDoSing and spreading itself.[53]
Xor DDoS[69] – a trojan malware that hijacks Linux systems and uses them to launch DDoS attacks which have reached loads of 150+ Gbps.[70]
Hummingbad – has infected over 10 million Android operating systems. User details are sold and adverts are tapped on without the user's knowledge thereby generating fraudulent advertising revenue.[71]
NyaDrop – a small Linux backdoor compiled from a Linux shellcode to be used to infect Linux boxes with bigger size Linux malware.[72]
PNScan – Linux trojan designed to aim routers and self-infecting to a specific targeted network segment in a worm-like form[73]
SpeakUp – a backdoor trojan that infects six different Linux distributions and macOS devices.[74]
^njccic (28 December 2016). "Mirai Botnet". The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). Archived from the original on 12 December 2016. Retrieved 28 December 2016.
^de Almeida Lopes, Anthony (July 2007). "Project Bukowski". Archived from the original on 14 May 2013. Retrieved 8 March 2008.
^herm1t (February 2008). "Caveat virus". Archived from the original on 23 December 2018. Retrieved 17 January 2010.{{cite web}}: CS1 maint: numeric names: authors list (link)
^herm1t (October 2007). "Hashin' the elves". Archived from the original on 10 October 2014. Retrieved 17 January 2010.{{cite web}}: CS1 maint: numeric names: authors list (link)
2005 single by Faith Evans AgainSingle by Faith Evansfrom the album The First Lady ReleasedFebruary 7, 2005 (2005-02-07)Length3:21LabelCapitolSongwriter(s) Ivan Barias Venus Dodson Faith Evans Carvin Haggins Jerry Harris Producer(s)Carvin & IvanFaith Evans singles chronology Hope (2004) Again (2005) Mesmerized (2005) Again is a song by American singer Faith Evans. It was written by Ivan Barias, Carvin Haggins, and Evans for her fourth studio album The First Lady (2005), whi...
Teknologi reproduksi berbantuanIntervensiIlustrasi yang menggambarkan injeksi sperma intrasitoplasmik (ICSI), salah satu contoh teknologi reproduksi berbantuan.MeSHD027724[sunting di Wikidata] Teknologi reproduksi berbantuan (Inggris: assisted reproductive technology, ART), disingkat TRB, adalah teknologi yang digunakan untuk mendapatkan kehamilan dengan menggunakan prosedur seperti pengobatan fertilitas, fertilisasi in vitro (bayi tabung, IVF), dan surogasi. Teknologi reproduksi ini ...
Stock exchange in Harare, Zimbabwe This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (February 2013) (Learn how and when to remove this template message) Zimbabwe Stock ExchangeTypeStock exchangeLocationHarare, ZimbabweFounded1894Key peopleCaroline Sandura (Board Chairperson) Nkomo L Compliance Mubaiwa R Trading Mushanguri L Business Development Bgoni...
1802 and 1803 House elections in Vermont 1802–1803 United States House of Representatives elections in Vermont ← 1800 December 13, 1802 (1802-12-13) – May 9, 1803 (1803-05-09) 1804–1805 → All 4 Vermont seats to the United States House of Representatives Majority party Minority party Party Federalist Democratic-Republican Last election 1 1 Seats won 3 1 Seat change 2 Elections in Vermont Federal government P...
Ancient religious tendency This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Greco-Buddhist monasticism – news · newspapers · books · scholar · JSTOR (September 2016) (Learn how and when to remove this message) Part of a series onWestern BuddhismStatue of the Buddha in the Japanese Tea Garden, San Francisco Ma...
City in An Giang, Vietnam You can help expand this article with text translated from the corresponding article in Vietnamese. (April 2024) Click [show] for important translation instructions. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia. Consider adding a topic ...
2024 reality television series This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: The Impact: New York – news · newspapers · books · scholar · JSTOR (January ...
烏克蘭總理Прем'єр-міністр України烏克蘭國徽現任杰尼斯·什米加尔自2020年3月4日任命者烏克蘭總統任期總統任命首任維托爾德·福金设立1991年11月后继职位無网站www.kmu.gov.ua/control/en/(英文) 乌克兰 乌克兰政府与政治系列条目 宪法 政府 总统 弗拉基米尔·泽连斯基 總統辦公室 国家安全与国防事务委员会 总统代表(英语:Representatives of the President of Ukraine) 总...
Ottoman administrative district (1516–1917) 1657 map showing the Gouvernement du Sangiac de Jerusalem, by Philippe de La Rue The Sanjak of Jerusalem was an Ottoman sanjak that formed part of the Damascus Eyalet for much of its existence.[1] It was created in the 16th century by the Ottoman Empire after it took over what is now called Israel following the 1516–1517 Ottoman–Mamluk War.[2] It was detached from the Syrian eyalet and placed directly under the Ottoman central ...
Former Chief Executive of Hong Kong For the Hong Kong television presenter and actress, see Carrie Lam (actress). In this Hong Kong name, the surname is Lam (née Cheng). In accordance with Hong Kong custom, the Western-style name is Carrie Lam and the Chinese-style name is (Lam)-Cheng Yuet-ngor. The neutrality of this article is disputed. Relevant discussion may be found on the talk page. Please do not remove this message until conditions to do so are met. (February 2022) (Learn how and when...
Overview of water supply and sanitation in Brazil Water supply and sanitation in BrazilDataAccess to an at least basic water source97% (2015) [1]Access to at least basic sanitation86% (2015) [1]Share of collected wastewater treated35% (2000) [2]Average urban water use (L/person/day)143Average urban water and sanitation tariff (US$/m3)0.82 (2006)[3]Share of household metering76% [4]Annual investment in WSSUS$3.4 bn corresponding to US$17/capita (2012)Fin...
American 1960s gay rights protest Julius sip-inPart of the Gay Liberation MovementImage of bartender at Julius' denying service to men for being gayDateApril 21, 1966LocationJulius40°44′06″N 74°00′05″W / 40.7350°N 74.0015°W / 40.7350; -74.0015Caused by Public accommodations for homosexuals Reaction to the Sit-in movement Parties Mattachine Society New York State Liquor Authority The Julius sip-in was a protest at the Julius Bar in New York City on April 21,...
Untuk nama festival Tahun Baru Hawaii kuno, lihat Makahiki. Matariki, nama Māori untuk Pleiades (foto). Gambar inframerah yang menampakkan rincian antarbintang. Dalam bahasa Māori, Matariki merupakan nama gugus bintang Pleiades sekaligus nama musim waktu terbit pertamanya[1] pada akhir Mei atau awal Juni. Matariki menjadi penanda awal tahun baru. Beberapa orang merayakan Matariki pada waktu yang berbeda; ada yang pada saat gugus bintang ini terbit pada akhir Mei atau awal Juni, ada ...
King of Wessex (871 – c. 886); King of the Anglo-Saxons (c. 886 – 899) King Alfred redirects here. For other uses, see Alfred the Great (disambiguation) and King Alfred (disambiguation). Alfred the GreatSilver penny of Alfred, struck c. 875–880.Legend: elfre d rexKing of the West SaxonsReign23 April 871 – c. 886PredecessorÆthelred IKing of the Anglo-SaxonsReignc. 886 – 26 October 899SuccessorEdward the ElderBorn847–849Wantage, Berkshire,[a] WessexDied26 ...
For the meaning of braille dot patterns, see English Braille. Unicode character blockBraille PatternsRangeU+2800..U+28FF(256 code points)PlaneBMPScriptsBrailleAssigned256 code pointsUnused0 reserved code pointsSource standardsISO 11548-1Unicode version history3.0 (1999)256 (+256) Unicode documentationCode chart ∣ Web pageNote: [1][2] This article contains Unicode Braille characters. Without proper rendering support, you may see question marks, boxes, or other symbols ...
لمعانٍ أخرى، طالع سنترال بارك (توضيح). تحتاج النصوص المترجمة في هذه المقالة إلى مراجعة لضمان معلوماتها وإسنادها وأسلوبها ومصطلحاتها ووضوحها للقارئ، لأنها تشمل ترجمة اقتراضية أو غير سليمة. فضلاً ساهم في تطوير هذه المقالة بمراجعة النصوص وإعادة صياغتها بما يتناسب مع د...
Landlocked body of water that contains concentrations of salts greater than the sea Lake Assal, one of the most saline lakes outside of Antarctica Part of a series onWater salinity Salinity levels Fresh water (< 0.05%)Brackish water (0.05–3%)Saline water (3–5%)Brine (> 5% up to 26%–28% max) Bodies of water Seawater Salt lake Hypersaline lake Salt pan Brine pool Bodies by salinity vteA hypersaline lake is a landlocked body of water that contains significant concentrations of sodium...
Bilateral relationsAzerbaijani–Dutch relations Azerbaijan Netherlands Diplomatic missionEmbassy of Azerbaijan, The HagueEmbassy of the Netherlands, Baku Diplomatic relations exist between Azerbaijan and the Netherlands. Azerbaijan have an embassy in The Hague. the Netherlands has an embassy in Baku. Both countries are full members of the COE. Azerbaijan celebrated its 30th anniversary with the Netherlands on April 1, 2022. History Dutch Prime Minister Mark Rutte meet with Azerbaijani Presid...