Linux systems are being bombarded with ransomware and cryptojacking attacks

A finger pressing a padlock icon
(Image credit: Shutterstock)

The continued success of Linux services in the digital infrastructure and cloud industries over the last few years has painted a target on its back, a new report from VMware has warned.

What’s more, as most anti-malware and cybersecurity solutions are focused on protecting Windows-based devices, Linux is finding itself on thin ice, as threat actors grow aware of this security gap and target the software more than ever before.

VMware's report, based on real-time big data, event streaming processing, static, dynamic and behavioral analytics, and machine learning data, claims ransomware has evolved to target host images used to spin workloads in virtualized environments.

Ransomware, cryptomining, Cobalt Strike

Attackers are now seeking most valuable assets in the cloud, VMware says, mentioning Defray777 as the ransomware family which encrypted host images on ESXi servers, as well as the DarkSide ransomware family that was behind the Colonial Pipeline attack.

Furthermore, multi-cloud infrastructure is often abused to mine cryptocurrencies for the attackers. As cryptojacking, as the method is called, does not completely disrupt the operations of cloud environments like ransomware does, it is a lot more difficult to detect.

Still, almost all (89%) of cryptojacking attacks use XMRig-related libraries. That is why, when XMRig-specific libraries and modules in Linux binaries are identified, it is most likely malicious cryptomining.

There is also the growing problem of Cobalt Strike and Vermilion strike, commercial penetration testing and red team tools for Windows and Linux. 

Even though they aren’t designed to be malicious, they can be used as an implant on a compromised system that gives malicious actors partial control of the machine. VMware discovered more than 14,000 active Cobalt Strike Team Servers on the internet, in the time period between February 2020 and November 2021. 

The fact that the total percentage of cracked and leaked Cobalt Strike customer IDs is 56%, leads VMware to conclude that more than half of Cobalt Strike users may be cybercriminals.

To tackle this growing threat, the report further claims, organizations need to “place a greater priority” on threat detection.

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person holding out their hand with a digital AI symbol.
This ransomware gang is using SSH tunnels to target VMware appliances
Close up of the Linux penguin.
A new Linux backdoor is hitting US universities and governments
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Interlock ransomware attacks highlight need for greater security standards on critical infrastructure
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
A person in a wheelchair working at a computer.
Why betting on Mac security could put your organization at risk
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Latest in Security
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
Latest in News
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedlyleft users exposed for months
ExpressVPN mobile app and Aircove
ExpressVPN ‘reduces workforce’ for the second time in two years
The Nanoleaf PC Screen Mirror Lightstrip being used on a desktop computer.
Mac gaming could get an intriguing boost – but not in the way you'd expect
Snapdragon G Series
Qualcomm poised to muscle in on AMD's territory with powerful gaming handheld processors
David running in the desert in House of David.
Prime Video’s hit new historical drama will continue its reign for another season as House of David gets renewed
Student sat at a desk with a laptop in a dormitory looking at a mobile phone
Windows 11 could eventually help you understand how fast your PC is - as well as offer tips for making your PC or laptop faster for free