Nintendo-Power

Daily Gaming news, videos, reviews, tips & guides. Let's share our love of BigN games!

Terrible malware targeting Linux computers

Terrible malware targeting Linux computers

A new family Malware Now appears and attacks the systems running under it
Linux. The malware lurks and delivers in Linux applications with a legitimate look
Hackers Stolen intentions for easy access to user data. It differs from other malware in its likelihood and its optimal regression.

According to researchers at the Network Security Institute Asset, “FontOnLake” malware continues to appear on Linux systems. First diagnosed on Total virus In May 2020, but the command and control servers associated with this malware were later disabled.

However, the analysis of the detected samples helped the researchers to discover the FontOnLake remote access function, the data theft tools and whether it could boot proxy servers. However, Eset researchers believe that malware operators are very cautious about getting caught because all samples obtained use different server addresses.

Modified Linux applications

Eset claims that malware is transmitted with modified Linux applications that contain Trojans. “All modified files are standard Linux applications and run as a stability system because they are usually executed at system startup,” says Vladislav Hrčka, malware and reverse engineering analyst at Eset. Researchers say that hackers have modified the source code of formal applications to attach malicious code. However, experts are still looking for distribution methods that can be used to convince users to install these malicious versions.

This malware installs backdoor on infected computers and allows hackers to collect large amounts of data. Researchers have found rootkits in malware, which allows them to act more intelligently when they are difficult to remove. These rootkits also allow you to update yourself. According to Avast, Rootkit based on open source Suterusu program.

See also  This is Mars - Panorama

Unfortunately, this is not the first malware of its kind to attack Linux devices, and last August Avast warned users about “HCRootkit” malware that used the same Suterusu rootkit. As always in this kind of situation it is important to remember that most hacks are caused by user negligence. Therefore, do not install software or applications from sources that do not guarantee reliability.