1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Can you keep Linux-based ransomware from attacking your servers?

Discussion in 'CSO' started by RSS, Dec 4, 2015.

  1. RSS

    RSS New Member Member

    According to SophosLabs, Linux/Ransm-C ransomware is one example of the new Linux-based ransomware attacks, which in this case is built into a small command line program and designed to help crooks extort money through Linux servers.

    “These Linux ransomware attacks are moving away from targeting end users and gravitating toward targeting Linux servers, web servers specifically, with a piece of software that encrypts data and is similar to what we’ve seen in previous years such as CryptoWall, CryptoLocker, and their variants,” explains Bill Swearingen, director of Cyber Defense, CenturyLink.

    As long as attackers can leverage the ease of coding strong encryption and the high availability of anonymous currencies and anonymous hosting, ransomware is here to stay, says Swearingen. With security organizations like SophosLabs seeing and tracking new variants of Linux ransomware, enterprises should make themselves aware of its risks and cures, since as server owners, users, or operators they are prime targets.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page