Fancy Bear Is Using An Undisclosed Malware To Targets Linux Systems?

1
689

The NSA (National Security Agency) and FBI (Federal Bureau of Investigation)have come with a new cybersecurity advisory warning that  Fancy Bear, the Russian government hackers are using undisclosed malware to targets Linux systems. It is the most advanced dramatic twist in the pitiless cybersecurity battle.

The Russian hackers are using malware for Linux systems named ‘Drovorub’ as part of their cyber-espionage operations to steal files and take over devices. It is a Linux malware associated with a nation-state actor that targets Linux systems providing tenacious remote access to a hacker. The Drovorub malware is part of a malware campaign that needs various steps to function perfectly. The malware alone does not grant instant access to a system and it requires various vulnerable components to misuse a system to its full potential.

The terrible assumption among many that malware is only a problem for the Windows operating system might only have been more believable a decade ago. Many argue that Linux’s in-built security is stronger because of the open-source nature of the code and the malware only works on older versions of the Linux kernel. But Drovorub is a warning that hackers are more willing to target all systems if they think there is a profit or other advantage like an opportunity for chaos.  Linux is becoming the framework for many business systems and large parts of the cloud.

These latest discoveries show that all systems will be targeted, even the ones we least expect. Tech innovations like the internet of things and the cloud boost the threat, surface organizations will have to secure and attackers will not continue the old-fashioned ideas about what software and systems are vulnerable to attack.

Most organizations think that they are not going to be a target thinking they are too well protected or too insignificant. But it is a very dangerous assumption and is likely to be wrong.  Even if your company is moderate, you may have consumers or suppliers who are more interesting to the hackers. So they may use your systems as a way to attack them. The thought that you are too well protected or guarded to be a victim is irrelevant where billion-dollar companies were becoming victims of malware attacks.

1 COMMENT