Linux at risk from new Trojan horse

News

Linux at risk from new Trojan horse

Network security specialist Qualys has identified what it describes as a "potentially dangerous" hacking attack on Linux systems.

Based on a Remote Shell Trojan horse, the attack is said to spread via e-mail attachments. Once infected, systems start "listening" for network traffic.

Gerhard Eschelbeck, vice-president of engineering at Qualys said: "The most significant worry is its unique ability to receive and execute payloads through the network, making it a threat to even the most secured hosts."

Qualys said in order to activate an attack on a Linux system hackers send specially crafted network packets designed to launch arbitrary commands. Once launched the commands scour the system for sensitive data, vandalising or completely destroying files on the infected Linux system.

According to Qualys, the Trojan horse attack also has self-replicating capabilities making it likely that it will contaminate and spread through files on the infected system. The Trojan horse may also allow hackers to search the Internet and find infected systems, increasing the speed and likelihood of exposure.

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy