Linux at risk from new Trojan horse


Linux at risk from new Trojan horse

Network security specialist Qualys has identified what it describes as a "potentially dangerous" hacking attack on Linux systems.

Based on a Remote Shell Trojan horse, the attack is said to spread via e-mail attachments. Once infected, systems start "listening" for network traffic.

Gerhard Eschelbeck, vice-president of engineering at Qualys said: "The most significant worry is its unique ability to receive and execute payloads through the network, making it a threat to even the most secured hosts."

Qualys said in order to activate an attack on a Linux system hackers send specially crafted network packets designed to launch arbitrary commands. Once launched the commands scour the system for sensitive data, vandalising or completely destroying files on the infected Linux system.

According to Qualys, the Trojan horse attack also has self-replicating capabilities making it likely that it will contaminate and spread through files on the infected system. The Trojan horse may also allow hackers to search the Internet and find infected systems, increasing the speed and likelihood of exposure.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy