Malware Targeting Linux On The Rise, Shows Study
Linux malware is on the rise, indicating that the cyber security battleground is gradually shifting to Linux and Web Servers, according to a new study. The WatchGuard’s Internet Security Report explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. Among its most notable findings, the report revealed that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017. This attack pattern demonstrates the urgent need for heightened security measures to protect Linux servers and Linux-dependent IoT devices.
“This new Firebox Feed data allows us to feel the pulse of the latest network attacks and malware trends in order to identify patterns that influence the constantly evolving threat landscape,” said Corey Nachreiner, CTO at WatchGuard Technologies. “The Q1 report findings continue to reinforce the importance and effectiveness of basic security policies, layered defenses and advanced malware prevention. We urge readers to examine the report’s key takeways and best practices, and bring them to the forefront of information security efforts within their organizations.”
WatchGuard’s Internet Security Report is designed to offer educational insights, research and security recommendations to help readers better protect themselves and their organizations against modern threat actors. Key findings from the Q1 2017 report include:
Linux malware is on the rise, making up 36 percent of the top malware detected in Q1. The increased presence of Linux/Exploit, Linux/Downloader and Linux/Flooder combined to illustrate attackers’ increased focus on Linux servers and IoT devices. Users should protect IoT products and Linux servers from the internet with layered defenses.
Legacy antivirus (AV) continues to miss new malware – at a higher rate. In fact, AV solutions missed 38 percent of the total threats WatchGuard caught in Q1, compared to 30 percent in Q4 2016. The growing number of new or zero day malware now evading traditional AV highlights the weaknesses of signature-based detection solutions and the need for services that can detect and deter advanced persistent threats.
The cybersecurity battleground is shifting toward web servers. Last quarter, drive-by downloads and browser-based attacks were predominant. In Q1, 82 percent of the top network attacks targeted web servers (or other web-based services). Users should strengthen web server defenses by hardening permissions, limiting resource exposure, and patching server software.
Attackers still exploit the Android StageFright flaw. This exploit first gained notoriety in 2015, and is proving its longevity as the first mobile-specific threat to hit WatchGuard Threat Lab’s top 10 attacks list this year. At a minimum, Android users should regularly upgrade their operating systems to prevent mobile attacks like StageFright.
Threat actors take a break from hacking the holidays. Overall, threat volume decreased 52% in Q1 2017 compared to Q4 2016. We believe the drop in malware detections can be attributed to the absence of seasonal malware campaigns associated with various Q4 holidays, which increased overall malware instances during that period.
- GST: Security Issues Plaguing India's Latest Tax Reform
- Govt Considers Insurance Cover For Fraudulent Digital Transaction
- Re-Skilling Efforts To Continue In IT Sector: Nasscom
- Using Virtualization To Enhance Security, Save On Infrastructure
- Weekly Rewind: Top 10 Stories On CXO Today (July 10-14)
- Firms Weaving Security Into Their DevOps Practice Early On
- Security In Digital Payments: Urgent Need For Focus
- Videocon Telecom Ventures Into Security, Survelliance
- Apple To Test 3-D Scanning For Its Next iPhone
- Simplifying ERP Even For Entry Level Staff