List of Linux malware

from Wikipedia, the free encyclopedia

Surname Type Discovered Remarks
Adore worm 2001
Ramen worm worm 2001 Attacks Red Hat servers.
Mighty worm 2002
Linux.Devnull worm Also known as Linux.Slapper.D
Linux / slapper worm
Lupper worm 2005 Is known by various names, including the names Plupii.C, Lupper.worm.b, Lupper-I and Mare.d.
Bliss virus Attaches to files that can no longer be executed afterwards
L10n worm worm
OSF.8759 virus Infects ELF binaries on Linux systems
Staog virus 1996 Also known as Linux / Staog, uses already closed security holes, therefore inactive
Linux / Hutizu-A Trojans 2012 Also known as Backdoor.Linux.Hutizu.a
Trojan-Spy.Linux.Small.a Trojans Jan 2007 Linux ELF file, steals data
Hand of Thief Trojans Aug 2013 picks up form entries in the browser
Turla Trojans 2014 steals data
Mirai worm 2016 On the Internet-of-Things specialized devices

Web links

Individual evidence

  1. ^ Jose Nazario: Defense and Detection Strategies Against Internet Worms. Norwood 2004, p. 49.
  2. heise online: Linux worm is obviously spreading rapidly. In: heise online. Retrieved March 2, 2016 .
  3. Slapper descendant, attacks computer through a hole in the SSL module "mod_ssl". Linuxvirus - Community Help Wiki, accessed January 25, 2017 .
  4. Worm: Linux / Slapper Description | F-Secure Labs. (No longer available online.) In: www.f-secure.com. Archived from the original on March 4, 2016 ; accessed on March 2, 2016 . Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. @1@ 2Template: Webachiv / IABot / www.f-secure.com
  5. heise online: Linux worm Lupper mutated. In: heise online. Retrieved March 2, 2016 .
  6. Linux / Hutizu-A - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center. In: www.sophos.com. Retrieved March 2, 2016 .
  7. Thieves Reaching for Linux— "Hand of Thief" Trojan Targets Linux # INTH3WILD - Speaking of Security - The RSA Blog and Podcast. (No longer available online.) In: Speaking of Security - The RSA Blog and Podcast. Archived from the original on August 15, 2013 ; Retrieved March 2, 2016 (American English). Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. @1@ 2Template: Webachiv / IABot / blogs.rsa.com