Cyberattacks on Linux Devices Soar

September 2, 2022

Cybersecurity researchers from Trend Micro have noted a jump of 75% over the previous year in the number of ransomware attacks on Linux users.

In addition to ransomware groups, there is also a 145% increase in Linux-based cryptocurrency mining malware attacks. In this case, the attackers secretly exploit the power of infected computers and servers to mine for cryptocurrency for themselves.

Hackers are generally motivated to target industries where they know that there is a high possibility of making money. Therefore, encrypting Linux systems could be lucrative, given how quickly attacks on Linux servers increase.

One of the identified strategies that cyberattacks use to compromise Linux systems is to exploit unpatched vulnerabilities. The report identified one of the vulnerabilities known as Dirty Pipe. Dirty Pipe tracked as CVE-2022-0847 affects the Linux kernel version 5.8 and higher, which attackers can use to elevate privileges and execute code.

To protect Linux systems from cyberattacks, researchers recommend applying all security patches as quickly as possible to prevent attackers from exploiting publicly available exploits.

It is also important that organizations apply multi-factor authentication throughout the ecosystem. MFA will provide an additional level of defense and prevent ransomware hackers from carrying out lateral movements across the network.

The sources for this piece include an article in ZDNet.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn