{"id":112667,"date":"2022-04-11T08:10:00","date_gmt":"2022-04-11T06:10:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=112667"},"modified":"2022-03-14T11:12:03","modified_gmt":"2022-03-14T10:12:03","slug":"linux-based-systems-in-sight","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/linux-based-systems-in-sight\/","title":{"rendered":"Targeting Linux-based systems"},"content":{"rendered":"<p>As the most widely deployed cloud operating system, Linux is a central part of the digital infrastructure and is quickly becoming an attacker's ticket into a multi-cloud environment. VMware has published a threat report, \"Exposing Malware in Linux-Based Multi-Cloud Environments,\" that describes, among other things, how cybercriminals are using malware to attack Linux-based operating systems. Ransomware is increasingly becoming a target on host images used to run workloads in virtualized environments. 89 percent of cryptojacking attacks use XMRig-related libraries, and more than half of Cobalt Strike users may be cybercriminals or are at least using Cobalt Strike illegally. As malware targeting Linux-based operating systems increases in both volume and sophistication in a rapidly changing threat landscape, organizations must make threat detection a higher priority. The most common threats to Linux-based operating systems in multi-cloud environments: Ransomware, Cryptominers and Remote Access Tools.<\/p>","protected":false},"excerpt":{"rendered":"<p>Current malware countermeasures tend to focus on Windows-based threats, making Linux-based workloads easy targets.<\/p>","protected":false},"author":38,"featured_media":112669,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[2,40469],"tags":[67,3862,5207,306],"coauthors":[19920],"class_list":["post-112667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-03","tag-linux","tag-ransomware","tag-sapanoptikum","tag-vmware"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",400,180,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-768x346.jpg",768,346,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-100x45.jpg",100,45,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-480x216.jpg",480,216,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-640x288.jpg",640,288,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-720x324.jpg",720,324,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",1000,450,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits.jpg",600,270,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2022\/04\/shutterstock_789298162-BitsAndSplits-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Aktuelle Malware-Gegenma\u00dfnahmen konzentrieren sich meist auf Windows-basierte Bedrohungen, wodurch Linux-basierte Workloads zum leichten Ziel werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/sapanopticon\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/mag-22-03\/\" rel=\"category tag\">Mag 22-03<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3magpmp.greatsolution.dev\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/112667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=112667"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/112667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/112669"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=112667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=112667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=112667"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=112667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}