Completely true. One of the real reasons you would want root access as a
ransomware author is to manipulate the log files (which I hadn't mentioned
prior to this) and for a couple other reasons. As a malware author, you need
to attempt to remove as many traces back as possible. Without root
It's not difficult to distribute something with its permissions set to being
executable already. This is a normal thing for software which is distributed
for GNU/Linux. There's no need to get the user to enter terminal commands;
you just need to convince them to extract a tar.gz and
Ransomware is cross-platform. They exploit vulnerabilities on sites and in
browser plugins, Flash and JavaScript. Disable Flash and use NoScript. Don't
click on dubious attachments in your mail. Keep your files safe in a backup
on an external drive that is not connected to your everyday
>a typical GNU/Linux system would be just as vulnerable as Windows if someone
bothered to target it (assuming they can convince you to run a trojan horse).
Just to explain clearly the difference.. -> On a typical Windbloows
installation all you would need to do is click on a link or open
>*As a side note, ClamAV for example will look for Windows viruses on
GNU/Linux machines
I wonder how well Regin or Stuxnet run under Wine!
I agree completely with root_vegetable. It isn't a matter that malware
doesn't exist for GNU/Linux based systems at all and they actually ARE prime
targets. Most of the internet's backend infrastructure is some sort of
GNU/Linux combination. The real strength from a security perspective for
There is various sorts of malware available, just run rkhunter to see the
kind of malware out there.
The difference is that it's harder for someone to get it if they only install
software in the repository. Thanks, cryptographic signatures! PPAs, though,
could in theory serve up various
And keep in mind that the id of an external hard drive (sdb>sdc) can change
after reboot !
This can save you from doing operations on a non-desired drive.
Since ransomware targets personal files, a typical GNU/Linux system would be
just as vulnerable as Windows if someone bothered to target it (assuming they
can convince you to run a trojan horse). You should keep in mind, though,
that all kinds of things can destroy personal data, such as a
To give just one example, this is the one that hit my mom:
https://en.wikipedia.org/wiki/CryptoLocker
As you can see, GNU/Linux distributions are explicitly immune to its vector
of infection.
My purely personal feeling is that GNU/Linux would have to have a
significantly larger install
sudo apt-get install ransomware
E: Unable to locate package ransomware
I've been hearing a lot lately about ransomware, and I was wondering how
computers became affected by it, and the ramifications for Trisquel/Free
Software.
12 matches
Mail list logo