IceFire ransomware now encrypts both Linux and Windows systems

Discussion in 'all things UNIX' started by Rasheed187, Mar 12, 2023.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
    This is part of a new trend where hackers also attack Linux servers. And most companies are probably not monitoring Linux based servers.

    https://www.bleepingcomputer.com/ne...-now-encrypts-both-linux-and-windows-systems/
     
    Last edited by a moderator: Mar 12, 2023
  2. SuperSapien

    SuperSapien Registered Member

    Joined:
    Apr 9, 2015
    Posts:
    227
    Hmm I wonder if this will affect Linux desktop users such as Chrome OS since its based off Gentoo?
    Or GNU Linux distros in general?
     
  3. fblais

    fblais Registered Member

    Joined:
    Jul 31, 2008
    Posts:
    1,340
    Location:
    Québec, Canada
    Subscribed.
     
  4. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,064
    Location:
    Canada
    Maybe, but these guys only care about targeting file sharing software of large enterprises to maximize their profits.
     
  5. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,874
    It likely won't affect home users. Organised cybercriminals target companies with unpatched systems and unsafe computing practices because that's where to find the money.
     
  6. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,625
    Location:
    USA
    Agreed. According to this desktop Linux use is less than 3% and users of a free OS is not the place to rob people. The returns would not be worth the effort.
    https://gs.statcounter.com/os-market-share/desktop/worldwide
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
    Yes exactly, this won't be a risk to home users normally speaking. From what I understood, the CentOS was being exploited in this particular case.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.