20
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 08 Oct 2025
20 points (100.0% liked)
Linux
57274 readers
972 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 6 years ago
MODERATORS
This is dangerously false.
edit: I'm sorry to see I have disturbed a few people here, downvoting the truth without a comment. Explains a lot of contemporary politics, I think.
Can I get some list or a reference to educate myself? As far as I know it still holds true. There's rootkits, a lot of old stuff and exploits of webservers or embedded devices, supply chain attacks towards developers and the one day the Mint ISO file got compromised. But I'm completely unaware of desktop computer malware with high risk or actually spreading?! And the list on Wikipedia seems to confirm what i said...
Okay, let's assume for fun that there's highly developed Linux malware that exclusively infects servers and leaves desktops alone. What exactly is a server? Is it a server as soon as a web server service is running? A DNS service? An SMTP service? Some of these are also included with Linux desktops.
But that's not the point. There's no specific "Linux server malware". There's Linux malware. It targets the Linux kernel (current data point), not any web stuff.
For example it's something that has an Apache webserver installed and that Apache is accessible from outside... So the Apache exploit can do something. Do you have both conditions met on your laptop/desktop computer? I'm pretty sure that won't be the case, and that's the difference here.
Let me repeat my last paragraph, as you seem to have stopped reading after the first question mark:
You're wrong. How would an Apache exploit "hack" your Steam or online banking app? That's just not possible.
Malware uses specific attack vectors and specific vulnerabilities.
The "specific vulnerabilities" are usually in the Linux kernel, quite present on every single Linux system. Please follow the link I posted above. This is not about Apache or any other arbitrary user-facing software.
Thanks for the link. But that's not a vulnerability or malware. It's academic research how to hide malicious syscalls. But it can't infect anyone's computer. And there isn't any vulnerability to let it in.
The RingReaper malware is literally a malware, using known vulnerabilities in the Linux kernel...?!
I'm sorry. Most I can find about "RingReaper" is that single blog post or people who rephrased it into their own articles. There seems to be zero information on how it spreads through the internet? And if anyone contracted RingReaper. And I can't even discern how that'd get on someone's computer unless they install it themselves (which is a form of malware, though not very pronounced on linux due to the distributions and central package repositories). There are no other methods highlighted in the post. And it can't do privilege escalation either, just scan for other vulnerabilities. So is this a thing in reality and how can I find out? It seems like valid research to me, but I can't see how it's more than that.
It is one of several things in reality. Linux malware, spreading through the (mostly) same paths as Windows malware does, has been real for quite some time now.
Linux malware threatens Linux computers. It might be important to keep that in mind if you use Linux.
This is dangerously unspecific.
https://linuxsecurity.com/features/ringreaper-linux-malware
Thank you!
I add this overview article https://www.geeksforgeeks.org/ethical-hacking/what-is-linux-malware/
I don't think OP's dad will host a misconfigured cloud service on their computer or set an insecure password, enable ssh and then also open a port in the router. Most attacks on that list are specific to how internet servers are set up. And well, insecure old embedded devices. And we in fact have those systems targeted regularly. My servers gets bombarded with malicious traffic trying to get in.
I guess the problem is not “the truth” but a claim without sources combined with a short communication style for a really complex matter.
Even the link you posted just reports of one malware instead of the current state or perception of the problem. Like a general threat assessment instead of one incident.