{"id":48390,"date":"2022-09-01T11:27:33","date_gmt":"2022-09-01T11:27:33","guid":{"rendered":"http:\/\/a12b6955-bf35-476f-ba45-d64818eed76a"},"modified":"2022-09-01T11:27:33","modified_gmt":"2022-09-01T11:27:33","slug":"linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/","title":{"rendered":"Linux devices &#8216;increasingly&#8217; under attack from hackers, warn security researchers"},"content":{"rendered":"<figure uuid=\"7c0cdc25-9d34-4c8b-958a-14ae16877a83\" size=\"original\" float=\"none\" image-caption=\"\" image-credit=\"Image: Getty\" image-alt-text=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\" image-filename=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\" image-date-created=\"2021\/11\/16\" image-width=\"2119\" image-height=\"1415\" image-do-not-crop=\"false\" image-do-not-resize=\"false\" image-watermark=\"false\" lightbox=\"false\" preload=\"true\" class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/389441bac21dd344d2e7b0da91831981b181024a\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=768\" alt=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a1f60fcbf8d84b887692db05b0f86d4780a93dc0\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1024\" alt=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\" alt=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\" alt=\"the-hands-of-a-computer-hacker-over-a-keyboard.jpg\" height=\"801.3213780084945\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>There&#8217;s been a big rise in ransomware attacks targeting Linux as cyber criminals look to expand their options and exploit an operating system that is often overlooked when businesses think about security.<\/p>\n<p>According to analysis by <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/defending-the-expanding-attack-surface-trend-micro-2022-midyear-cybersecurity-report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cybersecurity researchers at Trend Micro<\/a>, Linux servers are &#8220;increasingly coming under fire&#8221; from <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware attacks<\/a>, with detections up by 75% over the course of the last year as cyber criminals look to expand their attacks beyond Windows operating systems.&nbsp;<\/p>\n<p>Linux powers important enterprise IT infrastructure including servers, which makes it an attractive target for ransomware gangs \u2013 particularly when a <a href=\"https:\/\/www.zdnet.com\/article\/linux-malware-attacks-are-on-the-rise-and-businesses-arent-ready-for-it\/\" rel=\"follow\">perceived lack of threat to Linux systems<\/a> compared with Windows means that cybersecurity teams might choose to focus on defending Windows networks against cybercrime. &nbsp;<\/p>\n<p>Researchers note that ransomware groups are increasingly tailoring their attacks to focus specifically on Linux systems.<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\"><strong>Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/strong><\/a><\/strong><\/p>\n<p>For example, <a href=\"https:\/\/www.zdnet.com\/article\/fbi-watch-out-for-lockbit-2-0-ransomware-heres-how-to-reduce-the-risk-to-your-network\/\" rel=\"follow\">LockBit<\/a> is one of the most prolific and successful ransomware operations of recent times and now offers <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-ransomware-is-now-targeting-linux-servers-too\/\" rel=\"follow\">the option of a Linux-based variant<\/a>&nbsp;that is designed to target Linux systems and has been used to conduct attacks in the wild.&nbsp;<\/p>\n<p>Ransomware attackers are financially motivated and will readily follow new opportunities if they think that it can help them make more money \u2013 and it appears that encrypting Linux systems and demanding a payment for the key to unlock files and servers is becoming increasingly popular.&nbsp;<\/p>\n<p>Researchers suggest that this approach is only going to become more common as ransomware attackers look to make the most money possible.&nbsp;<\/p>\n<p>&#8220;New and emerging threat groups continue to evolve their business model, focusing their attacks with even greater precision. That&#8217;s why it&#8217;s essential that organizations get better at mapping, understanding, and protecting their expanding digital attack surface,&#8221; said Jon Clay, VP of threat intelligence for Trend Micro.&nbsp;<\/p>\n<p>And it isn&#8217;t just ransomware groups that are increasingly turning their attentions towards Linux \u2013 according to Trend Micro, there&#8217;s been a 145% increase in Linux-based <a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-cryptocurrency-mining-malware-hides-on-windows-pc-for-a-month-before-launching\/\" rel=\"follow\">cryptocurrency-mining malware attacks,<\/a> where cyber criminals secretly exploit the power of infected computers and servers to mine for cryptocurrency for themselves.&nbsp;<\/p>\n<p>One of the ways cyber criminals are compromising Linux systems is by exploiting unpatched vulnerabilities. According to the report, these flaws include <a href=\"https:\/\/www.zdnet.com\/article\/dirty-pipe-linux-vulnerability-discovered-fixed\/\" rel=\"follow\">CVE-2022-0847<\/a> \u2013 also known as Dirty Pipe \u2013 a bug that affects the Linux kernel from versions 5.8 and up, which attackers can use to escalate their privileges and run code. Researchers warn that this bug is &#8220;relatively easy to exploit&#8221;.&nbsp;<\/p>\n<p>To protect Linux systems from ransomware and other cyberattacks, it&#8217;s recommended that all <a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">security patches are applied as soon as possible<\/a> to prevent cyber criminals from being able to take advantage of known exploits that have fixes available.&nbsp;<\/p>\n<p>It&#8217;s also recommended that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time\/\" rel=\"follow\">multi-factor authentication<\/a>&nbsp;is applied across the entire ecosystem to provide an additional layer of defence against attacks and prevent ransomware hackers from being able to move around networks.<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware groups want to make as much money as possible &#8211; that means they&#8217;re going after more varied targets.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48390","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Linux devices &#039;increasingly&#039; under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux devices &#039;increasingly&#039; under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-01T11:27:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Linux devices &#8216;increasingly&#8217; under attack from hackers, warn security researchers\",\"datePublished\":\"2022-09-01T11:27:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/\"},\"wordCount\":519,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/\",\"name\":\"Linux devices 'increasingly' under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-09-01T11:27:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux devices &#8216;increasingly&#8217; under attack from hackers, warn security researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux devices 'increasingly' under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/","og_locale":"en_US","og_type":"article","og_title":"Linux devices 'increasingly' under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-01T11:27:33+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Linux devices &#8216;increasingly&#8217; under attack from hackers, warn security researchers","datePublished":"2022-09-01T11:27:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/"},"wordCount":519,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/","url":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/","name":"Linux devices 'increasingly' under attack from hackers, warn security researchers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200","datePublished":"2022-09-01T11:27:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ffdbd6c60d66cd7bfa8ff5f2dd0c7e885781cec9\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/linux-devices-increasingly-under-attack-from-hackers-warn-security-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux devices &#8216;increasingly&#8217; under attack from hackers, warn security researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48390"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48390\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}