{"id":116415,"date":"2023-04-10T11:10:31","date_gmt":"2023-04-10T11:10:31","guid":{"rendered":"https:\/\/businessyield.com\/?p=116415"},"modified":"2023-04-10T11:11:10","modified_gmt":"2023-04-10T11:11:10","slug":"melofee","status":"publish","type":"post","link":"https:\/\/businessyield.com\/terms\/melofee\/","title":{"rendered":"M\u00e9lof\u00e9e: a newly discovered malware that Linux-based businesses should watch out for ","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"

M\u00e9lof\u00e9e is a new piece of malware designed especially for Linux servers. It seems like an unknown Chinese group has been associated with this discovery. A French cybersecurity company identified the threat, and it looks like its traces take us back to early 2022, meaning that the virus might\u2019ve already made cracks in some servers. <\/p>

Commonly, the Linux system is known as the best and most secure operating system. Still, since more devices and servers have turned to it recently, Linux has been the focus of cybercriminals more than ever, as Linux malware samples increased by\u00a050% in 2022<\/a>\u00a0as to the previous year. Hackers seem to target businesses and industries more often, so Linux-based organizations must prioritize cyber security.\u00a0<\/p>

Let\u2019s see how this new malware works and what companies can do to prevent further attacks.\u00a0<\/p>

How M\u00e9lof\u00e9e works<\/span><\/h2>

The hacking system is not something revolutionary regarding the world of malware, but it is seen as strong enough to break through Linux. The scheme is designed to drop a kernel-mode rootkit based on an open-sourced project known as Reptile. Although it has a limited set of features, M\u00e9lof\u00e9e installs a hook intended for hiding itself, meaning it can\u2019t be identified that easily. The attack is deployed through shell commands that automatically download the installer from a remote server, along with a custom binary package. <\/p>

M\u00e9lof\u00e9e, although a less complex cyber-attack, may offer adversaries the opportunity to conduct attacks without being recognized since implants are not widely seen. This is a severe issue that needs to be addressed because SMEs might not have the proper systems to face such complex ways of entering systems. However, software like\u00a0Norton security<\/a>\u00a0systems is highly accessible and efficient.\u00a0<\/p>

If Linux is susceptible to these dangerous attacks, why use it?<\/span><\/h3>

Generally speaking, Linux has more benefits than drawbacks. Some of these advantages are not even included in other operating systems, such as Windows. Linux is also present in broader industries, from phones and cars to televisions and supercomputers. <\/p>

Here\u2019s why Linux is a great operating system:<\/p>