Linux Operating System is having a really good potential right now if a hacker or cracker wants to prevent those OS. And viruses inside Linux are increases although those viruses cannot destroy or make Linux OS damaged, but some of those viruses are CAN DESTROY and . The peoples who are using Linux are increases and just like windows, the bad programmer started to make some viruses for Linux.
The number of viruses specifically written for Linux has been on the increase in recent years and more than doubled during 2005 from 422 to 863.
Like other Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. As such, viruses typically have a diminished ability to change or impact the host system.
One of the vulnerabilities of Linux is that many users do not think it is vulnerable to viruses. Tom Ferris a researcher with Mission Viejo, California-based Security Protocols said in 2006, “In people’s minds, if it’s non-Windows, it’s secure, and that’s not the case. They think nobody writes malware for Linux or [Mac] OS X. But that’s not necessarily true….”
Shane Coursen a senior technical consultant with Kaspersky Lab noted, “The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system…The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS.”
The viruses listed below still pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be infected. The infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.
The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who ensure that their repository is malware-free. Subsequently to ensure safe distribution of the software, md5 checksums are made available. These methods of attack can be defended against using repositories protected by digital signatures which prevent the hijacking of communications using a man-in-the-middle attack or via a redirection attack such as arp or DNS poisoning. This limits the scope of attacks to include those that have administrative access to the repository itself.
A new area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an Openoffice.org virus called Bad Bunny.
Stuart Smith of Symantec wrote:
For The Antiviruses Application, there’s some popular antivirus such as the open source Clam AV and the commercial freeware Avast! and AVG are available for Linux. For Clam AV , you download it at the repositories if you’re using ubuntu, but Avast! and AVG must downloaded from the antivirus site.
This is a list of a known viruses or trojans at Linux Currently:
* Kaiten – Linux.Backdoor.Kaiten trojan horse
* Rexob – Linux.Backdoor.Rexob trojan
* Alaeda – Virus.Linux.Alaeda
* Bad Bunny – Perl.Badbunny
* Binom – Linux/Binom
* Diesel – Virus.Linux.Diesel.962
* Kagob a – Virus.Linux.Kagob.a
* Kagob b – Virus.Linux.Kagob.b
* MetaPHOR (also known as Simile)
* Nuxbee – Virus.Linux.Nuxbee.1403
* Podloso – Linux.Podloso (The iPod virus)
* Rike – Virus.Linux.Rike.1627
* RST – Virus.Linux.RST.a
* Satyr – Virus.Linux.Satyr.a
* Vit – Virus.Linux.Vit.4096
* Winter – Virus.Linux.Winter.341
* Winux (also known as Lindose and PEElf
* ZipWorm – Virus.Linux.ZipWorm
* Adm – Net-Worm.Linux.Adm
* Cheese – Net-Worm.Linux.Cheese
* Linux/Lion (also known as Ramen)
* Mighty – Net-Worm.Linux.Mighty
* Millen – Linux.Millen.Worm
* SSH Bruteforce
Well, what can we learn from this articles?? You already know the answers. .