“Compared to the same period last year” Linux malware numbers were up by almost “650%” & ‘H1 2022 was 31% higher than the number of such samples in the whole year of 2021‘ (NOTE: H1 business term).
Until recently, cybercriminals have largely ignored Linux compared to other more popular operating systems. However, the new data shows that cyber attack trends are shifting.
According to the data presented by the Atlas VPN team, the number of new Linux malware reached record highs in the first half of 2022, as nearly 1.7 million samples were discovered.
Although Linux holds only 1% of the operating system market share, it occupies the second spot on the list with 1.7 million malware in H1 2022.
- That “1%” is actually 0.92% according to Statcounter and is for Operating System Market Share Worldwide…which apparently includes Linux servers ‘n Desktop/laptop ‘n such that use a Linux OS.
In total, 41.4 million newly-programmed Windows malware samples were identified in H1 2022. Compared to H1 2021, when such staples stood at 63.8 million, they diminished by 35%.
Wid over 1.5-Billion Worldwide users, Windows would naturally receive more malware samples than Linux. Last I saw, Linux had about 5-Million Worldwide Desktop/Laptop users, but that wouldn’t include servers ‘n such; however, still small user bases when compared to 1.5-Billion users. A hit of about 1.7 million malware samples in just 6-months is huge for such a small OS user base like Linux.
All other OSes had a decline in the number of malware samples from H1 2021 to H1 2022 – Windows a 35% decline…Android a 58% decline…macOS a 32% decline.
- Again…Linux malware samples in H1 2022 was 31% higher than the number of such samples in the whole year of 2021.
All in all, while Linux is not as popular among computer users as other operating systems, it runs the back-end systems of many networks, making attacks on Linux highly lucrative. As Linux adoption rises, so will attacks against it.
Did you know?
That Windows 10 & Windows 11 include Windows Security: which provides the latest antivirus protection. Your device will be actively protected from the moment you start Windows. Windows Security continually scans for malware (malicious software), viruses, and security threats. In addition to this real-time protection, updates are downloaded automatically to help keep your device safe and protect it from threats.
- Windows Security is built-in to Windows and includes an antivirus program called Microsoft Defender Antivirus. (In early versions of Windows 10, Windows Security is called Windows Defender Security Center).
- If you have another antivirus app installed and turned on, Microsoft Defender Antivirus will turn off automatically. If you uninstall the other app, Microsoft Defender Antivirus will turn back on automatically.
No one is better at stopping malware than Microsoft…’Microsoft helping Linux to protect itself from Malware‘ & ‘Microsoft is giving Linux a significant security update‘ & the *Linux Security Issues* page for more info.
The free Windows Security also protects against ransomware:
- I stopped buying Commercial Virus/Malware protection soon after discovering just how good Windows Security was.
- Trojans – A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious software on your computer.
- Spyware – Spyware invades your computer and attempts to steal your personal information such as credit card or banking information, web browsing data, and passwords to various accounts.
- Adware – Adware is unwanted software that displays advertisements on your screen. Adware collects personal information from you to serve you with more personalized ads.
- Rootkits – Rootkits enable unauthorized users to gain access to your computer without being detected.
- Ransomware – Ransomware is designed to encrypt your files and block access to them until a ransom is paid.
- Worms – A worm replicates itself by infecting other computers that are on the same network. They’re designed to consume bandwidth and interrupt networks.
- Keyloggers – Keyloggers keep track of your keystrokes on your keyboard and record them on a log. This information is used to gain unauthorized access to your accounts.
Here’s another link that adds a few more common types of malware – 9 Common Types Of Malware. They have added Viruses, Crypto-Malware, Logic Bombs, and Bots/Botnets.
Here’s a biggie – 54 Cybersecurity Statistics from 2022: Stay Safe in the New Decade – long list so here are a few quickies:
2. Cybersecurity damages are estimated to hit $6 trillion in 2021.
6. The most commonly used password in 2022 is 123456.
7. IoT devices decrease overall cyber security. (Source: Symantec) Internet of Things, the idea where every device in our life is interconnected in order to make our lives easier and to which many companies gravitate, impacts negatively the overall cybersecurity .. Research conducted by Symantec in 2015 found that smart door locks, as well as 50 other IoT devices, can be remotely accessed without a password and without much hassle. Granted, the technology will improve over time, but the concern for our security must remain high.
8. 50% of Internet users will click on a link from an unknown sender.
14. 68% of small businesses store customers’ email addresses unsafely.
16. 70% of IT professionals say their company can’t respond properly to a cyber threat.
18. There will be 3.5 million unfilled cybersecurity jobs by 2021.
36. More than 4,000 ransomware attacks occur daily.
42. 92% of malware is still delivered via email – The most commonly used method of attack is through phishing, a cyber attack that exploits the receivers’ lack of knowledge and/or attention to trick them they are receiving the email from someone else, typically a bank or someone requesting a payment .. It is appalling that people still fall for this type of scam. We should wise up and realize that the money doesn’t fall from the sky and that we should never pay an “African prince” $1,000 so he can get his inheritance and send us a million bucks after he does. And if you run a business, make sure to get good spam protection on your email hosting.
46. 21% of coordinated cyberattacks come from China.
48. 60% of all online fraud is committed through mobile devices – The preferred gateway of online fraudsters is mobile devices. 40% of fraud attempts are directed towards desktop users, while 60% of the malware infection efforts go to mobile. In addition, 80% of the malware that afflicts phones does so through apps rather than through a mobile web browser.
51. 75% of popular free apps for iOS were hacked at some point – When it comes to Apple and its iOS, 75% of the apps in the popular Free category have been hacked at some point and had the users’ data exposed. The percentage increases for the top 100 paid iOS apps, with 87% of them having been hacked.
52. 80% of popular free apps for Android were hacked at some point – When it comes to popular free apps, 80% of Android apps have been hacked. Things get considerably worse with the free apps, as 97% of them got hacked in the past.
53. 27% of malicious apps are lifestyle apps – (Source: Symantec) The biggest security threat comes from lifestyle apps. Data shows that 27% of all malicious apps belong to this category. Music apps are the second most common source of infection for mobile users, with 20% of all hacked apps coming from this category.
Apps & emails vs OS Users
Yeah, apps are far too often a problem…Be Aware of what you are doing! Idiots download ‘n use “free” crap without even checking into it, and then whine about the OS being a problem!?!
- It has been my experience wid Windows OSes that the user and/or hardware are usually the cause of any problems…a main exception was wid Windows Vista, i.e. many many *MANY* OEMs were a major problem. For some reason, OEMs wanted to install their usual bloat from other OEMs, and/or the OEMs didn’t understand what Vista was and screwed it up. Doing a clean installation of Vista cleared all problems…& I tested most versions of Vista. Great OS!
Yep, users adding free apps and/or opening emails from the infamous “African prince” or their “Bank” or “Amazon” or etc.
Another problem for Windows OS users is that many of them never heard of Defragmenting their drive (called Optimizing now) and disk checking the drive…regularly.
- Be Aware of what you are adding and/or opening!!!
…to be continued.