Tagged articles
13 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Jul 8, 2025 · Information Security

How to Detect and Remove Linux Mining Malware: Step‑by‑Step Guide

This article explains how to identify high CPU usage caused by hidden mining malware on Linux servers and provides a comprehensive, command‑line driven process for isolating the host, blocking malicious network traffic, cleaning cron jobs, startup services, compromised libraries, SSH keys, and terminating malicious processes.

LinuxMalware RemovalSecurity
0 likes · 10 min read
How to Detect and Remove Linux Mining Malware: Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

How to Detect and Remove Linux Mining Malware: Step-by-Step Guide

This guide explains how to identify high CPU usage caused by mining trojans on Linux servers, isolate and block malicious network traffic, clean scheduled tasks, startup services, compromised libraries, SSH keys, and finally terminate and delete the malicious processes and files.

LinuxMalware Removalcron
0 likes · 9 min read
How to Detect and Remove Linux Mining Malware: Step-by-Step Guide
Java Captain
Java Captain
Sep 14, 2022 · Information Security

Server Intrusion Investigation and Remediation on a Compromised Linux Host

This article documents a recent Linux server compromise, detailing observed symptoms, investigative commands, discovered malicious scripts, and step‑by‑step remediation actions such as restricting SSH access, unlocking and restoring system utilities, removing malicious cron jobs, and hardening the system against future attacks.

LinuxMalware RemovalSSH
0 likes · 13 min read
Server Intrusion Investigation and Remediation on a Compromised Linux Host
Liangxu Linux
Liangxu Linux
Aug 21, 2022 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Infections

This guide walks you through a complete Linux incident‑response workflow—identifying suspicious behavior, locating and terminating malicious processes, eliminating virus files, closing persistence mechanisms, and hardening the system to prevent future compromises—using practical shell commands and real‑world examples.

LinuxMalware RemovalSecurity
0 likes · 9 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Infections
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2022 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step

This guide presents a practical four‑stage Linux incident‑response workflow—identifying suspicious behavior, terminating and deleting malicious processes, sealing persistence mechanisms, and hardening the system—complete with essential shell commands and verification steps to efficiently neutralize Linux‑based malware.

LinuxMalware RemovalSecurity
0 likes · 10 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step
Open Source Linux
Open Source Linux
Nov 25, 2021 · Information Security

Master Linux Incident Response: Step-by-Step Virus Detection and Removal

This guide walks through a four‑stage Linux incident‑response workflow—identifying symptoms, killing malicious processes, closing persistence mechanisms, and hardening the system—while providing the exact shell commands needed to detect and eradicate Linux malware.

LinuxMalware RemovalShell Commands
0 likes · 6 min read
Master Linux Incident Response: Step-by-Step Virus Detection and Removal
MaGe Linux Operations
MaGe Linux Operations
Sep 16, 2021 · Information Security

Detect and Eliminate Mining Trojans on Cloud Servers: A Complete Guide

This guide explains what mining trojans are, how they consume CPU resources and spread within networks, and provides step‑by‑step detection and removal procedures—including host isolation, network blocking, cron and systemd cleanup, preload hijack removal, and process termination—to help security engineers secure cloud servers.

LinuxMalware Removalcloud security
0 likes · 12 min read
Detect and Eliminate Mining Trojans on Cloud Servers: A Complete Guide
Ops Development Stories
Ops Development Stories
Jan 22, 2020 · Information Security

How to Detect and Eradicate Hidden Windows Server Mining Malware

This article walks through the discovery, analysis, and complete removal of a stealthy Windows Server mining malware, detailing suspicious processes, malicious scheduled tasks, registry modifications, WMI persistence, and post‑infection hardening steps to secure the system.

Malware RemovalScheduled TasksWindows server
0 likes · 25 min read
How to Detect and Eradicate Hidden Windows Server Mining Malware
Liangxu Linux
Liangxu Linux
Dec 10, 2019 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step

This guide walks you through a complete Linux incident‑response workflow—identifying suspicious behavior, terminating malicious processes, eradicating virus files, closing persistence mechanisms, and hardening the system—while providing concrete shell commands and practical tips for each stage.

Malware RemovalSecuritySystem Hardening
0 likes · 10 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step
Efficient Ops
Efficient Ops
Dec 5, 2019 · Information Security

Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal

This guide walks you through a complete Linux emergency response workflow—identifying suspicious behavior, terminating malicious processes, removing infected files, eliminating persistence mechanisms, hardening the system, and adding command auditing—using practical shell commands and examples.

LinuxMalware RemovalSecurity
0 likes · 9 min read
Master Linux Incident Response: Step‑by‑Step Virus Detection and Removal