Tagged articles
6 articles
Page 1 of 1
Black & White Path
Black & White Path
May 8, 2026 · Information Security

How Ukrainian Cyber Warriors Use Zapper to Hide Malicious Linux Processes

Zapper, a Linux process‑hiding tool created by Hacker’s Choice, runs without root, manipulates the ELF auxiliary vector via ptrace, hides command‑line arguments, environment variables and child processes with negligible overhead, and has been observed in real Ukrainian cyber‑war operations, prompting specific defensive recommendations.

ELF auxiliary vectorLinux securityZapper
0 likes · 10 min read
How Ukrainian Cyber Warriors Use Zapper to Hide Malicious Linux Processes
Raymond Ops
Raymond Ops
Sep 28, 2025 · Information Security

How to Detect and Remove Hidden Linux Mining Malware – A Step‑by‑Step Guide

This guide explains how to identify the symptoms of a hidden cryptocurrency‑mining virus on a Linux server, locate and terminate the concealed processes, disable the malicious startup service, block suspicious IPs, and secure the system using tools such as sysdig, Safedog, and ClamAV.

ClamAVLinux securitySafedog
0 likes · 11 min read
How to Detect and Remove Hidden Linux Mining Malware – A Step‑by‑Step Guide
Refining Core Development Skills
Refining Core Development Skills
Jan 28, 2022 · Information Security

Detecting a Hidden Mining Virus in a Linux System: A Narrative

A dramatized Linux security incident shows how administrators use commands like top, ps, netstat, and the unhide tool to discover hidden mining processes, isolate suspicious network connections, and finally terminate the malicious hidden PID, illustrating practical techniques for rootkit detection and response.

LinuxRootkit DetectionSystem Calls
0 likes · 7 min read
Detecting a Hidden Mining Virus in a Linux System: A Narrative
macrozheng
macrozheng
Feb 2, 2021 · Information Security

How Malware Hides Its Mining Process on Linux and How to Uncover It

An infected Linux server shows high CPU usage but standard tools miss the culprit; this guide explains how mining malware hides its process via /proc tricks, demonstrates detection using network scans, unhide tools, and offers removal steps to eradicate the hidden miner.

Cryptocurrency MiningInformation SecurityLinux
0 likes · 8 min read
How Malware Hides Its Mining Process on Linux and How to Uncover It
Open Source Linux
Open Source Linux
Sep 16, 2020 · Information Security

Hide a Linux Process with One Line of SystemTap Code

Learn a quick, unconventional method to conceal a Linux process from userspace by simply altering its PID with a one‑line SystemTap script, demonstrating how modifying kernel task structures can make the process invisible in procfs and evade standard detection tools.

LinuxSystemTapprocess hiding
0 likes · 3 min read
Hide a Linux Process with One Line of SystemTap Code
Liangxu Linux
Liangxu Linux
Aug 29, 2020 · Information Security

How to Hide a Linux Process with a One‑Line SystemTap Script

This guide shows a quick user‑space technique to conceal a Linux process by overwriting its PID with an unused value using a short SystemTap script, includes the exact code, execution steps, detection method, and a brief explanation of why it works.

LinuxSystemTapkernel
0 likes · 4 min read
How to Hide a Linux Process with a One‑Line SystemTap Script