Tagged articles
23 articles
Page 1 of 1
Ops Community
Ops Community
Dec 21, 2025 · Information Security

How to Investigate and Harden a Compromised Linux Server: Real-World Case Study

This guide walks through a real incident where a Linux server was hijacked by a mining virus, detailing step‑by‑step emergency response, systematic forensic investigation, cleanup procedures, and hardening measures to prevent future breaches, complete with scripts and best‑practice recommendations.

LinuxRootkitServer Hardening
0 likes · 26 min read
How to Investigate and Harden a Compromised Linux Server: Real-World Case Study
Efficient Ops
Efficient Ops
Aug 15, 2023 · Information Security

How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response

This article details a real‑world Linux server intrusion, describing the observed symptoms, the forensic investigation using commands like ps, top, last, and grep, the removal of malicious cron jobs and backdoors, and the lessons learned for securing SSH, file attributes, and cloud security groups.

RootkitSSHServer Security
0 likes · 15 min read
How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response
Open Source Linux
Open Source Linux
May 22, 2023 · Information Security

Top 10 Linux Antivirus Solutions to Secure Your Servers

This article reviews the ten most effective Linux antivirus tools, explains why protection is essential despite Linux's inherent security, and provides concise descriptions of each solution—including Avast, Chkrootkit, ESET NOD32, F‑PROT, Panda Cloud Cleaner, Rootkit Hunter, ClamAV, Firetools, Comodo, and Sophos—to help users choose the right protection for their systems.

AntivirusLinuxRootkit
0 likes · 7 min read
Top 10 Linux Antivirus Solutions to Secure Your Servers
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

LinuxRootkitServer Security
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
DevOps Operations Practice
DevOps Operations Practice
Sep 26, 2022 · Information Security

Top Linux Antivirus Software: Reviews and Recommendations

This article reviews the most effective Linux antivirus solutions, explains why antivirus protection is still needed on Linux servers despite the platform's inherent security, and provides detailed descriptions of each tool along with installation guidance and usage tips.

AntivirusLinuxMalware Protection
0 likes · 8 min read
Top Linux Antivirus Software: Reviews and Recommendations
Open Source Linux
Open Source Linux
Jul 11, 2022 · Information Security

What Is Symbiote? Inside the New Highly Evasive Linux Rootkit

Researchers from Intezer and BlackBerry uncovered Symbiote, a novel Linux rootkit that loads as a shared library via LD_PRELOAD, hijacks libc and libpcap, uses BPF hooking to hide malicious traffic, and targets credential theft and remote access, especially in Latin American financial sectors.

BPFLD_PRELOADLinux
0 likes · 5 min read
What Is Symbiote? Inside the New Highly Evasive Linux Rootkit
Meituan Technology Team
Meituan Technology Team
Apr 7, 2022 · Information Security

Malicious Use of eBPF in Cloud‑Native Environments: Threats, Detection, and Defense

While eBPF powers modern cloud‑native networking and observability, attackers can exploit its kernel hooks to create stealthy rootkits that manipulate packets, rewrite files, and persist across reboots, so security teams must harden privileges, monitor BPF syscalls, audit loaded programs, and employ signature verification and LSM controls to detect and mitigate these threats.

DetectionRootkitcloud-native security
0 likes · 30 min read
Malicious Use of eBPF in Cloud‑Native Environments: Threats, Detection, and Defense
Open Source Linux
Open Source Linux
Apr 20, 2021 · Information Security

Essential Linux Security Hardening: Accounts, Remote Access, Filesystem & Rootkit Defense

This comprehensive guide walks Linux administrators through critical security hardening steps—including account and login safeguards, remote access controls, filesystem protection, rootkit detection tools, and post‑attack response procedures—to dramatically reduce server vulnerabilities and maintain robust system integrity.

RootkitServerSysadmin
0 likes · 24 min read
Essential Linux Security Hardening: Accounts, Remote Access, Filesystem & Rootkit Defense
21CTO
21CTO
Mar 5, 2021 · Information Security

Essential Linux Security Hardening: Account, Service, and Rootkit Defense

This guide walks operations engineers through comprehensive Linux hardening techniques—including account and login protection, unnecessary service removal, password and key authentication policies, proper use of sudo, system welcome message sanitization, file‑system safeguards, and practical rootkit detection with chkrootkit and RKHunter—plus a step‑by‑step response plan for compromised servers.

HardeningLinuxRootkit
0 likes · 26 min read
Essential Linux Security Hardening: Account, Service, and Rootkit Defense
Efficient Ops
Efficient Ops
Feb 12, 2020 · Information Security

Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection

This guide presents a comprehensive Linux security hardening checklist covering account and login safety, unnecessary service removal, password and key authentication policies, sudo usage, filesystem protection, remote access safeguards, rootkit detection tools, and step‑by‑step incident response for compromised servers.

Account ManagementHardeningLinux
0 likes · 27 min read
Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2018 · Information Security

Essential Linux Security Practices Every Ops Engineer Should Know

This article outlines comprehensive Linux security measures—including account hardening, remote access protection, file system safeguards, rootkit detection tools, and step‑by‑step post‑attack response—to help system administrators strengthen server defenses and quickly recover from compromises.

HardeningLinuxOperations
0 likes · 23 min read
Essential Linux Security Practices Every Ops Engineer Should Know
ITPUB
ITPUB
Jul 2, 2018 · Information Security

Top 8 Free Antivirus Solutions for Linux: Features and Comparison

This guide reviews eight free Linux antivirus tools—ClamAV, ClamTk, ChkrootKit, Rootkit Hunter, Comodo, Sophos, BitDefender, and F‑PROT—detailing their key capabilities, platform support, and how they help protect servers and workstations from malware and rootkits.

AntivirusLinuxRootkit
0 likes · 7 min read
Top 8 Free Antivirus Solutions for Linux: Features and Comparison
dbaplus Community
dbaplus Community
Apr 20, 2017 · Information Security

How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection

This article explains how vulnerabilities, backdoors, and various Oracle rootkit techniques—ranging from simple package tricks to OS‑level and memory‑level attacks—allow attackers to maintain persistent, hidden access to databases, and it offers concrete detection and mitigation strategies.

OracleRootkitVulnerability
0 likes · 19 min read
How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection
MaGe Linux Operations
MaGe Linux Operations
Mar 13, 2017 · Information Security

How I Detected and Eradicated a Linux Rootkit on My Home Network

After a sudden network outage, the author discovers a Linux virtual machine consuming all upstream bandwidth, uncovers a hidden rootkit through process inspection, and documents step‑by‑step methods—including disabling the NIC, using strace, and forcibly removing malicious binaries—to remediate the infection.

CentOSRootkitnetwork troubleshooting
0 likes · 7 min read
How I Detected and Eradicated a Linux Rootkit on My Home Network
ITPUB
ITPUB
Jan 17, 2017 · Information Security

How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic

This article recounts a real‑world incident on an Ubuntu 12.04 server where massive outbound traffic was traced to a hidden trojan, detailing step‑by‑step investigation, identification of malicious processes, removal techniques, and preventive hardening measures.

Network MonitoringRootkitincident response
0 likes · 9 min read
How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic
AI Cyberspace
AI Cyberspace
Jul 8, 2016 · Information Security

How CVE‑2016‑4971 Lets Attackers Hijack wget to Install Rootkits

The CVE‑2016‑4971 vulnerability in older wget versions allows attackers to redirect HTTP downloads to malicious FTP resources, causing hidden .bash_profile files to be written and executed, which can grant full host compromise and rootkit installation.

CVE-2016-4971RootkitSecurity
0 likes · 5 min read
How CVE‑2016‑4971 Lets Attackers Hijack wget to Install Rootkits
Big Data and Microservices
Big Data and Microservices
May 5, 2016 · Information Security

Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise

This guide walks you through eleven systematic Linux security checks—including account inspection, log review, process analysis, file integrity, RPM verification, network monitoring, scheduled tasks, backdoor detection, kernel modules, services, and rootkit scans—to help identify potential system compromises.

ForensicsLinuxRootkit
0 likes · 6 min read
Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise
MaGe Linux Operations
MaGe Linux Operations
Apr 29, 2016 · Information Security

How to Analyze and Recover from a Linux Rootkit Intrusion

This article walks through a real-world Linux server compromise, detailing the attack symptoms, forensic analysis steps, rootkit discovery, exploitation of an Awstats script vulnerability, and practical remediation measures to restore and harden the affected system.

AwstatsForensicsLinux
0 likes · 14 min read
How to Analyze and Recover from a Linux Rootkit Intrusion
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery

This article details a real‑world Linux server intrusion, showing how a rootkit exploited an Awstats script vulnerability, the forensic steps to identify malicious processes, hidden files, and compromised accounts, and the recommended remediation actions to restore a secure environment.

AwstatsForensicsLinux
0 likes · 14 min read
Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery