Tagged articles
2 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Sep 28, 2025 · Information Security

How to Detect and Remove Hidden Linux Mining Malware – A Step‑by‑Step Guide

This guide explains how to identify the symptoms of a hidden cryptocurrency‑mining virus on a Linux server, locate and terminate the concealed processes, disable the malicious startup service, block suspicious IPs, and secure the system using tools such as sysdig, Safedog, and ClamAV.

ClamAVLinux securitySafedog
0 likes · 11 min read
How to Detect and Remove Hidden Linux Mining Malware – A Step‑by‑Step Guide
Refining Core Development Skills
Refining Core Development Skills
Jan 28, 2022 · Information Security

Detecting a Hidden Mining Virus in a Linux System: A Narrative

A dramatized Linux security incident shows how administrators use commands like top, ps, netstat, and the unhide tool to discover hidden mining processes, isolate suspicious network connections, and finally terminate the malicious hidden PID, illustrating practical techniques for rootkit detection and response.

LinuxRootkit DetectionSystem Calls
0 likes · 7 min read
Detecting a Hidden Mining Virus in a Linux System: A Narrative