The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National… The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National…

Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns

2025/11/02 20:23

CISA issues Linux ransomware attack warning.

Getty

Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know.

ForbesLinkedIn DM Attack Warning — What Users Need To Know

Linux Kernel Vulnerability Exploited By Ransomware Attackers

The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.”

But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National Institute of Standards and Technology.

ForbesNew Proton Research Exposes 300 Million Stolen Credentials

This isn’t theoretical; this is real life. If you are using any of these Linux platform versions, then you need to update as soon as possible. Ransomware actors can use CVE-2024-1086, alongside standard phishing techniques, to cause significant harm to businesses if not. Proof-of-concept code is not difficult to find on the dark web and assorted criminal marketplaces. So, what are you waiting for?

Source: https://www.forbes.com/sites/daveywinder/2025/11/02/ongoing-ransomware-attacks-exploit-linux-vulnerability-cisa-warns/

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Adoption Leads Traders to Snorter Token

Adoption Leads Traders to Snorter Token

The post Adoption Leads Traders to Snorter Token appeared on BitcoinEthereumNews.com. Largest Bank in Spain Launches Crypto Service: Adoption Leads Traders to Snorter Token Sign Up for Our Newsletter! For updates and exclusive offers enter your email. Leah is a British journalist with a BA in Journalism, Media, and Communications and nearly a decade of content writing experience. Over the last four years, her focus has primarily been on Web3 technologies, driven by her genuine enthusiasm for decentralization and the latest technological advancements. She has contributed to leading crypto and NFT publications – Cointelegraph, Coinbound, Crypto News, NFT Plazas, Bitcolumnist, Techreport, and NFT Lately – which has elevated her to a senior role in crypto journalism. Whether crafting breaking news or in-depth reviews, she strives to engage her readers with the latest insights and information. Her articles often span the hottest cryptos, exchanges, and evolving regulations. As part of her ploy to attract crypto newbies into Web3, she explains even the most complex topics in an easily understandable and engaging way. Further underscoring her dynamic journalism background, she has written for various sectors, including software testing (TEST Magazine), travel (Travel Off Path), and music (Mixmag). When she’s not deep into a crypto rabbit hole, she’s probably island-hopping (with the Galapagos and Hainan being her go-to’s). Or perhaps sketching chalk pencil drawings while listening to the Pixies, her all-time favorite band. This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Center or Cookie Policy. I Agree Source: https://bitcoinist.com/banco-santander-and-snorter-token-crypto-services/
Paylaş
BitcoinEthereumNews2025/09/17 23:45