The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National… The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National…

Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns

2025/11/02 20:23

CISA issues Linux ransomware attack warning.

Getty

Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know.

ForbesLinkedIn DM Attack Warning — What Users Need To Know

Linux Kernel Vulnerability Exploited By Ransomware Attackers

The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.”

But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National Institute of Standards and Technology.

ForbesNew Proton Research Exposes 300 Million Stolen Credentials

This isn’t theoretical; this is real life. If you are using any of these Linux platform versions, then you need to update as soon as possible. Ransomware actors can use CVE-2024-1086, alongside standard phishing techniques, to cause significant harm to businesses if not. Proof-of-concept code is not difficult to find on the dark web and assorted criminal marketplaces. So, what are you waiting for?

Source: https://www.forbes.com/sites/daveywinder/2025/11/02/ongoing-ransomware-attacks-exploit-linux-vulnerability-cisa-warns/

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Wormhole Jumps 11% on Revised Tokenomics and Reserve Initiative

Wormhole Jumps 11% on Revised Tokenomics and Reserve Initiative

The post Wormhole Jumps 11% on Revised Tokenomics and Reserve Initiative appeared on BitcoinEthereumNews.com. Cross-chain bridge Wormhole plans to launch a reserve funded by both on-chain and off-chain revenues. Wormhole, a cross-chain bridge connecting over 40 blockchain networks, unveiled a tokenomics overhaul on Wednesday, hinting at updated staking incentives, a strategic reserve for the W token, and a smoother unlock schedule. The price of W jumped 11% on the news to $0.096, though the token is still down 92% since its debut in April 2024. W Chart In a blog post, Wormhole said it’s planning to set up a “Wormhole Reserve” that will accumulate on-chain and off-chain revenues “to support the growth of the Wormhole ecosystem.” The protocol also said it plans to target a 4% base yield for governance stakers, replacing the current variable APY system, noting that “yield will come from a combination of the existing token supply and protocol revenues.” It’s unclear whether Wormhole will draw from the reserve to fund this target. Wormhole did not immediately respond to The Defiant’s request for comment. Wormhole emphasized that the maximum supply of 10 billion W tokens will remain the same, while large annual token unlocks will be replaced by a bi-weekly distribution beginning Oct. 3 to eliminate “moments of concentrated market pressure.” Data from CoinGecko shows there are over 4.7 billion W tokens in circulation, meaning that more than half the supply is yet to be unlocked, with portions of that supply to be released over the next 4.5 years. Source: https://thedefiant.io/news/defi/wormhole-jumps-11-on-revised-tokenomics-and-reserve-initiative
Paylaş
BitcoinEthereumNews2025/09/18 01:31