Experts Comments Linux Malware (Skidmap) Illicit Cryptocurrency Mining

As part of our experts’ comment series, please find below comments from security experts on Linux malware (Skidmap) disguising itself on infected machines for the purpose of unlawful cryptocurrency mining,  


EXPERTS COMMENTS
Dr. Muhammad Malik, Editor-in-Chief,  Information Security Buzz
September 25, 2019
It is important to understand the character of a particular malware family and it’s Indicator of compromise.
Cryptocurrency mining malware is still a prevalent threat in 2019 and Cybercriminals are devising new ways to make a profit from these malware. The Skidmap is one of the recent examples, which hides inside the kernel to hide illicit cryptocurrency mining. This new kernel-mode is much more difficult to detect compared to its previous user-mode counterparts which show malware are getting smarter day ....
[Read More >>]
Casey Ellis, CTO and Founder,  Bugcrowd
September 18, 2019
Over the last several months, we’ve seen more evidence that suggests that attackers are continuing to increase their focus on Linux.
The sheer amount of work put into commodity malware that targets Linux is what I find interesting about Skidmap. This is a very thoughtful set of obfuscations and concealments more typical of "spray-and-pray" cryptominers targeting Windows or Mac operating systems - or of more customized, targeted Linux malware that’s unlikely to be a part of a campaign like this one. Over the last several month ....
[Read More >>]

If you are an expert on this topic:

Submit Your Expert Comments


In this article