Abstract
The events of the previous two years have forced many businesses from many industries to fast transition to remote work mode. Most organizations were unprepared for this new method of working, and many IT professionals first risked the security of the infrastructures they supported. As a result, ransomware developers found a way to resume development of one for the second most popular operating system – Linux, which is dominant in server infrastructures. Attacks up to now have tended to concentrate more on the end user, whereas ransomware developers now target the core of the organization, allowing for greater ransom demands to recover the data. Along with these, there have been increasing reports of new cryptoviruses for Linux in recent months. This concept is not new in 2015, the first ransomware for Linux was disclosed. The paper examines the evolution of cryptoviruses in Linux and demonstrates how to utilize a private cloud to recover data arrays after a ransomware infection in Linux.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have