Home Latest News Comparative Study Results on Linux and Windows Ransomware Attacks

Comparative Study Results on Linux and Windows Ransomware Attacks

by CISOCONNECT Bureau

In a recent study conducted by Check Point Research (CPR), an in-depth examination of ransomware attacks on Linux and Windows systems sheds light on evolving trends in cyber threats. As ransomware attacks on Linux systems, particularly on ESXi systems, have seen a surge in recent years, CPR delves into the intricacies of these incidents, drawing comparisons to their Windows counterparts.

Historically, ransomware threats have predominantly targeted Windows environments. However, the landscape is evolving, with Linux-focused ransomware gaining momentum. CPR’s study analyses 12 prominent ransomware families that either directly target Linux systems or possess cross-platform capabilities, allowing them to infect both Windows and Linux indiscriminately.

The release of the Babuk source code in 2021 has played a pivotal role in the proliferation of various ransomware families. What sets Linux-targeting ransomware apart is its relative simplicity compared to its Windows counterparts. Many of these Linux-focused threats heavily rely on the OpenSSL library, with ChaCha20/RSA and AES/RSA emerging as the most common encryption algorithms across analysed samples.

Examining the historical evolution of ransomware, the first identifiable sample dates back to 1989, affecting Windows systems. It wasn’t until 2015, with Linux.Encoder.1, that Linux-specific ransomware gained traction. Despite the maturity of ransomware in Windows systems, the capabilities did not directly transfer to Linux until recent years, marked by a significant increase in attacks since 2020.

CPR’s study uncovers a trend of simplification among Linux-targeting ransomware families. Core functionalities often reduce to basic encryption processes, relying heavily on external configurations and scripts, rendering them elusive and challenging to detect. The research also highlights distinctive strategies, particularly focusing on ESXi systems, and identifies vulnerabilities in exposed services as primary entry vectors.

Linux ransomware is strategically tailored for medium and large organisations
Linux ransomware diverges significantly from its Windows counterparts in terms of target and victim typology. While Windows is prevalent in personal computers and user workstations, Linux dominates certain server deployments. Linux ransomware primarily focuses on exposed servers or those within the internal network accessed by pivoting from Windows infections. This orientation indicates a clear trend—Linux ransomware is strategically tailored for medium and large organisations, unlike the more generalised threats posed by Windows ransomware. The distinctive internal structures of both systems also influence attackers’ approaches to folder and file selection for encryption, with Linux-oriented samples often avoiding critical directories to prevent system corruption. This underscores the targeted and sophisticated nature of Linux ransomware compared to its Windows counterparts.

Comparing encryption techniques between Windows and Linux systems, CPR reveals a preference for OpenSSL in Linux ransomware, with AES as a common encryption cornerstone and RSA as the primary asymmetric choice. This uniformity among different threat actors underscores the evolving landscape of cyber threats.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads