Cloud computing is making Linux a more tempting target for hackers
Security report highlights why Linux threats are becoming more common.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
Few people would take issue with saying Linux is more secure than Windows. However, Linux is not immune to malware. According to a new security report, hackers are paying more attention to it these days, just as more things shift to cloud computing.
The finding comes by way of Intezer Labs (via ZDNet), which highlighted in a security report an active botnet campaign affecting cloud servers running Linux.
"Linux threats are becoming more common. A contributing factor to this is the increasing shift and reliance on cloud environments, which are mostly based on Linux infrastructure. Hence, attackers have been adapting accordingly with new tools and techniques designed specifically for this infrastructure," Intezer Labs notes.
The interesting observation comes on the heels of a new malware strain dubbed Doki, which derives its name from targeting Docker servers in AWS, Azure, and other cloud platforms. According to the report, none of the 60 malware detection engines in VirusTotal have Doki on their radar since it was first analyzed on January 14, 2020.
That is both surprising and unsettling. VirusTotal is owned by a subsidiary of Google's parent company, Alphabet, and allows anyone to upload a file and have it scrutinized by dozens of virus engines to see if it is potentially malicious. It's a handy tool I have used on many occasions in the past, particularly when I used to conduct annual antivirus roundups for Maximum PC.
There could be other threats like Doki in the wild. And if not, there likely will be in the near future.
"A technique that has become popular is the abuse of misconfigured Docker API ports, where attackers scan for publicly accessible Docker servers and exploit them in order to set up their own containers and execute malware on the victim’s infrastructure," the report states.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
Best wireless gaming mouse: ideal cable-free rodents
Best wireless gaming keyboard: no wires, no worries
Best wireless gaming headset: top untethered audio
Doki is essentially a backdoor trojan that infiltrates Linux servers to steal resources for cryptocurrency mining. However, Intezer Labs says the malware payload is different than a standard cryptocurrency miner deployed in this type of attack.
"Doki uses a previously undocumented method to contact its operator by abusing the Dogecoin cryptocurrency blockchain in a unique way in order to dynamically generate its C2 domain address. The malware has managed to stay under the radar for over six months despite samples being publicly available in VirusTotal," the report adds.
Fortunately, this looks like it will be more of an annoyance for enterprise environments rather than nuisance for home users. Or in other words, if you've been thinking about switching a gaming PC to Linux, don't let this stop you.
Paul has been playing PC games and raking his knuckles on computer hardware since the Commodore 64. He does not have any tattoos, but thinks it would be cool to get one that reads LOAD"*",8,1. In his off time, he rides motorcycles and wrestles alligators (only one of those is true).


