SHARE
Facebook X Pinterest WhatsApp

Linux Multi-Cloud Ransomware Attacks Expected to Increase

thumbnail
Linux Multi-Cloud Ransomware Attacks Expected to Increase

Vulnerable computer hardware being hacked and network ransomware digital cybercrime background concept. 3D illustration.

Ransomware attacks on Linux-based multi-cloud environments are increasing in both volume and sophistication.

Written By
thumbnail
David Curry
David Curry
Mar 4, 2022

Ransomware-as-a-service has become one of the largest threats to organizations, with cyber criminals in the past five years improving the sophistication of the ransomware while businesses have also added additional layers of cloud infrastructure that can be easily targeted if not properly configured. 

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics

A new report by cloud computing and virtualization provider VMWare, “Exposing Malware in Linux-Based Multi-Cloud Environments”, details the increasing threat of ransomware to multi-cloud platforms, of which Linux is used almost exclusively. 

SEE ALSO: Ransomware Could Be Headed to the IoT

Weak authentication and misconfigurations in container-based infrastructures, such as Kubernetes, Container Linux and Photon OS, are two of the primary ways attackers are able to infiltrate cloud-based environments. 

Once inside the environment, attackers will often implement a ransomware program that forces the organization to pay for access to their data or control of their platform or the cloud-services are rerouted for crypto mining purposes. 

In the second instance, VMWare Threat Analysis unit found that the Monero cryptocurrency, infamous for its hard-to-track payment system which has made it a favorite of the dark web, was the currency 89 percent of attackers would mine on their stolen CPU cycles. 

Most of the countermeasures to address ransomware in recent years have been targeted at the Windows operating system, however, this focus is misguided, as Linux has become the primary operating system for a lot of ‘behind-the-scenes’ computation, such as cloud computing. 

See Also: Continuous Intelligence Insights

This lack of focus has also come at a time when ransomware on Linux is becoming more sophisticated, but it is still not at the level of Windows-based ransomware sophistication. Attacks have become targeted instead of opportunistic, and new ransomware that targets host images has proved illusive to countermeasures. 

In most cases, attackers are utilizing readily available tools that have been deployed in Windows-based attacks in the past, such as Cobalt Strike, a well-known remote access tool. 

One positive is that Linux has many tools, such as dynamic analysis and continuous host monitoring, which if enabled correctly should prevent ransomware from infecting an organization, or at least warn organizations when they have been compromised. 

Suppliers of cloud-based services should make clients and organizations aware of the enhanced risks and promote smart security and governance features to reduce the risks of ransomware and “crypto jacking”.

“Organizations need to bolster their ability to identify and defend against these types of attacks,” said VMWare Threat Analysis Unit in the report. “Given the distributed, dynamic and heterogeneous nature of today’s enterprise workloads and networks, organizations need to extend telemetry across the entire infrastructure—from endpoints to multi-cloud environments. This will allow organizations to better monitor traffic and identify abnormal behavior to mitigate the impact of attacks on the enterprise, while increasing overall efficiencies and reducing operational costs.”

Download Now: Solving the SOC Bottleneck - Automated Detection and Analytics
thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

2025 Year in Review: Top 5 RTInsights Articles of 2025
Real-time Analytics News for the Week Ending December 6
Real-time Analytics News for the Week Ending November 29

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.