ClickCease Linux Malware Reach All-Time High In 2022 - TuxCare

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

Linux Malware Reach All-Time High In 2022

August 31, 2022 - TuxCare PR Team

Although Linux is the most private and secure operating system, according to AtlasVPN, it has seen an increase in malware samples.

The results showed that Linux malware grew exponentially in the first half of 2022, reaching an all-time high after 1.7 million samples were discovered by researchers.

While most malware sampling took place in the first half of 2022, malware samples recorded in the first half of 2022 between January and June 2022 increased by almost 650% from 226,324 to nearly 1.7 million. The trend however continued, albeit at a reduced pace.

The increase in malware samples targeting Linux remains surprising, and it underscores a new trend of attackers focus on Linux. Although a short decline has been recorded, it remains unclear whether more malware samples will target Linux or whether the decline in malware samples will continue.

Researchers found that April had the highest number of malware samples registered, with 400,931. The report found that the huge increase in malware samples follows a massive decline that was already recorded between the fourth quarter of 2021 and the first quarter of 2022.

At one point, a 2% decline was recorded, but the decline did not last long.

According to AtlasVPN, the “cumulative number of new Linux malware samples in H1 2022 was 31% higher than the number of such samples in the whole of 2022.”

However, despite the massive increase in Linux malware samples, Windows takes the lead as the most malware-infected operating system. AtlasVPN acknowledged Windows position stating that “41.4 million newly programmed Windows malware samples were identified in H1 2022.”

Linux remains a secure operating system for developers and other users. The operating systems provide various security features, including an open source framework, user privilege model, and built-in kernel security defenses.

The sources for this piece include an article in MUO.

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Become a TuxCare Guest Writer

Get started

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter