The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National… The post Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns appeared on BitcoinEthereumNews.com. CISA issues Linux ransomware attack warning. Getty Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know. ForbesLinkedIn DM Attack Warning — What Users Need To KnowBy Davey Winder Linux Kernel Vulnerability Exploited By Ransomware Attackers The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.” But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National…

Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns

2025/11/02 20:23

CISA issues Linux ransomware attack warning.

Getty

Admit it: the first thing you think of when ransomware is mentioned is likely Microsoft Windows as an attack surface. The second might be that ransomware is in decline and no longer a significant threat. The thought that Linux could be caught somewhere in all this probably doesn’t enter your head, but it should. The Cybersecurity and Infrastructure Security Agency has issued a timely reminder that Linux can be exploited, as it warns federal agencies to update within days, following confirmation of a Linux vulnerability being used in active ransomware attacks. Here’s what you need to know.

ForbesLinkedIn DM Attack Warning — What Users Need To Know

Linux Kernel Vulnerability Exploited By Ransomware Attackers

The CVE-2024-1086 Linux Kernel use-after-free vulnerability “allows a normal user to become an administrator (root), allowing them to change files, disable security, or install malware,” Immersive Security said, adding that “the flaw occurs when the system mishandles memory, allowing attackers to gain complete system control. But that was, checks date, almost two years ago. Indeed, the thing was fixed in January 2024. So, what’s the fuss all of a sudden? Self-described America’s Security Agency, CISA, has issued a binding directive and warning that ransomware threat actors are actively exploiting CVE-2024-1086, giving federal agencies until November 20 to apply the necessary fix or “discontinue use of the product.”

But this isn’t a warning just for those federal agencies, it’s one that all businesses need to take note of. The cost of not doing so could be high as ransomware groups look to exploit this old vulnerability in “certain older versions of the Linux operating system,” as Immersive put it. You can see a complete list of impacted versions here, as published by the US Department of Commerce National Institute of Standards and Technology.

ForbesNew Proton Research Exposes 300 Million Stolen Credentials

This isn’t theoretical; this is real life. If you are using any of these Linux platform versions, then you need to update as soon as possible. Ransomware actors can use CVE-2024-1086, alongside standard phishing techniques, to cause significant harm to businesses if not. Proof-of-concept code is not difficult to find on the dark web and assorted criminal marketplaces. So, what are you waiting for?

Source: https://www.forbes.com/sites/daveywinder/2025/11/02/ongoing-ransomware-attacks-exploit-linux-vulnerability-cisa-warns/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Satoshi-Era Mt. Gox’s 1,000 Bitcoin Wallet Suddenly Reactivated

Satoshi-Era Mt. Gox’s 1,000 Bitcoin Wallet Suddenly Reactivated

The post Satoshi-Era Mt. Gox’s 1,000 Bitcoin Wallet Suddenly Reactivated appeared on BitcoinEthereumNews.com. X account @SaniExp, which belongs to the founder of the Timechain Index explorer, has published data showing that a dormant BTC wallet was activated after hibernating for six years. However, it was set up 13 years ago, according to the tweet — the time when Satoshi Nakamoto’s shadow was still casting itself around, so to speak. The X post states that the tweet belongs to infamous early Bitcoin exchange Mt. Gox, which suffered from a major hack in the early 2010s, and last year it began paying out compensation to clients who lost their crypto in that hack. The deadline was eventually extended to October 2025. Mt. Gox’s wallet with 1,000 BTC reactivated The above-mentioned data source shared a screenshot from the Timechain Index explorer, showing multiple transactions marked as confirmed and moving a total of 1,000 Bitcoins. This amount of crypto is valued at $116,195,100 at the time of the initiated transaction. Last year, Mt. Gox began to move the remains of its gargantuan funds to pay out compensations to its creditors. Earlier this year, it also made several massive transactions to partner exchanges to distribute funds to Mt. Gox investors. All of the compensations were promised to be paid out by Oct. 31, 2025. The aforementioned transaction is likely preparation for another payout. The exchange was hacked for several years due to multiple unnoticed security breaches, and in 2014, when the site went offline, 744,408 Bitcoins were reported stolen. Source: https://u.today/satoshi-era-mtgoxs-1000-bitcoin-wallet-suddenly-reactivated
Share
BitcoinEthereumNews2025/09/18 10:18