The latest Kaspersky Security Network data has revealed an ongoing increase in attacks using exploits against Linux users. Vulnerability exploits grew throughout the year before peaking in Q4 2023, while the overall growth trend is persisting in 2024. In January-March 2024, there has been a nearly 130 percent increase in attacks on Linux users employing various exploits and vulnerabilities compared to the same period last year.
Woburn, MA – May 7, 2024 – The latest Kaspersky Security Network data has revealed an ongoing increase in attacks using exploits against Linux users. Vulnerability exploits grew throughout the year before peaking in Q4 2023, while the overall growth trend is persisting in 2024. In January-March 2024, there has been a nearly 130 percent increase in attacks on Linux users employing various exploits and vulnerabilities compared to the same period last year.
Linux is gaining traction in the desktop operating system market. According to Statcounter, its market share has grown, and the number of users increased.
“This trend quite accurately explains the growing threat landscape we witness for Linux. In the future, the number of exploits and attacks is likely to grow even more, underscoring the vital need for installation of patches and having a reliable security solution,” said Alexander Kolesnikov, security expert at Kaspersky. “The greatest value for exploit developers lies in vulnerabilities within software that grant control over a user’s system.”
Critical vulnerability registrations rise over the last four years
Kaspersky recorded a 65 percent increase in the number of registered CVEs (Common Vulnerabilities and Exposures) over the last four years, from 15,000 in 2019 to 25,000 in 2023. Moreover, during the last year, researchers and companies logged critical vulnerabilities three times more frequently than the research period average. The annual average of critical vulnerabilities registrations from 2019 to 2022 was 413, which spiked to 1,213 in 2023.
To ensure corporate cybersecurity, Kaspersky shared the following recommendations:
- Thoroughly understand your infrastructure and closely monitor its assets, with particular focus on the perimeter.
- Implement a Patch Management process to detect vulnerable software within the infrastructure and promptly install security patches. Solutions like Kaspersky Endpoint Security and Kaspersky Vulnerability Data Feed can assist in this regard.
- Conduct regular security assessments to identify and patch vulnerabilities before they become an entry point for an attacker.
- To protect the company against a wide range of threats, use solutions from Kaspersky Next product line that provide real-time protection, threat visibility, investigation and response capabilities of EDR and XDR for organizations of any size and industry. Depending on your current needs and available resources, you can choose the most relevant product tier and easily migrate to another one if your cybersecurity requirements are changing.