Hidden Linux Binary Threats for Intruders and Malware

Videos Education Linux Forensics

Date
January 15, 2025
Author
The Sandfly Security Team

Linux attackers and malware often hide their binary payloads. In this video we'll discuss what this threat is, why it is done, and how to find processes running with hidden binaries using command line forensics.

In this video we cover:

  • Hidden Linux binaries and why they are often malicious.

  • Investigating hidden binaries.

  • Locating Linux processes running with a suspicious hidden binary.

Sandfly is able to find this and many other types of Linux attacks without deploying any endpoint agents. Get your free license today or contact us for more information.

Transcript available on the YouTube video above.

Let Sandfly keep your Linux systems secure.

Learn More