Hidden Linux Binary Threats for Intruders and Malware
Linux attackers and malware often hide their binary payloads. In this video we'll discuss what this threat is, why it is done, and how to find processes running with hidden binaries using command line forensics.
In this video we cover:
Hidden Linux binaries and why they are often malicious.
Investigating hidden binaries.
Locating Linux processes running with a suspicious hidden binary.
Sandfly is able to find this and many other types of Linux attacks without deploying any endpoint agents. Get your free license today or contact us for more information.
Transcript available on the YouTube video above.