Linux Process Running with Hidden Binary Name Attack

Videos Education Linux Forensics

Date
December 29, 2024
Author
The Sandfly Security Team

Hidden process binaries on Linux are often malicious. In this video we describe what this attack is, why processes with hidden binaries are usually up to no good, and command line forensics you can use to investigate the activity. We also show you how to quickly find this attack with Sandfly's agentless Linux EDR and security platform.

Sandfly is able to find this and many other types of Linux attacks without deploying any endpoint agents. Get your free license today or contact us for more information.

Let Sandfly keep your Linux systems secure.

Learn More