Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
The Evolving Linux Threat Landscape
Published:
March 3, 2026

The Evolving Linux Threat Landscape

By:
Toby Bussa
Chris Ryan
Share icon
Glitch effectGlitch effectGlitch effect

Introduction

Linux is the backbone of the enterprise, supporting critical applications, web servers, cloud infrastructure, hypervisors, containers, CI/CD pipelines, and more. This makes it a high-value target for attackers. However, Linux kind of flies under the radar as an operating system.

The trends in the wild suggest 2026 is going to be an interesting year for Linux security. So, how do we see the Linux threat landscape evolving?


Key takeaways

  • It might not get all the press attention, but threats to Linux endpoints are real, as Linux powers much of the Internet and digital business infrastructure.

  • Threats against Linux are evolving into cross-ecosystem attacks, making it harder for defenders.

  • Linux needs the same level of security as Windows and macOS endpoints to protect them against evolving threats. You can't ignore it. 


The Windows to Linux threat gap narrows 

Windows, being such a widely deployed operating system on endpoints, has been a bellwether of attacks—viruses, worms, backdoors, trojans, infostealers, ransomware, etc. So the threat gap between what we’ve seen happen on Windows happening on other OSs like macOS and Linux is narrowing. Ransomware is one example. It’s rare on Linux endpoints, but as threat actors evolve, we expect Linux ransomware to become more common, closing the gap to Windows.


Attackers are moving faster

The recent React2Shell vulnerability is an example of the speed of attacks against Linux endpoints. It took less than 24 hours from the time of the React2Shell vulnerability disclosure to attacks. And within another 24 hours, there was mass exploitation, as threat actors employed automation to scale attacks. The Huntress SOC saw evidence of this when investigating multiple Windows and Linux hosts targeted by an attacker. 

A Linux endpoint was targeted with a React2Shell exploit, installed the PeerBlight malware, and then attempted to install the XMRig cryptominer, an open-source tool primarily used to mine cryptocurrencies like Monero (XMR). This is a common type of attack, as Linux endpoints are usually running 24/7 on high-performance servers or cloud instances, making them ideal for cryptominer attacks.

Linux endpoint targeted with a React2Shell exploit


Multi-OS and cross-OS attacks

Adversaries are increasingly using multi-operating system attacks. Windows and Linux are prime examples. 

  • Ransomware groups and ransomware-as-a-service (RaaS) providers are already launching multi-OS attacks. To maximize their chances of getting paid, these threat actors simultaneously encrypt various parts of a network. This includes Windows endpoints used by employees, the Windows and Linux servers that run applications and host data, and the hypervisors, like ESXi, that support the entire server fleet.

  • Windows Subsystem for Linux (WSL) is an interesting attack surface that we believe will get a lot more attention in 2026. If you’re not familiar with WSL, it lets you run Linux directly inside your Windows system and allows Linux apps to run alongside Windows programs like Word or Excel (and they can even share the same files). Very cool if you use both OSs, but also kind of scary given how integrated WSL is into the core Windows OS. And this is what attackers like about WSL. While attacks on WSL aren’t new, we expect to see WSL targeted more frequently. Here are some of the attack vectors used against WSL.

  • Installing WSL - Once privs are elevated, WSL can be installed on an endpoint as part of an attack. Attackers may also download and install their own custom Linux image.
  • Credential theft - The cross-environment capabilities in WSL can make it easier for attackers to find and steal credentials where developers are using WSL, for example for AWS, RSA private keys, and shared environment variables (i.e., WSLENV).
  • Bypassing Windows Defender Application Control - WDAC is designed to validate Windows binaries (.exe, .dll, .sys), but since WSL runs a separate Linux environment, it can execute Linux ELF binaries that do not follow the same rules, effectively creating a "tunnel" through which unapproved code can run on a Windows host.


Targeting endpoints in the software supply chain

Adversaries are increasingly targeting developer systems, which have become high-value endpoints for several reasons. Many developers use Linux, and their systems often contain the proverbial "keys to the kingdom"—passwords, API keys, and tokens. Gaining access to these credentials enables attackers to achieve various goals, such as moving laterally into cloud environments or compromising an organization's software at the source code level. 

One of the recent attack vectors was the Shai Halud worms, in which NPM open-source packages were compromised. When a compromised package was installed, it discovered tokens and API keys and uploaded them to a GitHub repository. This attack specifically targets Linux and macOS endpoints.


Vulnerability research with LLMs

The use of LLMs in threat research to hunt for vulnerabilities in open-source packages, the Linux kernel, and SaaS apps took off in 2025 and is expected to be used even more this year, which may open the floodgates to more zero-day vulnerabilities and, more importantly, faster weaponization. An example in 2025 was CVE-2025-37899 in the Linux kernel, discovered by a researcher using OpenAI’s o3 model. If the good guys are doing this, you know threat actors are doing it too.


So, which adversaries are targeting Linux?

It’s the usual suspects: initial access brokers, ransomware groups, nation-state actors, etc. Here's your hidden competition targeting Linux endpoints. It’s a solid bet we’ll continue to see them in 2026 and onwards.

  • Lockbit 5.0: The latest evolution of Lockbit ransomware has some particularly nasty elements specifically targeting Windows, Linux, and VMware ESXi endpoints, in addition to new capabilities to evade EDR tools. While not attributable to Lockbit, the Huntress SOC and threat analysts have seen an increase in ESXi attacks that started in late 2025, highlighting the need to bolster hypervisor protections. 
  • Akira and Qilin: Two types of ransomware Huntress sees pretty often. Both Akira v2  ransomware and Qilin have been designed to abuse VMWare ESXi. There are reports that Qilin has added support for WSL abuse, too.
  • Gunra Ransomware: A new entrant in early 2025 that's targeting both Windows and Linux endpoints. An indication that it’s not just the existing threat actor groups evolving, but the economics of cybercrime are still there for new groups to enter the market.
  • BlackCat (ALPHV): Another popular flavor of ransomware delivered via a RaaS model, BlackCat was built to target both Windows workstations and Linux servers.
  • Volt Typhoon: A Chinese-backed nation-state group targeting critical infrastructure that has targeted network edge devices that run Linux, like home routers, in addition to enterprise-grade network gear (firewalls, VPNs, routers). The KV-botnet is an example of how these Linux-based network devices were compromised in order to obscure malicious activity within the IP space allocated to residential Internet users.  
  • Lazarus Group: A North Korean nation-state threat actor that's been using the compromised package approach to target developers associated with blockchain and cryptocurrency companies, enticing them to interview for a job with a requirement to demonstrate their coding abilities. This involves social engineering to get them to install and run a malicious package. Lazarus Group and Volt Typhoon aren't the only state-sponsored APT groups to have targeted Linux in their campaigns. Malware such as Wolfsbane and Drovorub are indicative of attacks that have spanned over 15 years.


Take the next step

Linux can’t be treated as “secure out of the box.” Linux endpoints must be actively protected, or you’re leaving a large hole in your organization’s attack surface. Huntress Managed EDR for Linux is your unfair advantage against hackers targeting your Linux fleet.

Take Managed EDR for Linux for a test drive and see for yourself, or reach out and schedule a demo today. 






Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Step inside the dark world of cybercrime

Join us on March 18 (12pm EST) for _declassified, a raw intel drop where John Hammond and Jim Browning break down how modern cybercrime runs like a real business.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Pursuing Parity: Attempting to Bring Cross-Platform Unity

    Huntress researchers weigh in on the challenge of getting feature parity across Windows, macOS, and Linux. And learn how unique security models and platform maturity shape the way products are built.
  • macOS Terms and Trends You Should Know About

    A look inside the evolving landscape of macOS malware. Dive into the current state of macOS threats and learn from a glossary of essential macOS terms.
  • Navigating the SMB Threat Landscape: Key Insights from Huntress’ SMB Threat Report

    Navigate the SMB threat landscape with Huntress’ SMB Threat Report. Gain insights into evolving cyber threats targeting SMBs. Read on for key insights.
  • Hardening the Hypervisor: Practical Defenses Against Ransomware Targeting ESXi

    Hypervisors are a major target for ransomware attacks. Get expert guidance from Huntress on how to protect your virtualized infrastructure. Learn how to secure access, put runtime controls in place, simplify patching, and improve your recovery plans.
  • Huntress 2025 Cyber Threat Report: Proliferating RATs, Evolving Ransomware, and Other Findings

    Huntress’ 2025 Cyber Threat Report is here! Explore the year's biggest threats—RATs, phishing, ransomware—and how evolving tactics demand smarter defense.
  • The Threats Security Pros Are Now Explaining at the Holiday Dinner Table

    From "React2Shell" exploitation to sophisticated "Living off Trusted Sites" phishing, Huntress experts break down the threats targeting both enterprises and families today.
  • Sector Spotlight: Threats Plaguing Education

    Threat actors are targeting the education sector with data breaches, phishing emails, ransomware hits, brute force RDP attacks, and more.
  • New Faces and Features to Help You Evolve the Hunt

    Learn about Huntress’ newest platform and service updates, including Managed Antivirus, Host Isolation and 24/7 ThreatOps coverage.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy