3rd party article/software complains about security flaws on Red Hat Enterprise Linux

Solution Verified - Updated -

Environment

  • Red Hat Enterprise Linux 4
  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 7

Issue

  • We found a 3rd party article that explains about Linux trojan, are there any methods to find/identify whether our machines are affected by this vulnerability?
  • Linux rootkit, named for Pokémon's Umbreon, targets Linux
  • Need for the suggestion on linux trojan

Resolution

News articles pick up random rootkits all the time. If your system is up-to-date with the latest security updates and your system configuration is secure, you don't have much to worry about. Each of these rootkits requires an existing flaw on the system. Most of these "trojans" exploit the fact that systems have weak SSH passwords and allow root logins. There is nothing we can do about such a rootkit except recommend good security practices and keep the system up to date.

For further details please review this articles

What to do if a server is hacked? ...

Also as reference below article has some information about virus protection

Is any virus protection software needed for Red Hat Enterprise Linux? ...

This solution is part of Red Hat’s fast-track publication program, providing a huge library of solutions that Red Hat engineers have created while supporting our customers. To give you the knowledge you need the instant it becomes available, these articles may be presented in a raw and unedited form.

Comments