Sophos, a global leader in next-generation cyber security, today unveiled advancements to Sophos Cloud Workload Protection, including new Linux host and container security capabilities. These enhancements accelerate the detection and response of in-progress attacks and security incidents within Linux operating systems, improve security operations and bolster application performance.
According to new SophosLabs research, distributed denial of service (DDOS) tools, crypto-currency miners and various types of backdoors were the top three types Linux threats detected by Sophos in a dataset from January through March 2022. DDOS tools accounted for nearly half of all Linux malware detections during this time, likely due to automated attacks attempting to reinfect updated servers rapidly and repeatedly. SophosLabs has also detected a recent increase in ransomware attackers attempting to use tools targeting virtual machine hypervisors, many of which run on Linux environments, to carry out their attacks.
“Linux environments continue to grow in surface area as organisations around the world increasingly migrate workloads to the cloud. Even though Linux is widely considered to be one of the most secure operating systems, it still harbours inherent and application-based risks and it is not immune to cyber attacks,” said Joe Levy, chief technology and product officer at Sophos. "Attackers target Linux hosts and containers because they are high value, and often under-protected. Sophos Cloud Workload Protection already automates and simplifies the prevention and detection of these attacks on Windows systems, and now Sophos is providing the same observations and capabilities to Linux operating systems.”
Securing Linux infrastructure
Through the integration of Capsule8 technology, which Sophos acquired in July 2021, Sophos Cloud Workload Protection provides powerful and lightweight visibility into on-premises, data centre and cloud-based Linux hosts and containers, securing them from advanced cyber threats. It leverages analytics around attacker tactics, techniques and procedures (TTPs) to provide cloud-native threat detections, including:
- Container escapes: Identifies attackers escalating privileges from container access to hosts.
- Crypto-miners: Detects behaviours commonly associated with crypto-currency miners.
- Data destruction: Alerts that an attacker may be trying to delete indicators of compromise that are part of an ongoing investigation.
- Kernel exploits: Highlights if internal kernel functions are being tampered with on a host.
Once threats are detected, Sophos XDR (extended detection and response) assigns risk scores to incidents and provides contextual data that enable security analysts as well as the Sophos Managed Threat Response team to streamline investigations and focus on the highest priority incidents. Integrated Live Response further establishes a secure command line terminal to hosts for rapid remediation. Sophos Cloud Workload Protection seamlessly integrates with the Sophos Adaptive Cybersecurity Ecosystem, which underpins the entire Sophos portfolio of solutions. The smart ecosystem unifies Sophos’ range of cloud-native security platform capabilities, including Sophos Cloud Workload Protection, Sophos Cloud Security Posture Management, Kubernetes security posture management, container image scanning, infrastructure as code scanning, cloud infrastructure entitlements management and cloud spend monitoring to ensure visibility, security and compliance.
Availability
Sophos Cloud Workload Protection is now available with Sophos Intercept X Advanced for Server with XDR and Sophos Managed Threat Response, and is managed within the cloud-native Sophos Central platform. It can be deployed as a single agent solution that is ideally suited for security operations teams, delivering flexible, lightweight protection with optimised resource limits, without deploying a kernel module. Sophos Cloud Workload Protection will also soon be available as a Linux sensor. Ideally suited for DevSecOps and security operations centre (SOC) teams requiring deep insight into mission-critical workloads with minimal performance impact, the Linux sensor will provide API integration into existing automation, orchestration, log management and incident response solutions.
Additional resources
- Follow the Twitter thread about @SophosLabs Linux threat detections
- Learn more about Sophos Cloud Workload Protection
- Read the Sophos News article, “Accelerate Your Linux and Container Security”
- Learn about the threat landscape and trends likely to impact cybersecurity in the Sophos 2022 Threat Report
- Read the latest security news and views on Sophos‘ award-winning news website Naked Security and on Sophos News
- Connect with Sophos on Twitter, LinkedIn, Facebook, Spiceworks and YouTube
Share
Sophos
Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 500,000 organizations and millions of consumers in more than 150 countries from today’s most advanced cyberthreats. Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central – the centerpiece of an adaptive cybersecurity ecosystem that features a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity vendors. Sophos sells its products and services through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com.