Zum Inhalt der Seite gehen


Malware scanner for Linux systems


We’ve released a free application that allows you to scan Linux systems for known #cyberthreats.

Modern-day cybercriminals aren’t ignoring Linux-based operating systems. Recently, we published a series of posts about malicious code in the open source set of utilities XZ Utils, which managed to find its way into several popular Linux builds; wrote about a Linux implant for the DinodasRAT malware — also known as XDealer; and warned about a #backdoor in the Trojanized version of Free Download Manager. Despite all this, the myth that Linux is mostly immune to cyberthreats persists: companies rarely devote funds to protecting machines running this operating system. Therefore, we’ve released a dedicated free product that allows you to check Linux computers for modern threats — #Kaspersky #Virus #Removal Tool (#KVRT) for #Linux.

https://www.kaspersky.com/blog/kvrt-for-linux/51375/

Als Antwort auf tom s

I just checked the licence, it is proprietary, not free software.
Als Antwort auf tom s

No, but it is proprietary software, which means it is closed-source code. That means you can't tell what it is doing or how it works.

As described at:

https://en.wikipedia.org/wiki/Kaspersky_Lab#Bans_and_allegations_of_Russian_government_ties

Since 2015, Kaspersky was alleged to have close ties to the Russian government by various Western media outlets and the U.S. government. In 2017, President Trump signed legislation to ban software of Kaspersky on government computers. U.S. government institutions were prohibited from buying and installing Kaspersky software on their computers and other devices.

[144]In 2022, after the Russian invasion of Ukraine, the U.S. government warned American businesses that the risk of using Kaspersky software had increased and the FCC added Kaspersky to its list of threats to U.S. national security.[145] Kaspersky responded to the FCC's move in a press release on its website, saying that the agency's decision was "made on political grounds" in light of Russia's invasion of Ukraine, and that the company "remains ready to cooperate with US government agencies to address the FCC's and any other regulatory agency's concerns".[146] In 2024 hacked email accounts showed that Kaspersky Lab has allegedly helped the Russian government develop software for its spy drones. [147]


Plus there is this whole thing in much more detail:

https://en.wikipedia.org/wiki/Kaspersky_bans_and_allegations_of_Russian_government_ties

Personally I don't use non-free software on Linux and certainly not Russian proprietary software of dubious safety.

Als Antwort auf Adam Hunt

@Adam Hunt Understand your concern. You dont have to trust russian software anymore.
so, if it would be open-source, then you will read the source?

All i can say for now, there are three outgoing connection attemps to two different hosts, if using it as a user, non root. Works like expected, found 14 different malware/trojan/adware in a given directory. no changes for the filesystem, instead one more directory in /tmp (aide).
But this was only a quick, small test in a sandbox (Devuan GNU/Linux ceres).

Als Antwort auf tom s

I would rather use ClamAV, it is free software for Linux and quite effective.
Unbekannter Ursprungsbeitrag

tom s

@Adam Hunt I don't know how to compare the effectiveity if you don't want to use the Kaspersky software?
Maybe clamav is not quite so great in the detection of malware? I got your point.

There is another one, working together with clamav, if installed: Linux Malware Detect (LMD)
https://www.rfxn.com/projects/linux-malware-detect/