this post was submitted on 17 Oct 2025
51 points (98.1% liked)

Linux

59014 readers
426 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

I know that Linux is more secure than Windows and normally doesn't need an antivirus, but know myself I'm gonna end up downloading something at some point from somewhere on the internet, and it would be good to be prepared. So, which antivirus would you recommend for Linux (Mint specifically) just to double up on security?

you are viewing a single comment's thread
view the rest of the comments
[–] golden_zealot@lemmy.ml 2 points 20 hours ago* (last edited 20 hours ago) (1 children)

They usually embed themselves in within the system files and have some scheduled job that basically checks for the criteria - if you are only backing up and restoring user data then it's a non-issue, but if you do a full recovery including the system files/the system scheduler etc, then it can happen, and it is often necessary to backup executable and system files for production environments (true, not so much for individual users and their systems).

When I was working in an IT shop, one of our clients was ransomwared with this method. The saving grace for us in that instance is that our backups were going to a product that allowed you to easily break open and dissect the compressed backups pre-recovery, so we were able to determine where the malicious files were and kill them before pushing the backups. Of course we only noticed that it was in the backups after we had tried to push the backups once already, so it was quite the timely process - I think I worked for something like 18 hours that day.

You can read about such malware if you search for "timebomb malware" or "malware does not execute until date" etc.

The attack is not super common anymore, but still happens.

For example, here is an article discussing time bomb methods on linkedin.

https://www.linkedin.com/pulse/time-bombs-malware-delayed-execution-any-run

Another on the knowbe4 blog:

https://blog.knowbe4.com/ransomware-can-destroy-backups-in-four-ways

[–] utopiah@lemmy.ml 2 points 19 hours ago (1 children)

Thanks, it's quite interesting but again IMHO it relies on bad practices. If you've been compromised and you "restore" (not in an sandboxed environment dedicated to study the threat) then you are asking for trouble. I'll read a bit more in depth but the timeline I see 1987, 1998, 2017 show me this is a very very niche strategy, to the point that it's basically irrelevant. Again it's good to know of it, conceptually, but in practice proper backups (namely of data) remains in my eyes the best way to mitigate most problems, attacks and just back luck (failing hardware, fire, etc) alike.

[–] golden_zealot@lemmy.ml 2 points 18 hours ago* (last edited 18 hours ago)

Oh for sure - I think that this method has more efficacy in production environments ran by small businesses anyway, since best practices are rarely followed in many of them (until something happens that changes their mind on what they budget for haha), and even at that it is still a rare attack to see.

I am unaware of this type of attack ever occurring on a persons personal network, most likely because so few end users make backups, there is no need to go through the trouble of doing this, making this method useful only in highly targeted attacks.

We are definitely in agreement on proper backups still being the best method to recover from the vast majority of problems - even this one, depending on the backup solution.