North Korea Hackers Target Linux
This is a Linux news story, published by Ars Technica, that relates primarily to The US Cybersecurity and Infrastructure Security Agency news.
Linux news
For more Linux news, you can click here:
more Linux newssoftware applications news
For more software applications news, you can click here:
more software applications newsArs Technica news
For more news from Ars Technica, you can click here:
more news from Ars TechnicaAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like software applications news, you might also like this article about
FASTCash. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest malware news, North Korean hackers news, software applications news, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
name FASTCashArs Technica
•North Korean hackers use newly discovered Linux malware to raid ATMs
75% Informative
North Korean state-backed bank robbers have expanded their repertoire to include Linux .
The malware, FASTCash, is a remote access tool that gets installed on payment switches inside compromised networks that handle payment card transactions.
The US Cybersecurity and Infrastructure Security Agency first warned of the malware in 2018 .
VR Score
71
Informative language
69
Neutral language
18
Article tone
semi-formal
Language
English
Language complexity
60
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
short-lived
External references
5
Source diversity
3
Affiliate links
no affiliate links