Kaspersky has just presented a new complementary tool that is specially created to simply scan Linux operating systems for any symptoms of malware and other well-known safety hazards. The Kaspersky Virus Removal Tool (KVRT) for Linux aims to address the growing requirement for protection resolutions on Linux platforms, which are increasingly targeted by cybercriminals.
Despite the ordinary idea that Linux systems are naturally protected, current happenings have indicated otherwise. Kaspersky has emphasized several issues, including malicious code in the open-source XZ Utils, a Linux implant for the DinodasRAT malware (also known as XDealer), and a backdoor in a Trojanized version of Free Download Manager.
These samples highlight the essential for strong protection standards on Linux systems.
KVRT for Linux is a standalone scanner that catches and releases malware, adware, and honest programs repurposed for malicious actions. It helps 64-bit systems with x86_64 architecture and can scan system memory, startup entities, boot sectors, and all files, including archived ones.
The tool is consistent with famous Linux distributions, such as Red Hat Enterprise Linux, CentOS, Linux Mint, Ubuntu, SUSE, openSUSE, and Debian. One of KVRT’s key characteristics is its capacity to keep documents of deleted or disinfected malicious files in a quarantine directory, providing they are held in a non-harmful condition.
However, it must be stated that KVRT does not show real-time hazard safety and must be handled manually. Users are required to download the latest version of the device each time they want to perform a scan, as it does not have an automatic antivirus database updating tool.
Using KVRT on Linux
KVRT can be performed through a graphical user interface (GUI) or the power line, making it adaptable to user choices and system states. For full functionality, operating the device as a source user is recommended, although it can also work under a regular user version with limited abilities. The application is portable and does not need structure, which permits it to be utilized on numerous systems through a USB drive.
To use KVRT, users must download the box from Kaspersky’s website, grant execute consents, and operate the device. Detailed instructions for arranging and operating the application are open on Kaspersky’s technological support website.
The release of KVRT for Linux has flashed mixed responses within the Linux community. While some users appreciate the availability of a reliable malware scanner for Linux, others express worries about employing a closed-source device with source access, particularly one created by a business headquartered in Russia. These situations underscore the continuing discussion about confidence and safety in the cybersecurity enterprise.
Kaspersky desires to disprove the myth of Linux immunity and promote better safety methods among users by delivering a complimentary and useful device for scanning and extracting malware.