We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Trojan:Linux/Abuser.A
Aliases: No associated aliases
Summary
Microsoft Defender for Endpoint detects and removes this threat.
This threat arrives on a Linux device through various means, such as, but not limited to:
- Exploitation of Linux or app vulnerabilities
- Being dropped or downloaded as a secondary payload by another malware on your device
- Automatically downloaded and launched when viewing compromised websites
After it successfully installs and launches on the device, this threat has capabilities that might further compromise the device or the network the device is connected to.
Prevent this threat and other threats from further compromising your device by taking advantage of the following Microsoft Defender for Endpoint on Linux settings and features: