{"id":24588,"date":"2024-05-30T09:30:08","date_gmt":"2024-05-30T17:30:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/05\/30\/news-18318\/"},"modified":"2024-05-30T09:30:08","modified_gmt":"2024-05-30T17:30:08","slug":"news-18318","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/05\/30\/news-18318\/","title":{"rendered":"KVRT for Linux: malware scanner for Linux systems | Kaspersky official blog"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/05\/30131449\/kvrt-for-linux-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kaspersky Team| Date: Thu, 30 May 2024 17:19:10 +0000<\/strong><\/p>\n<p>Modern-day cybercriminals aren&#8217;t ignoring Linux-based operating systems. Recently, we published a <a href=\"https:\/\/www.kaspersky.com\/blog\/cve-2024-3094-vulnerability-backdoor\/50873\/\" target=\"_blank\" rel=\"noopener\">series<\/a> of <a href=\"https:\/\/securelist.com\/xz-backdoor-story-part-1\/112354\/\" target=\"_blank\" rel=\"noopener\">posts<\/a> about <a href=\"https:\/\/securelist.com\/xz-backdoor-story-part-2-social-engineering\/112476\/\" target=\"_blank\" rel=\"noopener\">malicious code<\/a> in the open source set of utilities XZ Utils, which managed to find its way into several popular Linux builds; wrote about a <a href=\"https:\/\/securelist.com\/dinodasrat-linux-implant\/112284\/\" target=\"_blank\" rel=\"noopener\">Linux implant<\/a> for the DinodasRAT malware \u2014 also known as XDealer; and warned about a backdoor in the <a href=\"https:\/\/securelist.com\/backdoored-free-download-manager-linux-malware\/110465\/\" target=\"_blank\" rel=\"noopener\">Trojanized version of Free Download Manager<\/a>. Despite all this, the myth that Linux is mostly immune to cyberthreats persists: companies rarely devote funds to protecting machines running this operating system. Therefore, we&#8217;ve released a dedicated free product that allows you to check Linux computers for modern threats \u2014 Kaspersky Virus Removal Tool (KVRT) for Linux.<\/p>\n<h2>What is Kaspersky Virus Removal Tool for Linux and what does it do?<\/h2>\n<p>KVRT for Linux can&#8217;t monitor attacks on your computer or server in real time \u2014 it&#8217;s a free application for scanning computers running a Linux-based OS and cleaning them of detected threats. It can detect both malware and adware, as well as legitimate programs that can be used for attacks.<\/p>\n<p>Using KVRT for Linux you can scan 64-bit operating systems for x86_64 architecture. The list of distributions on which the application is guaranteed to work is listed <a href=\"https:\/\/support.kaspersky.com\/help\/kvrt\/2024\/en-us\/269440.htm\" target=\"_blank\" rel=\"noopener\">here<\/a>; however, if the system you&#8217;re using isn&#8217;t on the list, it&#8217;s still worth trying \u2014 there&#8217;s still a good chance it will work. Our application can scan system memory, startup objects, boot sectors, and all files in the operating system for known malware. It scans files of all formats \u2014 including archived ones.<\/p>\n<h2>How to use KVRT for Linux<\/h2>\n<p>Let&#8217;s start with the fact that KVRT for Linux doesn&#8217;t have an automated antivirus-database updating mechanism. If you want our product to be able to recognize the latest threats, you&#8217;d need to download the fresh version of the program <a href=\"https:\/\/www.kaspersky.com\/downloads\/free-virus-removal-tool\" target=\"_blank\" rel=\"noopener\">from our website<\/a> each time. The package hosted there is updated several times a day.<\/p>\n<p>The application can be run via graphical interface or via a command line. But you can only run it manually \u2014 it&#8217;s impossible to set up a scheduled scan.<\/p>\n<p>The distribution is provided as a portable application, so it doesn&#8217;t require installation. However, it must be granted execute permission before use. To ensure that the application has access rights to system memory, boot sectors and other important areas, and can also cure or remove detected threats, it&#8217;s recommended to run it under a superuser account (root). However, KVRT for Linux can also work under a regular user account, but in this case its functionality may be limited. You can read more about how to launch the application and give it the necessary rights on our <a href=\"https:\/\/support.kaspersky.com\/help\/kvrt\/2024\/en-us\/269465.htm\" target=\"_blank\" rel=\"noopener\">technical support website<\/a>. In general, there you can find all the information you may need to use KVRT.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/kvrt-for-linux\/51375\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/05\/30131449\/kvrt-for-linux-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kaspersky Team| Date: Thu, 30 May 2024 17:19:10 +0000<\/strong><\/p>\n<p>Kaspersky Virus Removal Tool (KVRT), a free application for scanning Linux systems for known malware.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,12177,10496,12321],"class_list":["post-24588","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-enterprise","tag-linux","tag-smb"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24588"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24588\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}