TY - JOUR T1 - Ransomware Target: Linux. Recover Linux Data Arrays after Ransomware Attack. AU - Hrıstev, Rosen AU - Veselınova, Magdalena AU - Kolev, Kristiyan PY - 2022 DA - December DO - 10.55549/epstem.1219172 JF - The Eurasia Proceedings of Science Technology Engineering and Mathematics JO - EPSTEM PB - ISRES Publishing WT - DergiPark SN - 2602-3199 SP - 78 EP - 86 VL - 19 LA - en AB - The events of the previous two years have forced many businesses from many industries to fast transition to remote work mode. Most organizations were unprepared for this new method of working, and many IT professionals first risked the security of the infrastructures they supported. As a result, ransomware developers found a way to resume development of one for the second most popular operating system – Linux, which is dominant in server infrastructures. Attacks up to now have tended to concentrate more on the end user, whereas ransomware developers now target the core of the organization, allowing for greater ransom demands to recover the data. Along with these, there have been increasing reports of new cryptoviruses for Linux in recent months. This concept is not new in 2015, the first ransomware for Linux was disclosed. The paper examines the evolution of cryptoviruses in Linux and demonstrates how to utilize a private cloud to recover data arrays after a ransomware infection in Linux. KW - Ransomeware KW - Cyber security KW - Private cloud KW - Cryptovirus KW - Linux CR - Hristev, R., Veselinova, M. & Kolev, K. (2022). Ransomware target: Linux. Recover Linux data arrays after ransomware attack. The Eurasia Proceedings of Science, Technology, Engineering & Mathematics (EPSTEM), 19, 78-86. UR - https://doi.org/10.55549/epstem.1219172 L1 - https://dergipark.org.tr/en/download/article-file/2832454 ER -