Sunday, October 12, 2025

New Gunra Ransomware Variant Attacks Linux Servers at High Speed

A new ransomware group called Gunra has launched a powerful Linux variant of its malware, signaling a major expansion of its cybercrime operations. The new version is alarmingly fast and efficient, capable of running up to 100 parallel encryption threads to lock up files on enterprise servers. This move from Windows to Linux shows the group is aggressively targeting a wider range of business environments and is innovating quickly to cause maximum damage.

From Windows to Linux in Record Time

The Gunra group only appeared on the cybersecurity scene in April, initially focusing its attacks on Windows systems. The group quickly made a name for itself by leaking a massive 40 terabytes of data allegedly stolen from a hospital in May. This high-profile attack demonstrated their capability and ambition.

Now, with the development of a Linux variant, Gunra is proving it is not a temporary threat. Security researchers at Trend Micro, who analyzed the malware, report that this new version is not just a simple port from Windows. It has been specifically optimized for Linux environments, where many businesses run their core servers and databases. This strategic shift indicates a clear plan to build a cross-platform criminal enterprise.

What Makes the Gunra Linux Variant so Dangerous?

The primary advantage of Gunra’s new malware is its raw speed and the fine-tuned control it gives attackers. While most ransomware tools set their encryption speed based on the system’s CPU cores, Gunra breaks the mold.

The Linux variant allows attackers to manually set up to 100 simultaneous encryption threads. This is double the capacity of many competing ransomware strains, like BERT, which caps out at 50 threads. This hyper-threading capability means Gunra can encrypt huge volumes of data much faster than typical ransomware.

Other standout features include:

  • Customizable Targeting: Attackers must specify which file paths and extensions to encrypt, allowing for surgical strikes on critical data like databases (.sql, .db) or documents (.docx).
  • Partial Encryption: The malware can be configured to encrypt only a portion of a file, which can still render it useless while speeding up the overall attack.
  • Stealthy Operation: Unlike its Windows counterpart, the Linux version does not drop a ransom note. Its sole focus is to encrypt files as quickly as possible and then terminate itself, leaving fewer traces behind.

This combination of speed, precision, and stealth makes the Gunra Linux variant a formidable tool for cybercriminals.

A Clear Upgrade over Typical Ransomware

Gunra’s design reflects a significant evolution in ransomware technology. It gives attackers a level of control that is uncommon, even among established groups. The differences are stark when compared to more conventional ransomware tools targeting Linux.

FeatureGunra Linux VariantTypical Ransomware
Max Encryption Threads100CPU-dependent / ~50
Ransom Note on LinuxNoYes
File Extension TargetingCustomizable (CSV-based)Often Hardcoded
Partial Encryption OptionYesSometimes

Global Attacks and How to Defend Your Systems

The Gunra group has already demonstrated its global reach, hitting organizations in at least seven countries, including the United States, Canada, Japan, and Brazil. Their victims come from a diverse range of industries, such as healthcare, manufacturing, IT services, and agriculture. The group actively posts stolen data on its leak site to pressure victims into paying ransoms.

In response to this growing threat, security experts from Trend Micro have issued recommendations for businesses to bolster their defenses. They emphasize that Gunra’s rapid innovation requires a layered security approach.

Organizations are advised to:

  • Conduct regular vulnerability scans to identify and patch weaknesses.
  • Audit all system assets and ensure configurations are secure.
  • Monitor network traffic and harden routers and firewalls.
  • Implement AI-driven threat detection systems to spot unusual activity.
  • Train employees on cybersecurity best practices and conduct security drills.

No single solution can guarantee protection, but taking these steps can significantly reduce the risk of a successful attack from an aggressive group like Gunra.

Santosh Smith
Santosh Smith
Santosh is a skilled sports content writer and journalist with a passion for athletics. With expertise in various sports such as football, basketball, and soccer, he provides his readers with accurate, compelling, and tailored content. His knowledge and research skills make him an expert in providing in-depth analysis and valuable insights on the latest sports news and events.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

How to Get the Senior Discount for Amazon Prime Membership

Amazon Prime offers incredible convenience with its free shipping,...

How to Become an Amazon Delivery Driver: a Complete Guide

You can become an Amazon delivery driver by meeting...

China’s Underground Raves: a Secret Space for Youth Freedom

In the city of Changchun, China, a different kind...

How to Complain About an Amazon Driver for a Quick Resolution

When your Amazon package arrives late, damaged, or is...