{"id":22829,"date":"2024-05-30T21:19:48","date_gmt":"2024-05-30T17:19:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/kvrt-for-linux\/22829\/"},"modified":"2024-05-30T21:19:48","modified_gmt":"2024-05-30T17:19:48","slug":"kvrt-for-linux","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/kvrt-for-linux\/22829\/","title":{"rendered":"Malware scanner for Linux systems"},"content":{"rendered":"<p>Modern-day cybercriminals aren\u2019t ignoring Linux-based operating systems. Recently, we published a <a href=\"https:\/\/www.kaspersky.com\/blog\/cve-2024-3094-vulnerability-backdoor\/50873\/\" target=\"_blank\" rel=\"noopener nofollow\">series<\/a> of <a href=\"https:\/\/securelist.com\/xz-backdoor-story-part-1\/112354\/\" target=\"_blank\" rel=\"noopener\">posts<\/a> about <a href=\"https:\/\/securelist.com\/xz-backdoor-story-part-2-social-engineering\/112476\/\" target=\"_blank\" rel=\"noopener\">malicious code<\/a> in the open source set of utilities XZ Utils, which managed to find its way into several popular Linux builds; wrote about a <a href=\"https:\/\/securelist.com\/dinodasrat-linux-implant\/112284\/\" target=\"_blank\" rel=\"noopener\">Linux implant<\/a> for the DinodasRAT malware \u2014 also known as XDealer; and warned about a backdoor in the <a href=\"https:\/\/securelist.com\/backdoored-free-download-manager-linux-malware\/110465\/\" target=\"_blank\" rel=\"noopener\">Trojanized version of Free Download Manager<\/a>. Despite all this, the myth that Linux is mostly immune to cyberthreats persists: companies rarely devote funds to protecting machines running this operating system. Therefore, we\u2019ve released a dedicated free product that allows you to check Linux computers for modern threats \u2014 Kaspersky Virus Removal Tool (KVRT) for Linux.<\/p>\n<h2>What is Kaspersky Virus Removal Tool for Linux and what does it do?<\/h2>\n<p>KVRT for Linux can\u2019t monitor attacks on your computer or server in real time \u2014 it\u2019s a free application for scanning computers running a Linux-based OS and cleaning them of detected threats. It can detect both malware and adware, as well as legitimate programs that can be used for attacks.<\/p>\n<p>Using KVRT for Linux you can scan 64-bit operating systems for x86_64 architecture. The list of distributions on which the application is guaranteed to work is listed <a href=\"https:\/\/support.kaspersky.com\/help\/kvrt\/2024\/en-us\/269440.htm\" target=\"_blank\" rel=\"noopener\">here<\/a>; however, if the system you\u2019re using isn\u2019t on the list, it\u2019s still worth trying \u2014 there\u2019s still a good chance it will work. Our application can scan system memory, startup objects, boot sectors, and all files in the operating system for known malware. It scans files of all formats \u2014 including archived ones.<\/p>\n<h2>How to use KVRT for Linux<\/h2>\n<p>Let\u2019s start with the fact that KVRT for Linux doesn\u2019t have an automated antivirus-database updating mechanism. If you want our product to be able to recognize the latest threats, you\u2019d need to download the fresh version of the program <a href=\"https:\/\/www.kaspersky.com\/downloads\/free-virus-removal-tool\" target=\"_blank\" rel=\"noopener nofollow\">from our website<\/a> each time. The package hosted there is updated several times a day.<\/p>\n<p>The application can be run via graphical interface or via a command line. But you can only run it manually \u2014 it\u2019s impossible to set up a scheduled scan.<\/p>\n<p>The distribution is provided as a portable application, so it doesn\u2019t require installation. However, it must be granted execute permission before use. To ensure that the application has access rights to system memory, boot sectors and other important areas, and can also cure or remove detected threats, it\u2019s recommended to run it under a superuser account (root). However, KVRT for Linux can also work under a regular user account, but in this case its functionality may be limited. You can read more about how to launch the application and give it the necessary rights on our <a href=\"https:\/\/support.kaspersky.com\/help\/kvrt\/2024\/en-us\/269465.htm\" target=\"_blank\" rel=\"noopener\">technical support website<\/a>. In general, there you can find all the information you may need to use KVRT.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve released a free application that allows you to scan Linux systems for known cyberthreats.<\/p>\n","protected":false},"author":2706,"featured_media":22830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[533],"class_list":{"0":"post-22829","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-linux"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/kvrt-for-linux\/22829\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/kvrt-for-linux\/27510\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kvrt-for-linux\/30182\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kvrt-for-linux\/27662\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kvrt-for-linux\/37571\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kvrt-for-linux\/51375\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kvrt-for-linux\/36511\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/kvrt-for-linux\/27827\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kvrt-for-linux\/33655\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kvrt-for-linux\/33320\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/linux\/","name":"Linux"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22829"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22829\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22830"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}