SHARE
Facebook X Pinterest WhatsApp

E-Mail Scam Dupes Linux Users

Red Hat Inc. on Saturday warned users of an e-mail scam designed to plant malicious code on users’ systems. The malicious e-mail poses as a security update from the vendor, a technique that has become familiar to Windows users, but is a novelty in the Linux world. The e-mail, which has been circulating since late […]

Oct 25, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Red Hat Inc. on Saturday warned users of an e-mail scam designed to plant malicious code on users’ systems. The malicious e-mail poses as a security update from the vendor, a technique that has become familiar to Windows users, but is a novelty in the Linux world.

The e-mail, which has been circulating since late last week, says it originates from the “Red Hat Security Team” and urges users to download a patch fixing vulnerabilities in the ls and mkdir file system utilities. To add a veneer of authenticity, the scammers used an authentic-seeming domain name, fedora-redhat.com, to host the malicious download.

Red Hat increases security in its latest update. Read more here.

“The Red Hat Security Team strongly advises you to immediately apply the fileutils-1.0.6 patch. This is a critical-critical update,” the message says. The e-mail message and the site contained instructions for downloading, decompressing and installing the false update.

The fedora-redhat.com domain name was reported to have been displaying the fake security message as late as Sunday, but by Monday morning it was no longer available. Fedora is Red Hat’s Linux distribution for technology enthusiasts and hobbyists; the company maintains an authentic Fedora site at fedora.redhat.com.

Red Hat became aware of the scam on Saturday, and issued an advisory on the front page of its security site. “These trojan updates contain malicious code designed to compromise the systems they are run on,” said Red Hat Security Response Team leader Mark Cox on Monday, in a statement provided to eWEEK.com.

For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Cox said the company never sends unsolicited security messages and noted that all genuine messages and packages are signed with a GPG (Gnu Privacy Guard) digital signature, the details of which are available on Red Hat’s site.

Windows has been hit by several worms that spread via e-mails masquerading as security patches; for example, a version of the Dumaru worm last year spread via fake Microsoft e-mails. A related problem is the proliferation of phishing e-mails, which lure users (on any platform) to a supposedly authentic Web site, where they are induced to enter sensitive information such as bank account details and passwords to e-commerce accounts.

Check out eWEEK.com’s Linux & Open Source Center for the latest open-source news, reviews and analysis.


Be sure to add our eWEEK.com Linux news feed to your RSS newsreader or My Yahoo page

Recommended for you...

Lightbeam Hires Former CrowdStrike Exec as New Channel Leader
XenTegra CTO Sellers on AI, Security & More 2026 Opportunities
November Leadership Recap: ‘Tis the Season for New Appointments
Jordan Smith
Dec 1, 2025
Nerdio Expands Capabilities in AVD & Microsoft Ecosystem
Victoria Durgin
Nov 28, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.