5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant levels of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates add an extra layer to keep the system safe, but you should also frequently watch if anyone gets in. This will also help to ensure that your server stays free of any program that aims at disrupting its normal operation.

The tools presented in this article are created for these security scans and they are able to identify Viruses, malware, Rootkits, and Malicious behaviors. You can use these tools to make regular system scans e.g. every night and mail reports to your email address.

1. Lynis – Security Auditing and Rootkit Scanner

Lynis is a free, open-source, powerful, and popular security auditing and scanning tool for Unix/Linux-like operating systems. It is a malware scanning and vulnerability detecting tool that scans systems for security information and issues, file integrity, configuration errors; performs firewall auditing, checks installed software, file/directory permissions and so much more.

Importantly, it doesn’t automatically perform any system hardening, however, it simply offers suggestions that enable you to harden your server.

We will install the latest version of Lynis (i.e. 3.0.9) from the sources, using the following commands.

cd /opt/
sudo wget https://downloads.cisofy.com/lynis/lynis-3.0.9.tar.gz
sudo tar xvzf lynis-3.0.9.tar.gz
sudo mv lynis /usr/local/
sudo ln -s /usr/local/lynis/lynis /usr/local/bin/lynis

Now you can perform your system scanning with the command below.

sudo lynis audit system
Lynis - Security Auditing Tool for Linux
Lynis – Security Auditing Tool for Linux

To make run lynis automatically every night, add the following cron entry, which will run at 3 am night and send reports to your email address.

0 3 * * * /usr/local/bin/lynis --quick 2>&1 | mail -s "Lynis Reports of My Server" [email protected]

2. Chkrootkit – A Linux Rootkit Scanners

Chkrootkit is also another free, open-source rootkit detector that locally checks for signs of a rootkit on Unix-like systems. It helps to detect hidden security holes.

The chkrootkit package consists of a shell script that checks system binaries for rootkit modification and a number of programs that check various security issues.

The chkrootkit tool can be installed using the following command on Debian-based systems.

sudo apt install chkrootkit

On RHEL-based systems, you need to install it from sources using the following commands.

sudo yum update
sudo yum install wget gcc-c++ glibc-static
sudo wget -c ftp://ftp.chkrootkit.org/pub/seg/pac/chkrootkit.tar.gz
sudo tar –xzf chkrootkit.tar.gz
sudo mkdir /usr/local/chkrootkit
sudo mv chkrootkit-0.58b/* /usr/local/chkrootkit
cd /usr/local/chkrootkit
sudo make sense

To check your server with Chkrootkit run the following command.

sudo chkrootkit 
OR
sudo /usr/local/chkrootkit/chkrootkit

Once run, it will start checking your system for known malware and Rootkits and after the process is finished, you can see the summary of the report.

chkrootkit - Scans Rootkits
chkrootkit – Scans Rootkits

To run Chkrootkit automatically every night, add the following cron entry, which will run at 3 am night and send reports to your email address.

0 3 * * * /usr/sbin/chkrootkit 2>&1 | mail -s "chkrootkit Reports of My Server" [email protected]

3. Rkhunter – A Linux Rootkit Scanners

RootKit Hunter is a free, open-source, powerful, simple to use, and well-known tool for scanning backdoors, rootkits, and local exploits on POSIX-compliant systems such as Linux.

As the name implies, it is a rootkit hunter, a security monitoring and analyzing tool that thoroughly inspects a system to detect hidden security holes.

The rkhunter tool can be installed using the following command on Ubuntu and RHEL-based systems.

sudo apt install rkhunter   [On Debian systems]
sudo yum install rkhunter   [On RHEL systems] 

To check your server with rkhunter run the following command.

sudo rkhunter -c
Rkhunter - A Linux Rootkit Scanners
Rkhunter – A Linux Rootkit Scanners

To run rkhunter automatically every night, add the following cron entry, which will run at 3 am night and send reports to your email address.

0 3 * * * /usr/sbin/rkhunter -c 2>&1 | mail -s "rkhunter Reports of My Server" [email protected]

4. ClamAV – Antivirus Software Toolkit

ClamAV is an open-source, versatile, popular, and cross-platform antivirus engine to detect viruses, malware, trojans, and other malicious programs on a computer.

It is one of the best free anti-virus programs for Linux and the open-source standard for mail gateway scanning software that supports almost all mail file formats.

It supports virus database updates on all systems and on-access scanning on Linux only. In addition, it can scan within archives and compressed files and supports formats such as Zip, Tar, 7Zip, and Rar among others and other features.

The ClamAV can be installed using the following command on Debian-based systems.

sudo apt install clamav

The ClamAV can be installed using the following command on RHEL-based systems.

sudo yum -y update
sudo -y install clamav

Once installed, you can update the signatures and scan a directory with the following commands.

# freshclam
sudo clamscan -r -i DIRECTORY

Where DIRECTORY is the location to scan. The options -r, mean recursively scanning and the -i means to only show infected files.

5. LMD – Linux Malware Detect

LMD (Linux Malware Detect) is an open-source, powerful, and fully-featured malware scanner for Linux specifically designed and targeted at shared hosted environments, but can be used to detect threats on any Linux system. It can be integrated with the ClamAV scanner engine for better performance.

It provides a full reporting system to view current and previous scan results, supports e-mail alert reporting after every scan execution, and many other useful features.

For LMD installation and usage, read our article How to Install LMD with ClamAV as an Antivirus Engine in Linux.

That’s all for now! In this article, we shared a list of 5 tools to scan a Linux server for malware and rootkits. Let us know your thoughts in the comments section.

Aaron Kili
Aaron Kili is a Linux and F.O.S.S enthusiast, an upcoming Linux SysAdmin, web developer, and currently a content creator for TecMint who loves working with computers and strongly believes in sharing knowledge.

Each tutorial at TecMint is created by a team of experienced Linux system administrators so that it meets our high-quality standards.

Join the TecMint Weekly Newsletter (More Than 156,129 Linux Enthusiasts Have Subscribed)
Was this article helpful? Please add a comment or buy me a coffee to show your appreciation.

14 thoughts on “5 Tools to Scan a Linux Server for Malware and Rootkits”

  1. Update for those reading this years later.

    The cron job for rkhunter won’t work. It will get stuck waiting for someone to hit enter on the keyboard.

    The correct cronjob would be:

    30 4 * * * /usr/bin/rkhunter --cronjob --propupd
    

    This will make the job run at 4:30 AM and you can view the log at /var/log/rkhunter.log

    If you want emails sent to you edit the following line in /etc/rkhunter.conf:

    MAIL-ON-WARNING="[email protected]"
    

    Out of the box rkhunter usually gives some false positives so you need to take some time to configure it to whitelist certain items on your system or you will get an email every day saying there is a problem.

    Reply
  2. Currently, the best tool out there to check for rootkits: Ddebcheckroot.

    It should work for Debian and Ubuntu. It can detect any previously unknown rootkit not present in any database!

    Reply
  3. After 10 years on Linux with no discernible virus, trojan or malware I thought I’d give the above a trial run. Hoping for another decade of confidence in my Linux systems.

    Reply
    • I will run all of these on a regular basis to ensure no intrusions.

      Cynical note: When windows finally dies, the security industry may turn their attention to Linux and macOS. Infections will follow and the industry will magically have solutions for us to purchase.

      Positive note: Windows won’t die, infecting systems will become a toy of the past.

      Reply
  4. Hello,

    Trying to get my Lexmark 2600 series printer to run. I downloaded lexmark 2600 server software: lexmark-08z-series-driver-1.0-1.i386.deb.sh (not sure about sh). This installation requires root (administration) privileges in order to continue. I am sole user but don’t believe I got root privileges. Hope you can advise, thanks

    Reply

Got something to say? Join the discussion.

Thank you for taking the time to share your thoughts with us. We appreciate your decision to leave a comment and value your contribution to the discussion. It's important to note that we moderate all comments in accordance with our comment policy to ensure a respectful and constructive conversation.

Rest assured that your email address will remain private and will not be published or shared with anyone. We prioritize the privacy and security of our users.