Get a grip people. A recent story about the so-called Chuck Norris botnet implies that it breaks Linux’s security. Wrong.
Windows malware, whether it comes in the form of a Trojan, virus, or worm, works by exploiting security holes in either the operating system itself or an application like Adobe Reader or Internet Explorer. Whatever the bug or the method it uses to arrive on a Windows PC, the fundamental way it uses to exploit the system is that Windows itself is inherently insecure.
While Chuck Norris runs on Linux-based DSL modems and routers, it doesn’t actually attack Linux at all. Instead, it runs as a normal Linux application. So how does it get there if it doesn’t try to crack Linux? It infects routers by trying common and default passwords. That’s it. That’s all there is to it.