Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

VoidLink: Advanced Linux malware targets cloud

Image © Arstechnica
Researchers uncover VoidLink, a modular Linux malware framework with 30+ components designed for stealth, reconnaissance, privilege escalation, and lateral movement.

Security researchers have uncovered VoidLink, a never-before-seen Linux malware framework that ships with more than 30 modular components designed to be tailored for each infected host. The modules can extend stealth, reconnaissance, privilege escalation, and lateral movement, and can be added or removed as the campaign evolves.

The architecture of VoidLink is plugin-based, turning the framework into a broader ecosystem that can be augmented with plugins to broaden or refine its capabilities. This design enables attackers to adapt the toolkit to different targets and objectives over time, without redeploying a new implant.

VoidLink also targets cloud environments. It can detect whether a compromised machine is hosted on AWS, Google Cloud, Azure, Alibaba, or Tencent by querying cloud metadata via the vendor APIs. The developers have signaled plans to extend this cloud-detection capability to Huawei Cloud, DigitalOcean, and Vultr in future releases.

Security researchers at Check Point described VoidLink as ‘far more advanced than typical Linux malware.’ The firm notes that while Windows-based post-exploitation frameworks have proliferated for years, Linux equivalents have been rarer, making VoidLink a notable evolution that could indicate attacker focus shifting toward Linux systems, cloud infrastructures, and containerized deployment environments.

Checkpoint also notes that there are no public signs of live infections yet; the samples surfaced in VirusTotal, and the framework appears to be in development. A two-stage loader and runtime plugin system form part of the initial sample set. Defenders are urged to monitor for indicators of compromise and to harden Linux deployments, particularly in cloud and container environments.

 

Arstechnica

Related News

RAM Shortage Shifts Focus from AI PCs
VETRO appoints Brett Lindsey as president
Hegseth Pushes Grok into Pentagon Networks
Microsoft Pledges Full Power Costs for AI Data Centers
FCC Clears 7,500 Gen2 Starlink Satellites
Phison’s Flash-Backed AI Cuts Hardware Costs

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more