Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

VoidLink: Advanced Linux malware targets cloud

Image © Arstechnica
Researchers uncover VoidLink, a modular Linux malware framework with 30+ components designed for stealth, reconnaissance, privilege escalation, and lateral movement.

Security researchers have uncovered VoidLink, a never-before-seen Linux malware framework that ships with more than 30 modular components designed to be tailored for each infected host. The modules can extend stealth, reconnaissance, privilege escalation, and lateral movement, and can be added or removed as the campaign evolves.

The architecture of VoidLink is plugin-based, turning the framework into a broader ecosystem that can be augmented with plugins to broaden or refine its capabilities. This design enables attackers to adapt the toolkit to different targets and objectives over time, without redeploying a new implant.

VoidLink also targets cloud environments. It can detect whether a compromised machine is hosted on AWS, Google Cloud, Azure, Alibaba, or Tencent by querying cloud metadata via the vendor APIs. The developers have signaled plans to extend this cloud-detection capability to Huawei Cloud, DigitalOcean, and Vultr in future releases.

Security researchers at Check Point described VoidLink as ‘far more advanced than typical Linux malware.’ The firm notes that while Windows-based post-exploitation frameworks have proliferated for years, Linux equivalents have been rarer, making VoidLink a notable evolution that could indicate attacker focus shifting toward Linux systems, cloud infrastructures, and containerized deployment environments.

Checkpoint also notes that there are no public signs of live infections yet; the samples surfaced in VirusTotal, and the framework appears to be in development. A two-stage loader and runtime plugin system form part of the initial sample set. Defenders are urged to monitor for indicators of compromise and to harden Linux deployments, particularly in cloud and container environments.

 

Arstechnica

Notícias relacionadas

Nokia avança AI-RAN com operadoras globais
Nokia: 5G AI-native já é realidade
TRF-3 suspende liminar contra regra da Anatel
Amazon investe 50 bilhões na OpenAI em 2026
Agro Digital 2026: IA, Rastreamento e Segurança
Atraso no Senado pode travar data centers

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais