New Linux Malware Targets Cloud-Based Linux Installations

Jan 16, 2026

VoidLink, a new Linux malware, should be of real concern because of its stealth and customization.

Linux malware isn't something that's always on the mind of admins. However, a new framework has been discovered, called VoidLink, that is far more advanced than your typical malicious code.

VoidLink is a framework with over 30 modules that can be added or removed to customize its capabilities for specific targets and meet an attacker's goals. There are modules for stealth, reconnaissance, privilege escalation, and even movement within a network. As a malware campaign evolves, so too can the malware, thanks to its modular design.

VoidLink's focus is Linux installations found on cloud hosts, such as AWS and Google Cloud -- a list that continues to grow. VoidLink uses a vendor's API to discern which cloud service is hosting a particular machine.

Check Point Research discovered VoidLink, and they've explained how it works in great detail. According to the report:

"VoidLink’s feature set is unusually broad. It includes rootkit-style capabilities (LD_PRELOAD, LKM, and eBPF), an in-memory plugin system for extending functionality, and adaptive stealth that adjusts runtime evasion based on the security products it detects, favoring operational security over performance in monitored environments."
Check Point Research indicated that VoidLink seems to have been created and maintained by Chinese-affiliated developers.
 
 

 
 
 

Related content

  • Another Linux Malware Discovered

    Russian hackers use Hyper-V to hide malware within Linux virtual machines.

  • Thousands of Linux Servers Infected with Stealth Malware Since 2021

    Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.

  • Create a Linux Virus

    Linux might be safer than Windows, but it is not as safe as you think. We'll show you how a virus can navigate through the formidable Linux security system to deliver a payload.

  • The Mask: Scary New Face of Internet Intrusion

    Ultra-sophisticated attack tool might have originated from a state-sponsored intelligence service.

  • News

    In the news: The Gnome Foundation Struggling to Stay Afloat; Thousands of Linux Servers Infected with Stealth Malware Since 2021; Halcyon Creates Anti-Ransomware Protection for Linux; Valve and Arch Linux Announce Collaboration; OSI and LPI Form Strategic Alliance; AlmaLinux Unveils New Hardware Certification Process; Wind River Introduces eLxr Pro Linux Solution; and Juno Tab 3 Launches with Ubuntu 24.04.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News