A new and advanced Linux malware called VoidLink has been discovered, which can secretly enter and stay inside systems without getting noticed. This rootkit mainly targets Linux distributions like CentOS 7 and Ubuntu 22.04. It combines two powerful techniques — traditional kernel modules and modern eBPF technology — to hide its presence deeply inside the system. Researchers from Elastic Security Labs analysed this threat and found that it is part of a larger malware framework designed for cloud environments. Interestingly, reports from Check Point suggest that this malware was mostly created using AI tools, making it easier for attackers to develop and improve it quickly. VoidLink works in a very smart and silent way. It installs itself as a kernel module with fake names like system drivers, so it looks normal to the system. At the same time, it uses eBPF programs to hide network activity, making it difficult for security tools to detect open ports or running processes. It can hide files, processes, and even prevent itself from being removed. The malware communicates with attackers using specially crafted ping (ICMP) packets instead of normal network connections, which makes detection even harder. It also includes anti-detection features that monitor tools like debuggers and scanners, and can stop its activity or delete itself if it senses investigation. This rootkit is very dangerous because it gives attackers full control over the infected system while staying invisible. It can be used to steal data, monitor activity, or maintain long-term access in cloud servers. However, some signs like mismatched system outputs can help detect it. To stay safe, organisations should enable Secure Boot, allow only signed kernel modules, and limit unnecessary eBPF usage. Regular system monitoring, log analysis, and integrity checks are very important. This case clearly shows how advanced malware is evolving, and why strong security practices are essential in modern Linux environments.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...