Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • This startup’s new mechanistic interpretability tool lets you debug LLMs
    • DJI Lito Series drones: affordable, capable options
    • AI governance startup pockets $4 million Seed round
    • OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts
    • when asked whether xAI has ever distilled tech from OpenAI, Elon Musk says the claim is “partly” true (New York Times)
    • What’s New on HBO Max in May 2026: ‘Wuthering Heights,’ ‘On the Roam’ and More
    • AI Cyberattacks Meet Memory-Safe Code Defenses
    • Proxy-Pointer RAG: Multimodal Answers Without Multimodal Embeddings
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, April 30
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Never-before-seen Linux malware is “far more advanced than typical”
    News

    Never-before-seen Linux malware is “far more advanced than typical”

    Editor Times FeaturedBy Editor Times FeaturedJanuary 18, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Researchers have found a never-before-seen framework that infects Linux machines with a large assortment of modules which might be notable for the vary of superior capabilities they supply to attackers.

    The framework, known as VoidLink by its supply code, options greater than 30 modules that can be utilized to customise capabilities to satisfy attackers’ wants for every contaminated machine. These modules can present further stealth and particular instruments for reconnaissance, privilege escalation, and lateral motion inside a compromised community. The elements could be simply added or eliminated as aims change over the course of a marketing campaign.

    A deal with Linux contained in the cloud

    VoidLink can goal machines inside well-liked cloud providers by detecting if an contaminated machine is hosted inside AWS, GCP, Azure, Alibaba, and Tencent, and there are indications that builders plan so as to add detections for Huawei, DigitalOcean, and Vultr in future releases. To detect which cloud service hosts the machine, VoidLink examines metadata utilizing the respective vendor’s API.

    Related frameworks focusing on Home windows servers have flourished for years. They’re much less widespread on Linux machines. The function set is unusually broad and is “way more superior than typical Linux malware,” said researchers from Verify Level, the safety agency that found VoidLink. Its creation could point out that the attacker’s focus is more and more increasing to incorporate Linux techniques, cloud infrastructure, and utility deployment environments, as organizations more and more transfer workloads to those environments.

    “VoidLink is a complete ecosystem designed to take care of long-term, stealthy entry to compromised Linux techniques, notably these operating on public cloud platforms and in containerized environments,” the researchers stated in a separate post. “Its design displays a degree of planning and funding sometimes related to skilled risk actors slightly than opportunistic attackers, elevating the stakes for defenders who could by no means understand their infrastructure has been quietly taken over.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    when asked whether xAI has ever distilled tech from OpenAI, Elon Musk says the claim is “partly” true (New York Times)

    April 30, 2026

    US officials are preparing a wide-ranging AI policy memo that outlines rules for national security agencies’ AI use, including avoiding single vendors (Bloomberg)

    April 30, 2026

    OpenAI says its models, starting with GPT-5.1, “increasingly mentioned goblins, gremlins, and other creatures”, leading to prompt instructions to mitigate it (OpenAI)

    April 30, 2026

    CFTC Sues Wisconsin in Escalating Fight Over Prediction Market Regulation

    April 30, 2026

    US soldier pleads not guilty in first prediction market insider trading case tied to Polymarket bets

    April 30, 2026

    Resorts World NYC opens first full casino in New York City with live table games in Queens

    April 30, 2026

    Comments are closed.

    Editors Picks

    This startup’s new mechanistic interpretability tool lets you debug LLMs

    April 30, 2026

    DJI Lito Series drones: affordable, capable options

    April 30, 2026

    AI governance startup pockets $4 million Seed round

    April 30, 2026

    OpenAI Rolls Out ‘Advanced’ Security Mode for At-Risk Accounts

    April 30, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Paris-based Mistral AI eyes $1 billion raise at $10 billion valuation to lead Europe’s AI independence charge

    August 4, 2025

    The Psychology Behind Why AI Companion Apps Feel Addictive

    October 8, 2025

    New Lomography camera offers natural film look easily

    April 1, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.