New Linux Malware Targets Cloud-Based Linux Installations
VoidLink, a new Linux malware, should be of real concern because of its stealth and customization.
Linux malware isn't something that's always on the mind of admins. However, a new framework has been discovered, called VoidLink, that is far more advanced than your typical malicious code.
VoidLink is a framework with over 30 modules that can be added or removed to customize its capabilities for specific targets and meet an attacker's goals. There are modules for stealth, reconnaissance, privilege escalation, and even movement within a network. As a malware campaign evolves, so too can the malware, thanks to its modular design.
VoidLink's focus is Linux installations found on cloud hosts, such as AWS and Google Cloud -- a list that continues to grow. VoidLink uses a vendor's API to discern which cloud service is hosting a particular machine.
Check Point Research discovered VoidLink, and they've explained how it works in great detail. According to the report:
"VoidLink’s feature set is unusually broad. It includes rootkit-style capabilities (LD_PRELOAD, LKM, and eBPF), an in-memory plugin system for extending functionality, and adaptive stealth that adjusts runtime evasion based on the security products it detects, favoring operational security over performance in monitored environments."
Check Point Research indicated that VoidLink seems to have been created and maintained by Chinese-affiliated developers.