Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/Threats/VoidLink Rootkit Uses Server-Side Kernel Rewrites Playbook
Threats

VoidLink Rootkit Uses Server-Side Kernel Rewrites Playbook

VoidLink poses a significant threat to Linux cloud environments, marking a major shift in how rootkits are designed and deployed. This Chinese-developed malware framework was first discovered by...

David kimber
David kimber
January 20, 2026 2 Min Read
0 0

VoidLink poses a significant threat to Linux cloud environments, marking a major shift in how rootkits are designed and deployed.

This Chinese-developed malware framework was first discovered by Check Point Research on January 13, 2026, marking the beginning of a new era in Linux-targeted attacks.

Unlike traditional rootkits that struggle with portability across different Linux kernel versions, VoidLink introduces an innovative architecture that overcomes these long-standing technical limitations.

The malware spreads through a carefully staged infection process designed to minimize detection.

The attack begins with a small initial dropper written in the Zig programming language, which establishes communication with command and control servers.

Once contact is established, the malware downloads larger components entirely into memory without touching the hard drive, making it harder to discover through traditional file scanning methods.

Sysdig analysts identified the malware’s sophisticated features after examining its binaries in detail.

The research team uncovered that VoidLink incorporates multiple evasion techniques specifically designed to detect and avoid major security products from vendors like CrowdStrike, SentinelOne, and Carbon Black.

When security tools are discovered on a system, VoidLink automatically adjusts its behavior to become less noticeable, fundamentally changing how it operates based on its environment.

The framework demonstrates signs of Chinese technical expertise combined with AI assistance in development.

Technical comments throughout the malware code are written in native Chinese and show genuine kernel development knowledge.

Meanwhile, portions of the code display patterns typical of large language model generation, suggesting human developers used artificial intelligence to accelerate certain development tasks while maintaining control over the architecture and security features.

Adaptive Detection Evasion: A Deeper Look

VoidLink’s most distinctive feature is its ability to recognize and respond to security tools in real time. The malware actively scans running processes and file system paths for signs of endpoint protection software.

When it detects products like CrowdStrike Falcon or SentinelOne, the malware enters “paranoid mode,” drastically changing its communication patterns.

During normal operations, it contacts its command server every 4096 milliseconds, but when security products are present, it extends these intervals to 5000 milliseconds and increases randomization.

This approach significantly reduces the chances of detection by making the malware’s network activity blend more seamlessly with legitimate traffic patterns.

The framework also includes advanced evasion capabilities for dynamic analysis tools.

VoidLink searches for the Frida instrumentation toolkit by looking for specific process names and scanning memory regions for Frida libraries.

It detects debuggers like GDB by checking system status files that reveal if any debugging tool is currently attached to the process.

This multi-layered detection approach demonstrates sophisticated defensive awareness that makes reverse engineering and analysis considerably more challenging for security researchers.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Discord Abuse: Clipboard Hijacker Steals Crypto Wallet

Next Post

TP-Link Flaw: Authentication Bypass Via Password Vulnerability Allows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us