Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

February 6, 2026

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal
News

VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal

Team-CWDBy Team-CWDJanuary 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


VoidLink, the recently discovered Linux malware which targets Linux-based cloud servers, was likely almost entirely generated by AI, researchers have said.

First detailed by cybersecurity analysts at Check Point last week, the new malware is made up of over 30 modular plugins and is designed to maintain long-term access to Linux systems.

It was initially believed that the sophistication and modular nature of VoidLink and the way it was developed at rapid pace pointed to the malware being the work of a well-resourced, experienced cybercriminal operation.

However, following further analysis, Check Point Research has concluded that VoidLink was largely built by AI, likely under the direction of one person. AI and AI agents were not just used to write code, but to plan, structure and execute the entire project.

“VoidLink demonstrates that the long-awaited era of sophisticated AI-generated malware has likely begun,” said the Check Point blog post.

“In the hands of individual experienced threat actors or malware developers, AI can build sophisticated, stealthy and stable malware frameworks that resemble those created by sophisticated and experienced threat groups.”

What was significant in alerting researchers to AI involvement in building VoidLink was a development plan which accompanied the project – and accidentally left exposed by the developer.

This included planning documents about sprints, design ideas and timelines which represented 30 weeks of development.

However, researchers have noted that observation of the evolution of VoidLink suggests that it was pushed out over a much shorter period, just four weeks, with clear signs that the development plan was generated and orchestrated by an AI model.

“Because AI-produced documentation is typically thorough, many of these artifacts were timestamped and unusually revealing. They show how, in less than a week, a single individual likely drove VoidLink from concept to a working, evolving reality,” Check Point said.

It was also observed that the developer’s initial prompts to the AI agent weren’t based around building VoidLink directly but rather based around producing what would become the malware around an initial skeleton design. The researchers have suggested that this could have been the developer testing the guardrails of the AI tools.

The developer also utilized regular checkpoints to check in on the AI-generated code to ensure that the model was developing it as instructed and that the code worked.

The result was a malware which the researchers who first detailed VoidLink described as “sophisticated, modern and feature rich.”

Now it has been discovered that the malware was created with heavy involvement of AI, researchers suggest it marks a watershed moment for malware development and defending against cyber threats.

“The security community has long anticipated that AI would be a force multiplier for malicious actors. Until now, however, the clearest evidence of AI-driven activity has largely surfaced in lower-sophistication operations, often tied to less experienced threat actors, and has not meaningfully raised the risk beyond regular attacks,” said Check Point.

“VoidLink shifts that baseline: its level of sophistication shows that when AI is in the hands of capable developers, it can materially amplify both the speed and the scale at which serious offensive capability can be produced,” the blog post concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
Next Article AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Team-CWD
  • Website

Related Posts

News

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

February 6, 2026
News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How chatbots can help spread scams

October 14, 2025

What’s at stake if your employees post too much online

December 1, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.