By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Someone has created the first complete advanced malware by vibecoding with AI. It’s called Voidlink and it leaves an important question
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Someone has created the first complete advanced malware by vibecoding with AI. It’s called Voidlink and it leaves an important question
Mobile

Someone has created the first complete advanced malware by vibecoding with AI. It’s called Voidlink and it leaves an important question

News Room
Last updated: 2026/04/14 at 7:40 PM
News Room Published 14 April 2026
Share
Someone has created the first complete advanced malware by vibecoding with AI. It’s called Voidlink and it leaves an important question
SHARE

For a long time, developing advanced malware seemed reserved for actors with experience, time and considerable technical capacity, especially in an environment in which operating systems and many platforms have been tightening their defenses. But the table is changing. What we have seen in recent years is that artificial intelligence not only serves to summarize texts or answer questions, it can also very visibly accelerate the software creation when given precise instructions. And that leaves us facing a reality that is difficult to ignore: the same tool that simplifies legitimate tasks can also reduce part of the effort necessary to create malicious code.

That change begins to take concrete form with VoidLink. In its analysis, Check Point presents it as one of the strongest evidence so far of advanced malware developed largely with the help of AI. There is, however, an important nuance in the investigation itself: the company assures that it detected it at an early stage, that it was not deployed against victims and that it was not used in active attacks. But that is precisely why the discovery is so revealing, because it allowed access to development materials that rarely come to light.

How VoidLink was built and why it changes the dashboard

VoidLink was not, at least on paper, a minor piece or a rudimentary experiment. The cybersecurity firm describes it as a malware framework for Linux with a modular architecture, designed to maintain stealthy and prolonged access in cloud environments. In his analysis he mentions components such as eBPF and LKM rootkits, as well as specific modules for cloud enumeration and subsequent activities in container environments. That level of maturity is just what separates it from other previous cases associated with simpler code.

One of the most striking twists in the case is who seems to have been behind it. Check Point explains that, due to its internal structure and the pace of evolution observed, VoidLink gave the impression of having come from a large team, with different profiles and a fairly defined work plan. But the evidence collected by the firm points to something very different: a single actor who, according to the investigation, would have had AI support during different phases of development. There is also another relevant element: that actor would not be a rookie, but rather someone with a solid technical base and previous experience in cybersecurity.

Voidlink

Rebuilding Workflow Attributed to VoidLink | Image: Check Point

The most revealing part of the case is how the project would have been built. The firm describes a working method based on what it calls Spec Driven Development that works as follows:

  1. You define what you want to build.
  2. That idea is translated into architecture, tasks, sprints and delivery criteria.
  3. The implementation is delegated to the model.

In the exposed materials, development plans, technical documentation, coding standards, deployment and testing guides appeared, as well as an organization by teams and phases that supports this model. One of the recovered artifacts, dated December 4, 2025, further suggests that VoidLink had already reached a functional phase in less than a week and exceeded the 88,000 lines of code.

Basic-Fit has suffered a cyberattack that affects nearly a million customers: names and bank details compromised

That is precisely what separates VoidLink from other precedents. Check Point maintains that this is the strongest evidence of malware created almost entirely with the help of AI. “This is the first confirmed case of advanced AI-generated malware, created with the speed, structure and sophistication of an entire engineering organization,” the company says. The question now is how far malicious actors can go with these types of techniques.

Images | WorldOfSoftware with Nano Banana | Check Point

In WorldOfSoftware | The Booking hack is a little more disturbing: “Tracking phishing” attacks are here to stay

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google finally intervenes to discourage “back button hijacking” Google finally intervenes to discourage “back button hijacking”
Next Article Motorola Razr flip phone leaks as Motorola Fold launches in Europe Motorola Razr flip phone leaks as Motorola Fold launches in Europe
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How AI-Driven Decision Intelligence Is Reshaping Enterprise Performance Management | HackerNoon
How AI-Driven Decision Intelligence Is Reshaping Enterprise Performance Management | HackerNoon
Computing
Margo’s Got Money Troubles premieres on Apple TV – 9to5Mac
Margo’s Got Money Troubles premieres on Apple TV – 9to5Mac
News
Best Fire TV Stick deal: Save  on Amazon Fire Stick 4K Plus
Best Fire TV Stick deal: Save $20 on Amazon Fire Stick 4K Plus
News
AI-led demand signals longer semiconductor upcycle into 2026 and beyond · TechNode
AI-led demand signals longer semiconductor upcycle into 2026 and beyond · TechNode
Computing

You Might also Like

Google finally intervenes to discourage “back button hijacking”
Mobile

Google finally intervenes to discourage “back button hijacking”

3 Min Read
AI agents will pay software licenses
Mobile

AI agents will pay software licenses

4 Min Read
HP TPM Guard, a hardware solution to protect computers from physical access attacks
Mobile

HP TPM Guard, a hardware solution to protect computers from physical access attacks

4 Min Read
If anyone thinks that gambling is a modern vice, we just found a game of chance that is more than 12,000 years old
Mobile

If anyone thinks that gambling is a modern vice, we just found a game of chance that is more than 12,000 years old

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?