VYPR
researchPublished Dec 8, 2025· Updated May 20, 2026· 1 source

AI-Powered Hunting Reveals GhostPenguin: A Stealthy, Undocumented Linux Backdoor

Trend Micro researchers have uncovered GhostPenguin, a previously unknown Linux backdoor with extremely low detection rates, discovered through an AI-driven automated threat hunting pipeline.

Trend Micro researchers have uncovered a previously undocumented Linux backdoor they have named GhostPenguin, discovered through an AI-driven automated threat hunting pipeline. The malware, which exhibits extremely low detection rates on VirusTotal, provides attackers with stealthy remote access and comprehensive file system operations over an encrypted communication channel. The discovery highlights how advanced automation and artificial intelligence can surface sophisticated, evasive threats that traditional signature-based detection methods might miss.

GhostPenguin is a multi-threaded Linux backdoor written in C++ that establishes communication with its command-and-control (C2) server through a structured session handshake mechanism. It synchronizes multiple threads to handle registration, heartbeat signaling, and reliable command delivery. The malware uses an RC5-encrypted UDP channel for all communications, making network traffic analysis and detection significantly more difficult. Once installed, GhostPenguin provides attackers with remote shell access and the ability to perform comprehensive file system operations on the compromised Linux system.

The backdoor was discovered through Trend Micro Research's AI-driven, automated threat hunting pipeline, which collected and analyzed zero-detection Linux samples from VirusTotal. The investigation involved building a structured database of extracted artifacts, using AI to automate profiling, and employing VirusTotal hunting queries to surface zero-detection samples for deeper analysis. This approach allowed researchers to extract artifacts from thousands of malware samples, generate structured profiles, and use custom YARA rules and VirusTotal queries to uncover undetected threats like GhostPenguin.

Analysis of the GhostPenguin backdoor revealed that it is still in development, with debug artifacts and unused functions present in the code. This suggests that the threat actors behind the malware are actively refining and expanding its capabilities. The malware's low detection rate is attributed to the threat actors' careful crafting of both the code and network communication to minimize noise and keep the malware as inconspicuous as possible. They avoided publicly available libraries, known GitHub code, or code borrowed from other malware families, creating a previously unseen sample that could evade detection.

The discovery of GhostPenguin underscores the growing importance of AI and automation in cybersecurity. As threat actors increasingly develop custom, evasive malware that avoids known signatures and behavioral patterns, traditional detection methods become less effective. AI-driven approaches can analyze vast amounts of data, identify subtle patterns, and surface threats that would otherwise remain hidden in the noise of millions of daily file submissions to platforms like VirusTotal.

Trend Micro's research demonstrates how defenders can leverage AI to improve detection patterns and their overall approach to threat hunting. By collecting and analyzing artifacts from known malware samples, building structured databases, and using AI to automate profiling and analysis, security teams can more effectively hunt for new, undetected threats. The GhostPenguin discovery serves as a case study for how advanced AI and automation can uncover sophisticated, evasive threats that might otherwise go unnoticed.

Trend Vision One detects and blocks the specific indicators of compromise (IoCs) associated with the GhostPenguin backdoor, and offers customers access to hunting queries, threat insights, and intelligence reports related to this threat. The discovery highlights the need for organizations to invest in advanced threat hunting capabilities and AI-driven security tools to stay ahead of increasingly sophisticated adversaries.

Synthesized by Vypr AI