Illustration depicting VoidLink Linux malware infiltrating cloud infrastructures, as discovered by Check Point researchers.
Immagine generata dall'IA

Check Point discovers advanced VoidLink Linux malware for clouds

Immagine generata dall'IA

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

In late 2025, Check Point Research identified samples of VoidLink on VirusTotal, a never-before-seen malware framework written in the Zig programming language. The samples, which include development artifacts like debug symbols, indicate an in-progress tool rather than a fully deployed weapon. Internally referred to as VoidLink by its creators, the framework appears to originate from a Chinese-affiliated development environment, with a command-and-control interface localized for Chinese operators.

VoidLink is tailored for Linux-based cloud environments, automatically scanning for major providers such as AWS, Google Cloud Platform, Microsoft Azure, Alibaba, and Tencent upon infection. Developers plan to expand detection to Huawei, DigitalOcean, and Vultr. This cloud-first approach marks a shift, as high-value targets like government agencies and enterprises increasingly rely on these platforms for sensitive operations.

The malware's modular architecture stands out, with at least 37 plugins organized by category. These enable a range of activities: reconnaissance for system profiling and network mapping; Kubernetes and Docker discovery with privilege-escalation and container escape tools; credential theft targeting SSH keys, Git credentials, API keys, and browser data; post-exploitation features like shells, port forwarding, and an SSH-based worm for lateral spread; persistence mechanisms; and anti-forensics modules to wipe logs and self-delete upon detecting tampering or analysis.

Check Point describes VoidLink as 'far more advanced than typical Linux malware,' featuring custom loaders, implants, kernel-level rootkits that hide processes, files, and network activity, and a custom API inspired by Cobalt Strike's Beacon. It calculates a 'risk score' to adapt behavior in monitored environments, disguising C2 traffic as legitimate web or API calls. The framework prioritizes long-term access, surveillance, and data collection over disruption, suggesting preparation for professional use by state-sponsored or financially motivated actors.

While no evidence of wild infections exists, experts warn that VoidLink's sophistication raises the stakes for defenders. Organizations are urged to enhance monitoring of Linux cloud deployments, focusing on runtime security and configuration audits to counter such evolving threats.

Cosa dice la gente

X discussions focus on Check Point's discovery of VoidLink, a sophisticated modular Linux malware framework targeting cloud and container environments. Security experts highlight its stealth features, over 30 plugins for reconnaissance and credential theft, and links to Chinese developers. Reactions express concern over threats to AWS, Azure, GCP, and Kubernetes, praise the detailed research, and note no observed real-world infections. Some vendors claim resistance, while others stress hardening Linux systems.

Articoli correlati

Illustration of a hacker using AI to swiftly build VoidLink malware targeting Linux cloud servers, featuring rapid code generation and infiltrated systems.
Immagine generata dall'IA

AI-assisted VoidLink malware framework targets Linux cloud servers

Riportato dall'IA Immagine generata dall'IA

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Riportato dall'IA

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Riportato dall'IA

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Riportato dall'IA

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta