Illustration depicting VoidLink Linux malware infiltrating cloud infrastructures, as discovered by Check Point researchers.
AI 生成的图像

Check Point discovers advanced VoidLink Linux malware for clouds

AI 生成的图像

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

In late 2025, Check Point Research identified samples of VoidLink on VirusTotal, a never-before-seen malware framework written in the Zig programming language. The samples, which include development artifacts like debug symbols, indicate an in-progress tool rather than a fully deployed weapon. Internally referred to as VoidLink by its creators, the framework appears to originate from a Chinese-affiliated development environment, with a command-and-control interface localized for Chinese operators.

VoidLink is tailored for Linux-based cloud environments, automatically scanning for major providers such as AWS, Google Cloud Platform, Microsoft Azure, Alibaba, and Tencent upon infection. Developers plan to expand detection to Huawei, DigitalOcean, and Vultr. This cloud-first approach marks a shift, as high-value targets like government agencies and enterprises increasingly rely on these platforms for sensitive operations.

The malware's modular architecture stands out, with at least 37 plugins organized by category. These enable a range of activities: reconnaissance for system profiling and network mapping; Kubernetes and Docker discovery with privilege-escalation and container escape tools; credential theft targeting SSH keys, Git credentials, API keys, and browser data; post-exploitation features like shells, port forwarding, and an SSH-based worm for lateral spread; persistence mechanisms; and anti-forensics modules to wipe logs and self-delete upon detecting tampering or analysis.

Check Point describes VoidLink as 'far more advanced than typical Linux malware,' featuring custom loaders, implants, kernel-level rootkits that hide processes, files, and network activity, and a custom API inspired by Cobalt Strike's Beacon. It calculates a 'risk score' to adapt behavior in monitored environments, disguising C2 traffic as legitimate web or API calls. The framework prioritizes long-term access, surveillance, and data collection over disruption, suggesting preparation for professional use by state-sponsored or financially motivated actors.

While no evidence of wild infections exists, experts warn that VoidLink's sophistication raises the stakes for defenders. Organizations are urged to enhance monitoring of Linux cloud deployments, focusing on runtime security and configuration audits to counter such evolving threats.

人们在说什么

X discussions focus on Check Point's discovery of VoidLink, a sophisticated modular Linux malware framework targeting cloud and container environments. Security experts highlight its stealth features, over 30 plugins for reconnaissance and credential theft, and links to Chinese developers. Reactions express concern over threats to AWS, Azure, GCP, and Kubernetes, praise the detailed research, and note no observed real-world infections. Some vendors claim resistance, while others stress hardening Linux systems.

相关文章

Illustration of a hacker using AI to swiftly build VoidLink malware targeting Linux cloud servers, featuring rapid code generation and infiltrated systems.
AI 生成的图像

AI-assisted VoidLink malware framework targets Linux cloud servers

由 AI 报道 AI 生成的图像

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

由 AI 报道

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

由 AI 报道

Two groups linked to China are exploiting a newly discovered vulnerability in Cisco's email security products. The campaign involves zero-day attacks, highlighting ongoing cybersecurity risks. The issue was reported on December 19, 2025.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

由 AI 报道

中国当局已指示国内公司停止使用十多家美国和以色列公司的网络安全软件,原因是国家安全担忧。该指令支持北京在与美国的科技竞争日益激烈之际,用本土替代品取代西方技术。三位知情人士表示,该通知最近几天发出。

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝