New Linux malware targets the cloud, steals creds, and then vanishes
- Reference: 1768423175
- News link: https://www.theregister.co.uk/2026/01/14/voidlink_linux_malware/
- Source link:
When VoidLink detects tampering or malware analysis on an infected machine, it can delete itself and invoke anti-forensics modules designed to remove traces of its activity.
In December, Check Point Research discovered the previously unseen malware samples written in Zig for Linux and appearing to originate from a Chinese-affiliated development environment with a command-and-control interface localized for Chinese operators.
[1]
The developers referred to it internally as "VoidLink," and the samples seemed to indicate an in-progress malware framework rather than a finished tool.
[2]
[3]
"The framework's intended use remains unclear, and as of this writing, no evidence of real-world infections has been observed," the research team [4]said in a Tuesday report. "The way it is built suggests it may ultimately be positioned for commercial use, either as a product offering or as a framework developed for a customer."
It's especially notable for two things. First, VoidLink is specifically designed to run in Linux-based cloud environments. After infecting a victim's machine, it scans for and detects AWS, Google Cloud Platform, Microsoft Azure, Alibaba, and Tencent, and its developers plan to add detections for Huawei, DigitalOcean, and Vultr.
[5]
While malware operators have traditionally focused on Windows-based systems, VoidLink's cloud-first focus is significant. Government agencies, global enterprises, critical infrastructure and other high-value attack targets increasingly run on cloud-based services and host their most sensitive systems in the cloud - so malware that hunts for infected machines' public cloud providers is likely to reap bigger rewards for government-sponsored spies as well as financially-motivated ransomware gangs.
In addition to its cloud-detection capabilities, VoidLink is notable for its custom loaders, implants, rootkits, and numerous modules that provide attackers with a whole range of stealthy, operational-security capabilities, making it "far more advanced than typical Linux malware," according to Check Point.
[6]PRC spies Brickstormed their way into critical US networks and remained hidden for years
[7]Russian spies pack custom malware into hidden VMs on Windows machines
[8]'Imagination the limit': DeadLock ransomware gang using smart contracts to hide their work
[9]Windows info-disclosure 0-day bug gets a fix as CISA sounds alarm
The framework includes multiple kernel-level rootkits, and chooses which one to deploy based on the environment where it runs. VoidLink also uses the rootkits to hide its processes, files, network sockets, and the rootkit modules themselves.
It uses a custom API, which the threat hunters describe as very similar to and likely inspired by Cobalt Strike's Beacon API. And it has at least 37 plugins - all of which are detailed in Check Point's analysis, so give that a read - that the developers organize by category.
Some of these capabilities include:
Recon plugins that provide system and environment profiling, user and group enumeration, process and service discovery, and filesystem and network mapping.
Kubernetes and Docker discovery, privilege-escalation helpers, and container escape checks.
Multiple plugins to steal credentials and secrets.
Post-exploitation tools including shells, port forwarding and tunneling, and an SSH-based worm that can connect to known hosts and spread laterally.
Plugins that establish persistence.
Anti-forensics components that wipe or edit logs and shell history.
"The framework is designed for long-term access, surveillance, and data collection rather than short-term disruption," Check Point research [10]said in a subsequent blog about VoidLink. "Its design reflects a level of planning and investment typically associated with professional threat actors rather than opportunistic attackers, raising the stakes for defenders who may never realize their infrastructure has been quietly taken over." ®
Get our [11]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aWlxnP2A38S0UGJNH_lPygAAA1A&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnP2A38S0UGJNH_lPygAAA1A&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aWlxnP2A38S0UGJNH_lPygAAA1A&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnP2A38S0UGJNH_lPygAAA1A&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2025/12/04/prc_spies_brickstorm_cisa/
[7] https://www.theregister.com/2025/11/04/russian_spies_pack_custom_malware/
[8] https://www.theregister.com/2026/01/14/deadlock_ransomware_smart_contracts/
[9] https://www.theregister.com/2026/01/14/patch_tuesday_january_2026/
[10] https://blog.checkpoint.com/research/voidlink-the-cloud-native-malware-framework-weaponizing-linux-infrastructure/
[11] https://whitepapers.theregister.com/
Hot air
That sounds like a lot of hot air.
Re: Hot air
Flatus
Pride in workmanship?
This sounds like a real professional tool. There is something wrong about people viewing digial theft as a career to be proud of.
Re: Pride in workmanship?
Broken social contract puts things in different perspective.
There is a lot of contractors who feel bitter about how corrupt corporations and governments are and how they shafted them.
If government in bed with corporations stole their future, they think it might be a fair game to take some of it "back".
Re: Pride in workmanship?
I agree. All the AI CEOs for example.
Re: Pride in workmanship?
How do you know they are proud of being digital thieves?
Doing professional-quality work does not mean you necessarily approve of the uses to which it is put. It's possible that some of these malware coders are slaves to some criminal or terrorist organisation.
The Reg did a piece some years back about an infrastructure guy being kidnapped from California by drug cartel members, and being forced to set up private comm systems in South America. (I don't recall whether he escaped or was rescued, but he made it back to tell his tale.)
Not seen in the wild. How did they discover it?
They wrote it?
I like the part where it cleans after itself and leaves no trace.
Convenient.
Reminds me of a friend who caught massive catfish, he was bragging about it whole day. Unfortunately his wife accidentally deleted the photo and he released the beast into the river. But for sure he caught it *wink*
Not been mentioned on El Reg yet, but this is probably related
https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/
Entry?
"After infecting a victim's machine": How is that accomplished? How would the malware be installed? Evil Maid? Violation of Best Practice?
The whole story to me sounds like an advertisement for the authoring security firm.
So who exactly do you get infected ?
Is it just me, or is the most important detail rather under reported ?
Zig, eh?
I remember about 6 months to a year go, breathless, hyped up videos showing in various feeds: "forget Rust! forget Go! forget C! Zig is the future! zomg!!!111oneoneone and so son"
Glad someone finally found a real use case! /s