New VoidLink Cloud-Native Malware Targets Linux Systems
Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments.

New VoidLink Cloud-Native Malware Targets Linux Systems With Advanced Stealth and Self-Deletion
Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments. The malware, discovered by Check Point researchers in December 2025, introduces a new level of adaptability and stealth aimed squarely at cloud infrastructure and the engineers who manage it.
A Shift Toward Cloud-Aware Malware
VoidLink is written in the Zig programming language, an increasingly popular choice among threat actors due to its performance, low-level control, and limited detection signatures. Researchers say its design signals a notable shift in how attackers are approaching cloud-based targets.
Unlike traditional Linux malware, VoidLink is environment-aware. It can identify major cloud platforms—including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Alibaba Cloud, and Tencent Cloud—and tailor its behavior to blend into each ecosystem. The framework can also detect whether it is running inside Docker containers or Kubernetes clusters, modifying its tactics accordingly.
Still Under Active Development
Check Point analysts uncovered multiple VoidLink samples containing debug symbols and development artifacts, suggesting the framework is still being actively developed rather than deployed as a finished, mass-scale operation. Linguistic and technical indicators point to a Chinese-speaking development environment, though attribution remains unconfirmed.
Despite its apparent early-stage status, researchers warn that VoidLink already demonstrates capabilities that could enable espionage, supply chain attacks, and long-term cloud persistence.
Modular Architecture With 37+ Plugins
VoidLink uses a highly modular design, featuring more than 37 plugins grouped into categories such as reconnaissance, credential harvesting, lateral movement, and persistence. These plugins are delivered as object files that load dynamically at runtime and execute entirely in memory—an approach similar to Cobalt Strike’s Beacon Object Files (BOFs).
This design minimizes disk artifacts and allows attackers to selectively deploy functionality based on the target environment.
One of VoidLink’s most concerning capabilities is its ability to harvest credentials from cloud services and developer platforms, including version control systems like Git, potentially granting attackers access to proprietary codebases, infrastructure secrets, and deployment pipelines.
Adaptive Stealth and Kernel-Level Rootkits
Stealth is central to VoidLink’s operation. Upon execution, the malware scans the host system for security products, kernel hardening features, and Linux endpoint detection and response (EDR) tools. Based on these findings, it calculates a risk score and dynamically adjusts its behavior.
In heavily monitored environments, VoidLink slows its activity and carefully schedules actions to avoid triggering alerts.
The malware also deploys different rootkit techniques depending on the Linux kernel version:
- Kernels below 4.0: Uses
LD_PRELOADuserland rootkits - Kernels 4.0 and above: Installs loadable kernel modules (LKMs)
- Kernels 5.5 and higher: Leverages eBPF-based rootkits
These rootkits can hide processes, files, network connections, and even the rootkit components themselves, effectively blinding administrators and security tools.
Self-Modifying Code and Instant Self-Deletion
VoidLink employs self-modifying code that decrypts protected regions only when needed and re-encrypts them afterward, complicating memory scanning and signature-based detection. It continuously performs runtime integrity checks to identify hooks, patches, or debugging attempts introduced by security software.
If any tampering is detected, VoidLink immediately activates its self-deletion mechanism, erasing itself and its associated artifacts from the system. This not only evades detection but also severely limits forensic investigation and incident response efforts.
A Growing Threat to Cloud Infrastructure
Researchers warn that VoidLink represents a new generation of cloud-native malware built specifically for modern Linux-based infrastructure. While currently limited in scale, its advanced design and modular architecture suggest significant potential for future campaigns.
Security teams are urged to closely monitor cloud workloads, harden kernel configurations, restrict developer credential exposure, and improve visibility into containerized environments as attackers increasingly target the backbone of cloud operations.




