January 14, 2026

New VoidLink Cloud-Native Malware Targets Linux Systems

Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments.

New VoidLink Cloud-Native Malware Targets Linux Systems With Advanced Stealth and Self-Deletion

Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments. The malware, discovered by Check Point researchers in December 2025, introduces a new level of adaptability and stealth aimed squarely at cloud infrastructure and the engineers who manage it.

A Shift Toward Cloud-Aware Malware

VoidLink is written in the Zig programming language, an increasingly popular choice among threat actors due to its performance, low-level control, and limited detection signatures. Researchers say its design signals a notable shift in how attackers are approaching cloud-based targets.

Unlike traditional Linux malware, VoidLink is environment-aware. It can identify major cloud platforms—including Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, Alibaba Cloud, and Tencent Cloud—and tailor its behavior to blend into each ecosystem. The framework can also detect whether it is running inside Docker containers or Kubernetes clusters, modifying its tactics accordingly.

Still Under Active Development

Check Point analysts uncovered multiple VoidLink samples containing debug symbols and development artifacts, suggesting the framework is still being actively developed rather than deployed as a finished, mass-scale operation. Linguistic and technical indicators point to a Chinese-speaking development environment, though attribution remains unconfirmed.

Despite its apparent early-stage status, researchers warn that VoidLink already demonstrates capabilities that could enable espionage, supply chain attacks, and long-term cloud persistence.

Modular Architecture With 37+ Plugins

VoidLink uses a highly modular design, featuring more than 37 plugins grouped into categories such as reconnaissance, credential harvesting, lateral movement, and persistence. These plugins are delivered as object files that load dynamically at runtime and execute entirely in memory—an approach similar to Cobalt Strike’s Beacon Object Files (BOFs).

This design minimizes disk artifacts and allows attackers to selectively deploy functionality based on the target environment.

One of VoidLink’s most concerning capabilities is its ability to harvest credentials from cloud services and developer platforms, including version control systems like Git, potentially granting attackers access to proprietary codebases, infrastructure secrets, and deployment pipelines.

Adaptive Stealth and Kernel-Level Rootkits

Stealth is central to VoidLink’s operation. Upon execution, the malware scans the host system for security products, kernel hardening features, and Linux endpoint detection and response (EDR) tools. Based on these findings, it calculates a risk score and dynamically adjusts its behavior.

In heavily monitored environments, VoidLink slows its activity and carefully schedules actions to avoid triggering alerts.

The malware also deploys different rootkit techniques depending on the Linux kernel version:

  • Kernels below 4.0: Uses LD_PRELOAD userland rootkits
  • Kernels 4.0 and above: Installs loadable kernel modules (LKMs)
  • Kernels 5.5 and higher: Leverages eBPF-based rootkits

These rootkits can hide processes, files, network connections, and even the rootkit components themselves, effectively blinding administrators and security tools.

Self-Modifying Code and Instant Self-Deletion

VoidLink employs self-modifying code that decrypts protected regions only when needed and re-encrypts them afterward, complicating memory scanning and signature-based detection. It continuously performs runtime integrity checks to identify hooks, patches, or debugging attempts introduced by security software.

If any tampering is detected, VoidLink immediately activates its self-deletion mechanism, erasing itself and its associated artifacts from the system. This not only evades detection but also severely limits forensic investigation and incident response efforts.

A Growing Threat to Cloud Infrastructure

Researchers warn that VoidLink represents a new generation of cloud-native malware built specifically for modern Linux-based infrastructure. While currently limited in scale, its advanced design and modular architecture suggest significant potential for future campaigns.

Security teams are urged to closely monitor cloud workloads, harden kernel configurations, restrict developer credential exposure, and improve visibility into containerized environments as attackers increasingly target the backbone of cloud operations.

Know what’s happening to your data

Explore our blog to protect yourself from doxxing threats and safeguard your personal information.

January 14, 2026

New VoidLink Cloud-Native Malware Targets Linux Systems

Security researchers have identified a sophisticated new cloud-native malware framework, dubbed VoidLink, that is actively targeting Linux systems used in modern cloud environments.

Read More

January 14, 2026

Hackers Selling Target Source Code Following Alleged Cyberattack

Hackers claim to be selling 860GB of stolen internal source code from Target after a recent cyberattack, though the claims remain unverified.

Read More

January 14, 2026

Magecart Campaign Steals Credit Card Data From E-Commerce Sites

Cybersecurity researchers uncovered a sophisticated Magecart campaign active since at least January 2022 that steals credit card data from WooCommerce sites using Stripe, affecting major global payment networks.

Read More

All EraseMe plans include a 30-day risk-free refund guarantee.

Not satisfied? Reach out to our 24/7 Support within 30 days of joining, and we’ll refund every cent—no questions asked.

Try EraseMe