VoidLink Malware Framework Targets Cloud and Container Environments
Summary
Hide ▲
Show ▼
VoidLink is a Linux-based command-and-control (C2) framework capable of long-term intrusion across cloud and enterprise environments. The malware generates implant binaries designed for credential theft, data exfiltration, and stealthy persistence on compromised systems. VoidLink combines multi-cloud targeting with container and kernel awareness in a single Linux implant, fingerprinting environments across major cloud providers and adjusting its behavior based on what it finds. The implant harvests credentials from environment variables, configuration files, and metadata APIs, and profiles security controls, kernel versions, and container runtimes before activating additional modules. VoidLink employs a modular plugin-based architecture that loads functionality as needed, including credential harvesting, environment fingerprinting, container escape, Kubernetes privilege escalation, and kernel-level stealth. The malware uses AES-256-GCM over HTTPS for encrypted C2 traffic, designed to resemble normal web activity. VoidLink stands out for its apparent development using a large language model (LLM) coding agent with limited human review, as indicated by unusual development artifacts such as structured "Phase X:" labels, verbose debug logs, and documentation left inside the production binary. The research concludes that VoidLink is not a proof-of-concept but an operational implant with live infrastructure, highlighting how AI-assisted development is lowering the barrier to producing functional, modular, and hard-to-detect malware. A previously unknown threat actor tracked as UAT-9921 has been observed leveraging VoidLink in campaigns targeting the technology and financial services sectors. UAT-9921 has been active since 2019, although they have not necessarily used VoidLink over the duration of their activity. The threat actor uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network. VoidLink is deployed as a post-compromise tool, allowing the adversary to sidestep detection. The threat actor has been observed deploying a SOCKS proxy on compromised servers to launch scans for internal reconnaissance and lateral movement using open-source tools like Fscan. VoidLink uses three different programming languages: ZigLang for the implant, C for the plugins, and GoLang for the backend. The framework supports compilation on demand for plugins, providing support for the different Linux distributions that might be targeted. The plugins allow for gathering information, lateral movement, and anti-forensics. VoidLink comes fitted with a wide range of stealth mechanisms to hinder analysis, prevent its removal from the infected hosts, and even detect endpoint detection and response (EDR) solutions and devise an evasion strategy on the fly. VoidLink has an auditability feature and a role-based access control (RBAC) mechanism, which consists of three role levels: SuperAdmin, Operator, and Viewer. There are signs that there exists a main implant that has been compiled for Windows and can load plugins via a technique called DLL side-loading.
Timeline
-
13.02.2026 17:23 1 articles · 23h ago
UAT-9921 Deploys VoidLink to Target Technology and Financial Sectors
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging VoidLink in campaigns targeting the technology and financial services sectors. UAT-9921 has been active since 2019, although they have not necessarily used VoidLink over the duration of their activity. The threat actor uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network. VoidLink is deployed as a post-compromise tool, allowing the adversary to sidestep detection. The threat actor has been observed deploying a SOCKS proxy on compromised servers to launch scans for internal reconnaissance and lateral movement using open-source tools like Fscan. VoidLink uses three different programming languages: ZigLang for the implant, C for the plugins, and GoLang for the backend. The framework supports compilation on demand for plugins, providing support for the different Linux distributions that might be targeted. The plugins allow for gathering information, lateral movement, and anti-forensics. VoidLink comes fitted with a wide range of stealth mechanisms to hinder analysis, prevent its removal from the infected hosts, and even detect endpoint detection and response (EDR) solutions and devise an evasion strategy on the fly. VoidLink has an auditability feature and a role-based access control (RBAC) mechanism, which consists of three role levels: SuperAdmin, Operator, and Viewer. There are signs that there exists a main implant that has been compiled for Windows and can load plugins via a technique called DLL side-loading.
Show sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
09.02.2026 17:25 2 articles · 4d ago
VoidLink Exhibits Multi-Cloud Capabilities and AI Code
A new analysis by Ontinue on February 9, 2026, provides further insights into VoidLink's capabilities and development. VoidLink is a Linux-based C2 framework designed for long-term intrusion across cloud and enterprise environments. It employs a modular plugin-based architecture for credential harvesting, environment fingerprinting, container escape, Kubernetes privilege escalation, and kernel-level stealth. The malware uses AES-256-GCM over HTTPS for encrypted C2 traffic, designed to resemble normal web activity. VoidLink's development appears to have been assisted by a large language model (LLM) coding agent, as indicated by unusual development artifacts such as structured "Phase X:" labels, verbose debug logs, and documentation left inside the production binary. The research concludes that VoidLink is an operational implant with live infrastructure, highlighting the impact of AI-assisted development on malware production.
Show sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
20.01.2026 21:35 5 articles · 24d ago
VoidLink Development with AI Assistance
VoidLink's development likely began in late November 2025, with the help of an artificial intelligence model. The malware framework reached a functional iteration within a week, indicating rapid development and refinement. The developer used Spec-Driven Development (SDD) to define the project's goals and set constraints, with the AI generating a multi-team development plan covering architecture, sprints, and standards. VoidLink reached 88,000 lines of code by early December 2025, and researchers successfully reproduced the workflow, confirming that an AI agent can generate code similar to VoidLink's. The development process involved a single person using a coding agent known as TRAE SOLO to carry out the tasks. Internal planning material written in Chinese related to sprint schedules, feature breakdowns, and coding guidelines were found, indicating LLM-generated content. The development plan was created on November 27, 2025, and was used as an execution blueprint for the LLM to follow, build, and test the malware. Check Point Research replicated the implementation workflow using the TRAE IDE used by the developer, confirming that the model generated code that resembled VoidLink's source code. The code standardization instructions against the recovered VoidLink source code showed a striking level of alignment, indicating the codebase was written to those exact instructions. The developer utilized regular checkpoints to check in on the AI-generated code to ensure that the model was developing it as instructed and that the code worked.
Show sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
13.01.2026 13:57 6 articles · 1mo ago
Discovery of VoidLink Malware Framework
In December 2025, cybersecurity researchers discovered a previously undocumented malware framework codenamed VoidLink. The framework is designed for long-term, stealthy access to Linux-based cloud environments and includes custom loaders, implants, rootkits, and over 30 modular plugins. VoidLink is engineered to detect major cloud environments and adapt its behavior when running within Docker containers or Kubernetes pods. The malware gathers credentials associated with cloud environments and source code version control systems like Git. VoidLink's capabilities include anti-forensics, reconnaissance, credential harvesting, lateral movement, and persistence, making it a full-fledged post-exploitation framework. The framework is assessed to be the work of China-affiliated threat actors and includes a Chinese web-based dashboard for remote control and management of the implant. VoidLink is written primarily in the Zig programming language and includes plans to extend its detection capabilities to additional cloud environments such as Huawei, DigitalOcean, and Vultr. VoidLink's documentation suggests it is intended for commercial purposes, and its development environment includes debug symbols and other development artifacts, indicating ongoing development and refinement. The framework uses a custom encrypted messaging layer called 'VoidStream' to camouflage traffic and includes 35 plugins in the default configuration. VoidLink employs rootkit modules to hide processes, files, network sockets, or the rootkit itself, and includes advanced anti-analysis mechanisms to detect debuggers, perform runtime code encryption, and integrity checks. VoidLink's anti-forensic modules erase logs, shell history, login records, and securely overwrite all files dropped on the host, minimizing exposure to forensic investigations. VoidLink was developed with the help of an artificial intelligence model, reaching a functional iteration within a week. The developer used Spec-Driven Development (SDD) to define the project's goals and set constraints, with the AI generating a multi-team development plan. VoidLink reached 88,000 lines of code by early December 2025, and researchers successfully reproduced the workflow, confirming that an AI agent can generate code similar to VoidLink's. A previously unknown threat actor tracked as UAT-9921 has been observed leveraging VoidLink in campaigns targeting the technology and financial services sectors. UAT-9921 has been active since 2019, although they have not necessarily used VoidLink over the duration of their activity. The threat actor uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network. VoidLink is deployed as a post-compromise tool, allowing the adversary to sidestep detection. The threat actor has been observed deploying a SOCKS proxy on compromised servers to launch scans for internal reconnaissance and lateral movement using open-source tools like Fscan. VoidLink uses three different programming languages: ZigLang for the implant, C for the plugins, and GoLang for the backend. The framework supports compilation on demand for plugins, providing support for the different Linux distributions that might be targeted. The plugins allow for gathering information, lateral movement, and anti-forensics. VoidLink comes fitted with a wide range of stealth mechanisms to hinder analysis, prevent its removal from the infected hosts, and even detect endpoint detection and response (EDR) solutions and devise an evasion strategy on the fly. VoidLink has an auditability feature and a role-based access control (RBAC) mechanism, which consists of three role levels: SuperAdmin, Operator, and Viewer. There are signs that there exists a main implant that has been compiled for Windows and can load plugins via a technique called DLL side-loading.
Show sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
Information Snippets
-
VoidLink is a cloud-native Linux malware framework designed for long-term, stealthy access to Linux-based cloud environments.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The framework includes custom loaders, implants, rootkits, and over 30 modular plugins.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is engineered to detect major cloud environments such as AWS, Google Cloud, Microsoft Azure, Alibaba, and Tencent.
First reported: 13.01.2026 13:573 sources, 7 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The malware can adapt its behavior when running within Docker containers or Kubernetes pods.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink gathers credentials associated with cloud environments and source code version control systems like Git.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The framework includes anti-forensics, reconnaissance, credential harvesting, lateral movement, and persistence capabilities.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is assessed to be the work of China-affiliated threat actors.
First reported: 13.01.2026 13:573 sources, 6 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The malware features a custom Plugin API inspired by Cobalt Strike's Beacon Object Files (BOF) approach.
First reported: 13.01.2026 13:573 sources, 7 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink includes a Chinese web-based dashboard for remote control and management of the implant.
First reported: 13.01.2026 13:573 sources, 6 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The framework supports varied command-and-control (C2) channels, including HTTP/HTTPS, WebSocket, ICMP, and DNS tunneling.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink can form a peer-to-peer (P2P) or mesh-style network between compromised hosts.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The malware includes anti-analysis features to circumvent detection, such as flagging debuggers and monitoring tools, and self-modifying code.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink enumerates installed security products and hardening measures to calculate a risk score and evasion strategy.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The developers demonstrate a high level of technical expertise, with proficiency in multiple programming languages including Go, Zig, C, and modern frameworks like React.
First reported: 13.01.2026 13:573 sources, 8 articlesShow sources
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments — thehackernews.com — 13.01.2026 13:57
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is written primarily in the Zig programming language.
First reported: 13.01.2026 16:313 sources, 7 articlesShow sources
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink's documentation suggests it is intended for commercial purposes.
First reported: 13.01.2026 16:313 sources, 7 articlesShow sources
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink includes plans to extend its detection capabilities to Huawei, DigitalOcean, and Vultr cloud environments.
First reported: 13.01.2026 16:313 sources, 7 articlesShow sources
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink can perform automated container escapes and secret extraction.
First reported: 13.01.2026 16:313 sources, 7 articlesShow sources
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink's development environment includes debug symbols and other development artifacts, indicating in-progress builds.
First reported: 13.01.2026 16:313 sources, 7 articlesShow sources
- New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments — www.infosecurity-magazine.com — 13.01.2026 16:31
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is written in Zig, Go, and C.
First reported: 14.01.2026 00:122 sources, 3 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink uses a custom encrypted messaging layer called 'VoidStream' to camouflage traffic.
First reported: 14.01.2026 00:122 sources, 3 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink's plugins are ELF object files loaded directly into memory and call framework APIs via syscalls.
First reported: 14.01.2026 00:122 sources, 3 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink uses 35 plugins in the default configuration, including reconnaissance, cloud and container enumeration, credential harvesting, lateral movement, persistence mechanisms, and anti-forensics.
First reported: 14.01.2026 00:123 sources, 6 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink uses rootkit modules that hide processes, files, network sockets, or the rootkit itself.
First reported: 14.01.2026 00:123 sources, 6 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink can detect debuggers in the environment, uses runtime code encryption, and performs integrity checks to detect hooks and tampering.
First reported: 14.01.2026 00:123 sources, 6 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink's anti-forensic modules erase logs, shell history, login records, and securely overwrite all files dropped on the host.
First reported: 14.01.2026 00:123 sources, 6 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink aims to automate evasion by thoroughly profiling the targeted environment before choosing the best strategy.
First reported: 14.01.2026 00:123 sources, 6 articlesShow sources
- New VoidLink malware framework targets Linux cloud servers — www.bleepingcomputer.com — 14.01.2026 00:12
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink was developed with the help of an artificial intelligence model.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink's development likely began in late November 2025.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The malware framework reached a functional iteration within a week.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The developer used Spec-Driven Development (SDD) to define the project's goals and set constraints.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The AI generated a multi-team development plan covering architecture, sprints, and standards.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The generated documentation describes a 16-30 week, three-team effort, but VoidLink was functional within a week.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink reached 88,000 lines of code by early December 2025.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The sprint specifications and the recovered source code match almost exactly.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
Researchers successfully reproduced the workflow, confirming that an AI agent can generate code similar to VoidLink's.
First reported: 20.01.2026 21:353 sources, 5 articlesShow sources
- VoidLink cloud malware shows clear signs of being AI-generated — www.bleepingcomputer.com — 20.01.2026 21:35
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink was developed by a single person with assistance from an artificial intelligence model, reaching a functional iteration in under a week.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink reached 88,000 lines of code by early December 2025.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The development of VoidLink was engineered using an AI model, which was used to build, execute, and test the framework.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The developer used Spec-Driven Development (SDD) to define the project's goals and set constraints, with the AI generating a multi-team development plan.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The threat actor commenced work on VoidLink in late November 2025, leveraging a coding agent known as TRAE SOLO to carry out the tasks.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
Internal planning material written in Chinese related to sprint schedules, feature breakdowns, and coding guidelines were found, indicating LLM-generated content.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The development plan was created on November 27, 2025, and was used as an execution blueprint for the LLM to follow, build, and test the malware.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
Check Point Research replicated the implementation workflow using the TRAE IDE used by the developer, confirming that the model generated code that resembled VoidLink's source code.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The code standardization instructions against the recovered VoidLink source code showed a striking level of alignment, indicating the codebase was written to those exact instructions.
First reported: 21.01.2026 10:552 sources, 4 articlesShow sources
- VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code — thehackernews.com — 21.01.2026 10:55
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The developer utilized regular checkpoints to check in on the AI-generated code to ensure that the model was developing it as instructed and that the code worked.
First reported: 21.01.2026 14:512 sources, 3 articlesShow sources
- VoidLink Linux Malware Was Built Using an AI Agent, Researchers Reveal — www.infosecurity-magazine.com — 21.01.2026 14:51
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink employs a modular plugin-based architecture that loads functionality as needed.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink harvests credentials from environment variables, configuration files, and metadata APIs.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink profiles security controls, kernel versions, and container runtimes before activating additional modules.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink uses AES-256-GCM over HTTPS for encrypted C2 traffic, designed to resemble normal web activity.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink includes an incomplete and duplicated phase numbering system, excessive logging, and formal status messages, indicating limited human review.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is an operational implant with live infrastructure, highlighting how AI-assisted development is lowering the barrier to producing functional, modular, and hard-to-detect malware.
First reported: 09.02.2026 17:252 sources, 2 articlesShow sources
- VoidLink Malware Exhibits Multi-Cloud Capabilities and AI Code — www.infosecurity-magazine.com — 09.02.2026 17:25
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
A previously unknown threat actor tracked as UAT-9921 has been observed leveraging VoidLink in campaigns targeting the technology and financial services sectors.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
UAT-9921 has been active since 2019, although they have not necessarily used VoidLink over the duration of their activity.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
UAT-9921 uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink is deployed as a post-compromise tool, allowing the adversary to sidestep detection.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The threat actor has been observed deploying a SOCKS proxy on compromised servers to launch scans for internal reconnaissance and lateral movement using open-source tools like Fscan.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink uses three different programming languages: ZigLang for the implant, C for the plugins, and GoLang for the backend.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink supports compilation on demand for plugins, providing support for the different Linux distributions that might be targeted.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
The plugins allow for gathering information, lateral movement, and anti-forensics.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink comes fitted with a wide range of stealth mechanisms to hinder analysis, prevent its removal from the infected hosts, and even detect endpoint detection and response (EDR) solutions and devise an evasion strategy on the fly.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
VoidLink has an auditability feature and a role-based access control (RBAC) mechanism, which consists of three role levels: SuperAdmin, Operator, and Viewer.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
-
There are signs that there exists a main implant that has been compiled for Windows and can load plugins via a technique called DLL side-loading.
First reported: 13.02.2026 17:231 source, 1 articleShow sources
- UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors — thehackernews.com — 13.02.2026 17:23
Similar Happenings
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking and Malware Delivery
Cybersecurity researchers have uncovered a China-linked adversary-in-the-middle (AitM) framework called DKnife, active since at least 2019. The framework targets routers and edge devices to perform deep packet inspection, manipulate traffic, and deliver malware. It primarily targets Chinese-speaking users by harvesting credentials and delivering malware via popular Chinese services and applications. DKnife comprises seven Linux-based implants that enable a wide range of malicious activities, including DNS hijacking, binary download hijacking, and real-time user activity monitoring. The framework is linked to the Earth Minotaur threat activity cluster and shares infrastructural connections with WizardNet, a Windows implant deployed by TheWizards APT group. DKnife's infrastructure overlaps with a campaign delivering WizardNet, suggesting a shared development or operational lineage. The framework uses a component called yitiji.bin to create a bridged TAP interface on the router at the private IP address 10.3.3.3, allowing the threat actor to intercept and rewrite network packets in transit to the intended host. Additionally, DKnife monitors WeChat activities more analytically, tracking voice and video calls, text messages, images sent and received, and articles read on the platform.
Lotus Blossom Hacking Group Exploits Notepad++ Hosting Breach to Deploy Chrysalis Backdoor
The China-linked Lotus Blossom hacking group exploited a hosting provider breach to deliver a previously undocumented backdoor, Chrysalis, to Notepad++ users. The attack, which occurred between June and December 2025, involved hijacking update traffic and exploiting insufficient update verification controls in older versions of the software. The group used a multi-layered shellcode loader and integrated undocumented system calls to enhance stealth and resilience. The breach was discovered and mitigated in December 2025, with Notepad++ migrating to a new hosting provider and rotating all credentials. The Chrysalis backdoor is a feature-rich implant capable of gathering system information, executing commands, and maintaining persistence. It communicates with a command-and-control (C2) server to receive additional instructions. The C2 server is currently offline, but the malware's capabilities suggest ongoing development and adaptation by the threat actor.
China-Linked APTs Deploy PeckBirdy JScript C2 Framework Since 2023
China-aligned APT actors have been using the PeckBirdy JScript-based command-and-control (C2) framework since 2023 to target Chinese gambling industries, Asian government entities, and private organizations. The framework leverages living-off-the-land binaries (LOLBins) for execution across various environments. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, have been identified, each employing different tactics, including credential harvesting and malware delivery. The framework's flexibility allows it to operate across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET, using multiple communication methods like WebSocket and Adobe Flash ActiveX objects. Additional scripts for exploitation, social engineering, and backdoor delivery have been observed, along with links to known backdoors like HOLODONUT and MKDOOR. HOLODONUT disables security features such as AMSI before executing payloads in memory, while MKDOOR disguises its network traffic as legitimate Microsoft support or activation pages and attempts to evade Microsoft Defender by altering exclusion settings. Infrastructure overlaps and shared tooling suggest SHADOW-VOID-044 is linked with UNC3569, a China-aligned group previously associated with the GRAYRABBIT backdoor. Some samples used stolen code-signing certificates to legitimize malicious Cobalt Strike payloads, and SHADOW-EARTH-045 showed weaker but notable ties to activity previously attributed to Earth Baxia. The Shadow-Void-044 campaign used stolen code-signing certificates, Cobalt Strike payloads, and exploits, including CVE-2020-16040, to maintain persistent access. The Shadow-Earth-045 campaign targeted a Philippine educational institution in July 2024, using the GrayRabbit backdoor and the HoloDonut backdoor. The threat actor behind the Shadow-Earth campaign developed a .NET executable to launch PeckBirdy with ScriptControl.
AI-Driven 'Fifth Wave' of Cybercrime Expands with Dark LLMs and Deepfake Kits
Group-IB's report identifies a new 'fifth wave' of cybercrime, characterized by the widespread adoption of AI and generative AI (GenAI) tools. This wave, termed 'weaponized AI,' enables cheaper, faster, and more scalable cybercrime. Key developments include the proliferation of deepfake kits, AI-powered phishing kits, and proprietary 'dark LLMs' used for various malicious activities. The report highlights the increasing sophistication and accessibility of these tools, which are fueling a surge in cybercrime activities.
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes
China-nexus threat actor UAT-7290 has been targeting telecommunications providers in South Asia and Southeastern Europe since at least 2022. The group conducts extensive reconnaissance before deploying malware families like RushDrop, DriveSwitch, SilentRaid, and Bulbature. UAT-7290 also establishes Operational Relay Box (ORB) nodes, which other China-nexus actors may use, indicating a dual role in espionage and initial access provision. The group uses a mix of open-source malware, custom tooling, and 1-day vulnerabilities in edge networking products. Recent activity shows overlaps with RedLeaves, ShadowPad, and RedFoxtrot, suggesting a broader China-linked operation.