New China Linked VoidLink Linux Malware Targets Major Cloud Providers – Hackread – Cybersecurity News, Data Breaches, AI, and More

New China Linked VoidLink Linux Malware Targets Major Cloud Providers – Hackread – Cybersecurity News, Data Breaches, AI, and More

In December 2025, cybersecurity experts at Check Point Research (CPR) discovered a sophisticated new toolkit called VoidLink. While most hackers target Windows, VoidLink is a cloud-first threat built specifically to live inside Linux-based cloud environments used by major corporations.

The research reveals that the developers, likely a Chinese-affiliated group, possess elite technical skills. They are proficient in languages like Zig, Go, C, and React, and they even created a professional web dashboard in Chinese to control their targets.

VoidLink is remarkably intelligent. Once it infects a system, it automatically checks if it is running on Amazon (AWS), Google Cloud, Microsoft Azure, Alibaba, or Tencent. There are even plans to expand this list to include DigitalOcean and Huawei.

Once inside, it acts as a digital spy. According to researchers, it hunts for credentials, essentially the secret keys used by software engineers, such as SSH keys and Git logins. It can also hide within containers like Docker and Kubernetes, which are the building blocks companies use to run their modern apps.

Advanced Stealth and Hiding

Researchers noted that VoidLink is a master of disguise. Depending on the version of Linux it finds, it chooses between three different hiding methods: LD_PRELOAD, eBPF, or LKM. To talk to its operators, it uses a custom protocol called VoidStream. This protocol camouflages stolen data, making it look like innocent website files, such as images (PNGs) or standard code (JS/CSS).

Further investigation revealed that the software is incredibly “modular,” featuring a 37-plugin system. This allows hackers to add new features on the fly, such as tools to wipe evidence or boost their own access levels.

VoidLink’s overview (Image via CPR)

Adaptive Defence Evasion

As we know it, most malware is static, but VoidLink uses adaptive stealth. It scans for security software and gives the environment a risk score. If the risk is high, it works more slowly to blend in. It can even form a mesh network with other infected computers to pass messages without connecting directly to the open internet.

Perhaps most impressively, if VoidLink detects a security expert trying to analyse it, it will self-delete to leave no evidence behind. While no real-world victims have been reported yet, researchers noted that the code is so polished and well-documented that it could even be intended for sale to other criminals. For now, experts urge companies to strengthen their cloud defences against this emerging threat.

(Photo by Growtika on Unsplash)





Source link