Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Tools
Tools
/
VoidLink

VoidLink

Tags
CloudMalwareEnumerationToolkitRootkit
Techniques
Credential theftResource enumerationContainer escape
Incidents
VoidLink: A Cloud-Native Linux Malware Framework
References
https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/
Last edited
Jan 15, 2026 12:44 PM

VoidLink represents a highly advanced, "cloud-first" malware framework discovered in late 2025, likely originating from Chinese-affiliated developers. Built using the Zig programming language, it is specifically engineered to compromise modern infrastructure, including AWS, GCP, Azure, and containerized environments like Kubernetes and Docker. The framework is distinguished by its extreme modularity, utilizing a custom Plugin API inspired by Cobalt Strike’s Beacon Object Files (BOF) to deploy over 30 specialized modules. Its primary objective appears to be stealthy, long-term persistence and data exfiltration, specifically targeting credentials from cloud providers and version control systems like Git.

The framework’s most striking feature is its Adaptive Stealth mechanism, which calculates an environmental risk score based on detected security products and adjusts its behavior to avoid detection. For instance, it can slow down port scans or change communication intervals to mimic normal network traffic. VoidLink further evades analysis through runtime code encryption, self-deletion if tampering is detected, and the deployment of varied rootkits (e.g., eBPF, LKM, or LD_PRELOAD) depending on the target's kernel version. With a functional C2 dashboard and a comprehensive suite of post-exploitation tools, VoidLink is a professionally developed ecosystem likely intended for high-stakes espionage or commercial offensive operations.