New Chinese Linux Malware VoidLink Raises Alarms Among Experts

Check Point reveals a sophisticated Linux malware framework with extensive capabilities for potential cyber-espionage.

New Chinese Linux Malware VoidLink Raises Alarms Among Experts
Andrew Wallace

Andrew Wallace

Professional Tech Editor

Focuses on professional-grade hardware, software, and enterprise solutions.

  • Check Point Research discovers an advanced Linux malware framework with over 30 plugins
  • VoidLink targets cloud environments, harvesting credentials and adapting to AWS, Azure, GCP, and more
  • No active abuse yet; suspected Chinese state-linked development for espionage and persistent access

Check Point Research (CPR) has identified a previously unknown and advanced Linux malware framework named VoidLink.

In a detailed report, CPR expresses concern over VoidLink, which functions as a complete command-and-control (C2) platform featuring loaders, implants, rootkits, and more than 30 modular plugins.

These capabilities are designed to provide attackers with stealthy, persistent, and long-term control over compromised systems, with development ongoing as recently as late 2025.

Hackers Preparing for Something?

VoidLink is primarily a cloud-based solution, according to CPR. Upon deployment, the malware analyzes its environment to determine if it operates on AWS, Azure, GCP, Alibaba, or Tencent Cloud, and whether it resides within Docker containers or Kubernetes pods.

It subsequently adjusts its behavior, collecting cloud metadata, API credentials, Git credentials, tokens, and secrets. This suggests that DevOps engineers and cloud administrators are likely targets.

VoidLink also exhibits extreme stealth. It profiles the host system, identifies security tools, and calculates a risk score to determine its operational aggressiveness. Depending on the security measures in place, it may scan ports and network communications, or refrain from doing so.

Currently, there is no evidence of the framework being exploited in the wild, CPR notes. This could imply that the developers are either finalizing the solution for future sale or rental, or they are developing it for a specific, high-paying client.

Notably, the developers are believed to be Chinese and likely state-affiliated. If true, this suggests that the framework is being crafted with cyber-espionage, data theft, and persistent access in mind.

"The extensive features and modular design indicate that the authors aimed to create a sophisticated, modern, and feature-rich framework," concluded Check Point researchers.

React to this story

Related Posts