Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

A graduate student at Stanford University has created an algorithm to help classmates find love. Now, Date Drop is the foundation of his new startup

Dutch mobile phone giant Odid announces millions of customers affected by data breach

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UAT-9921 Deploys VoidLink malware targeting technology and financial sectors
Identity

UAT-9921 Deploys VoidLink malware targeting technology and financial sectors

userBy userFebruary 13, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 13, 2026Cloud security/cyber espionage

According to Cisco Talos findings, an unknown threat actor previously tracked as UAT-9921 was observed leveraging a new modular framework called VoidLink in campaigns targeting the technology and financial services sectors.

“This threat actor appears to have been active since 2019, but has not necessarily been using VoidLink during this period,” said researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura. “UAT-9921 is used to install VoidLink command and control (C2) using compromised hosts and initiate scanning activity both inside and outside the network.”

VoidLink was first documented by Check Point last month, describing it as a feature-rich malware framework written in Zig designed for long-term, stealth access to Linux-based cloud environments. This is credited to the work of a single developer who fleshed out the internals based on a paradigm called specification-driven development, with the help of large-scale language models (LLM).

In a separate analysis published earlier this week, Ontinue noted that the emergence of VoidLink presents new concerns that kernel-level rootkits and feature-packed LLM-generated implants targeting cloud environments could further lower the skill barrier required to generate hard-to-detect malware.

Considering the language of the framework, UAT-9921 is believed to have knowledge of Chinese, and the toolkit appears to be a recent addition, according to Talos. It is believed that development was carried out by multiple teams, but the scope of the boundary between development and actual operation remains unclear.

“Operators who have deployed VoidLink will have access to some source code. [kernel] “It contains a module and some tools to interact with the implant without C2,” the researchers said, “which indicates inside knowledge about the implant’s communication protocol.”

VoidLink was introduced as a post-compromise tool to help attackers evade detection. Threat actors have also been observed deploying SOCKS proxies on compromised servers to initiate internal reconnaissance and lateral movement scans using open source tools such as Fscan.

The cybersecurity firm said it is aware of multiple VoidLink-related victims dating back to September 2025, suggesting work on the malware may have begun much earlier than the November 2025 timeline compiled by Check Point.

VoidLink uses three different programming languages. ZigLang for the implant, C for the plugin, and GoLang for the backend. It supports on-demand compilation of plugins and supports a variety of potentially targeted Linux distributions. Plugins enable information collection, lateral movement, and forensics.

The framework is also equipped with a wide range of stealth mechanisms to thwart analysis and prevent removal from infected hosts, and even detect endpoint detection and response (EDR) solutions to devise evasion strategies on the fly.

“C2 provides a plug-in to the implant that allows operators to read exploits for known vulnerabilities in specific databases or that happen to reside on internal web servers,” Talos said.

“The C2 doesn’t necessarily need all of these tools available; there could be an agent that does the research and prepares the tools for the operator to use. With the current VoidLink compile-on-demand capabilities, integrating such functionality is not complicated. Keep in mind that all of this happens while the operator continues to explore the environment.”

Another feature of VoidLink is its auditability and the presence of a role-based access control (RBAC) mechanism that consists of three role levels: SuperAdmin, Operator, and Viewer. This suggests that the framework’s developers had monitoring in mind when designing it, raising the possibility that this activity was part of a red team exercise.

Additionally, there are indications that there is a main implant that is compiled for Windows and can load plugins via a technique called DLL sideloading.

“This is a proof of concept that is almost production-ready,” Talos said. “VoidLink is poised to become an even more powerful framework based on its functionality and flexibility.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBringing Finland to the forefront of the clean hydrogen economy
Next Article Dutch mobile phone giant Odid announces millions of customers affected by data breach
user
  • Website

Related Posts

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

February 13, 2026

Malicious Chrome extension discovered to be stealing business data, email, and browsing history

February 13, 2026

npm updates and considerations to strengthen your supply chain

February 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

A graduate student at Stanford University has created an algorithm to help classmates find love. Now, Date Drop is the foundation of his new startup

Dutch mobile phone giant Odid announces millions of customers affected by data breach

UAT-9921 Deploys VoidLink malware targeting technology and financial sectors

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.