Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
    Cybersecurity

    UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    adminBy adminFebruary 14, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 13, 2026Cloud Security / Cyber Espionage

    A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings from Cisco Talos.

    “This threat actor seems to have been active since 2019, although they have not necessarily used VoidLink over the duration of their activity,” researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura said. “UAT-9921 uses compromised hosts to install VoidLink command-and-control (C2), which are then used to launch scanning activities both internal and external to the network.”

    VoidLink was first documented by Check Point last month, describing it as a feature-rich malware framework written in Zig designed for long-term, stealthy access to Linux-based cloud environments. It’s assessed to be the work of a single developer with assistance from a large language model (LLM) to flesh out its internals based on a paradigm called spec-driven development.

    In another analysis published earlier this week, Ontinue pointed out that the emergence of VoidLink presents a new concern where LLM-generated implants, packed with kernel-level rootkits and features to target cloud environments, can further lower the skill barrier required to produce hard-to-detect malware.

    Per Talos, UAT-9921 is believed to possess knowledge of the Chinese language, given the language of the framework, and the toolkit appears to be a recent addition. It is also believed that the development was split across teams, although the extent of the demarcation between development and the actual operations remains unclear.

    “The operators deploying VoidLink have access to the source code of some [kernel] modules and some tools to interact with the implants without the C2,” the researchers noted. “This indicates inner knowledge of the communication protocols of the implants.”

    VoidLink is deployed as a post-compromise tool, allowing the adversary to sidestep detection. The threat actor has also been observed deploying a SOCKS proxy on compromised servers to launch scans for internal reconnaissance and lateral movement using open-source tools like Fscan.

    The cybersecurity company said it’s aware of multiple VoidLink-related victims dating back to September 2025, indicating that work on the malware may have commenced much earlier than the November 2025 timeline pieced together by Check Point.

    VoidLink uses three different programming languages: ZigLang for the implant, C for the plugins, and GoLang for the backend. It supports compilation on demand for plugins, providing support for the different Linux distributions that might be targeted. The plugins allow for gathering information, lateral movement, and anti-forensics.

    The framework also comes fitted with a wide range of stealth mechanisms to hinder analysis, prevent its removal from the infected hosts, and even detect endpoint detection and response (EDR) solutions and devise an evasion strategy on the fly.

    “The C2 will provide that implant with a plugin to read a specific database the operator has found or an exploit for a known vulnerability, which just happens to be on an internal web server,” Talos said.

    “The C2 doesn’t necessarily need to have all these tools available — it may have an agent that will do its research and prepare the tool for the operator to use. With the current VoidLink compile-on-demand capability, integrating such a feature should not be complex. Keep in mind that all of this will happen while the operator continues to explore the environment.”

    Another defining trait of VoidLink is its auditability and the existence of a role-based access control (RBAC) mechanism, which consists of three role levels: SuperAdmin, Operator, and Viewer. This suggests that the developers of the framework kept oversight in mind when designing it, raising the possibility that the activity may be part of red team exercises.

    What’s more, there are signs that there exists a main implant that has been compiled for Windows and can load plugins via a technique called DLL side-loading.

    “This is a near-production-ready proof of concept,” Talos said. “VoidLink is positioned to become an even more powerful framework based on its capabilities and flexibility.”

    Deploys Financial Malware Sectors Target Technology UAT9921 VoidLink
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Ads adds ROAS-based tool for valuing new customers
    Next Article Gboard might turn your keyboard into a trackpad with new cursor mode
    admin
    • Website

    Related Posts

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,402)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,679)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    eSIM was supposed to replace SIM cards, but carriers turned it into a trap

    April 19, 2026
    Most Popular
    • Here’s How Netflix Plans to Add TikTok-Style Videos to Its Mobile App
    • Social media bans might steer kids into riskier corners of the internet
    • eSIM was supposed to replace SIM cards, but carriers turned it into a trap
    • Vercel confirms breach as hackers claim to be selling stolen data
    • I used a simple Linux command to watch what apps do to my files in real time
    • Google TV Home (Android TV) 1.0.900391771 APK Download by Google LLC
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.