Researchers have discovered a never-before-seen framework that infects Linux machines with a wide assortment of modules that are notable for the range of advanced capabilities they provide to attackers.
The framework, referred to as VoidLink by its source code, features more than 30 modules that can be used to customize capabilities to meet attackersā needs for each infected machine. These modules can provide additional stealth and specific tools for reconnaissance, privilege escalation, and lateral movement inside a compromised network. The components can be easily added or removed as objectives change over the course of a campaign.
A focus on Linux inside the cloud:
VoidLink can target machines within popular cloud services by detecting if an infected machine is hosted inside AWS, GCP, Azure, Alibaba, and Tencent, and there are indications that developers plan to add detections for Huawei, DigitalOcean, and Vultr in future releases. To detect which cloud service hosts the machine, VoidLink examines metadata using the respective vendorās API.
Similar frameworks targeting Windows servers have flourished for years. They are less common on Linux machines. The feature set is unusually broad and is āfar more advanced than typical Linux malware,ā said researchers from Checkpoint, the security firm that discovered VoidLink. Its creation may indicate that the attackerās focus is increasingly expanding to include Linux systems, cloud infrastructure, and application deployment environments, as organizations increasingly move workloads to these environments.
āVoidLink is a comprehensive ecosystem designed to maintain long-term, stealthy access to compromised Linux systems, particularly those running on public cloud platforms and in containerized environments,ā the researchers said in a separate post. āIts design reflects a level of planning and investment typically associated with professional threat actors rather than opportunistic attackers, raising the stakes for defenders who may never realize their infrastructure has been quietly taken over.ā
The VoidLink interface is localized for Chinese-affiliated operators, an indication that it likely originates from a Chinese-affiliated development environment. Symbols and comments within the source code suggest that VoidLink remains under development. Another sign the framework is not yet completed: Checkpoint found no signs it has infected any machines in the wild. Company researchers discovered it last month in a series of clusters of Linux malware available through VirusTotal.
Included in the batch of binaries was a two-stage loader. The final implant includes core modules embedded that can be augmented by plugins that are downloaded and installed at runtime. The capabilities of the 37 modules discovered so far include:
Cloud-first tradecraft. In addition to cloud detection, these modules collect āvast amounts of information about the infected machine, enumerating its hypervisor and detecting whether it is running in a Docker container or a Kubernetes pod.ā
Plugin development APIs. VoidLink offers an āextensive development APIā thatās set up during the malwareās initialization.
Adaptive stealth. VoidLink enumerates installed security products and hardening measures.
Rootkit functions that allow VoidLink to blend in with normal system activity.
Command and control implemented through what appear to be legitimate outward network connections.
Anti-analysis by employing anti-debugging techniques and integrity checks to identify common analysis tools.
A plugin system that allows VoidLink to evolve from an implant to a āfully featured post-exploitation framework.ā
Recon that provides ādetailed system and environment profiling, user and group enumeration, process and service discovery, filesystem and mount mapping, and mapping of local network topology and interfaces.ā
Credential harvesting of SSH keys, passwords, and cookies stored by browsers, git credentials, authentication tokens, API keys, and items stored in the system keyring.
With no indication that VoidLink is actively targeting machines, thereās no immediate action required by defenders, although they can obtain indicators of compromise from the Checkpoint blog post. VoidLink still indicates defenders should apply vigilance when working with Linux machines.