Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAT-9921 Targets Tech and Finance with VoidLink Malware

UAT-9921 Targets Tech and Finance with VoidLink Malware

Posted on February 13, 2026 By CWS

A previously unidentified cyber threat group known as UAT-9921 is utilizing a novel modular malware framework dubbed VoidLink, aimed at compromising the technology and financial sectors. Cisco Talos researchers have uncovered these activities, highlighting the threat’s potential impact on cloud environments.

New Threat Actor Identified

According to reports from Cisco Talos, UAT-9921 has been active since 2019. However, VoidLink has not been consistently used throughout their operations. Researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura explain that the group exploits compromised hosts to establish VoidLink command-and-control (C2) servers, facilitating scanning operations both within and outside networks.

The VoidLink framework, first identified by Check Point in the previous month, is recognized for its extensive feature set. Written in the Zig programming language, it is designed for stealthy and prolonged access to Linux cloud systems, developed through spec-driven methodologies with language model assistance.

Technical Insights on VoidLink

Another analysis by Ontinue suggests that VoidLink’s emergence signals a new era where language model-generated implants, complete with kernel-level rootkits, simplify the creation of elusive malware. Talos believes UAT-9921 has knowledge of Chinese, inferred from the framework’s language, and notes the toolkit’s recent induction, though details on its operational division remain vague.

The operators have access to certain kernel module source codes and tools to interact with implants independently of the C2, hinting at their deep understanding of communication protocols. VoidLink functions post-compromise, allowing adversaries to evade detection, and employs a SOCKS proxy on affected servers for internal reconnaissance and lateral movements using open-source tools like Fscan.

VoidLink’s Advanced Capabilities

Since September 2025, there have been multiple VoidLink-related incidents, indicating earlier development than initially thought. The framework employs ZigLang for implants, C for plugins, and GoLang for backend operations, supporting various Linux distributions and enabling on-demand plugin compilation for gathering intelligence and countering forensic efforts.

VoidLink incorporates numerous stealth measures to hinder analysis, prevent removal from targets, and adapt to evade endpoint detection systems. Talos highlights that the C2 may supply implants with plugins to exploit known vulnerabilities or access specific databases, showcasing its adaptability and sophistication.

Another significant feature is its role-based access control system, comprising SuperAdmin, Operator, and Viewer roles, emphasizing oversight. The main implant, potentially compiled for Windows, can load plugins via DLL side-loading, positioning VoidLink as a versatile framework suitable for complex operations or even red team exercises.

As VoidLink continues to evolve, its capabilities and flexibility indicate its potential to become an even more formidable tool in cyber espionage and security testing.

The Hacker News Tags:cloud security, cyber espionage, Cybersecurity, financial services, Linux, LLM, Malware, Technology, UAT-9921, VoidLink

Post navigation

Previous Post: OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
Next Post: XWorm RAT Campaign Evades Detection with Excel Exploit

Related Posts

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News
Fortinet Updates Fix Major SQL Injection Vulnerability Fortinet Updates Fix Major SQL Injection Vulnerability The Hacker News
DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks The Hacker News
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) The Hacker News
Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool The Hacker News
Impact of Cloud Outages on Digital Infrastructure Impact of Cloud Outages on Digital Infrastructure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BlankGrabber Stealer Conceals Malware with Fake Certificates
  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BlankGrabber Stealer Conceals Malware with Fake Certificates
  • Critical Vulnerability in Open VSX Exposes Users to Risk
  • TA446 Hackers Unleash DarkSword Kit on iOS Devices
  • Rundll32 and WebDAV: New ClickFix Variant Evades Detection
  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark