Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAT-9921 Targets Tech and Finance with VoidLink Malware

UAT-9921 Targets Tech and Finance with VoidLink Malware

Posted on February 13, 2026 By CWS

A previously unidentified cyber threat group known as UAT-9921 is utilizing a novel modular malware framework dubbed VoidLink, aimed at compromising the technology and financial sectors. Cisco Talos researchers have uncovered these activities, highlighting the threat’s potential impact on cloud environments.

New Threat Actor Identified

According to reports from Cisco Talos, UAT-9921 has been active since 2019. However, VoidLink has not been consistently used throughout their operations. Researchers Nick Biasini, Aaron Boyd, Asheer Malhotra, and Vitor Ventura explain that the group exploits compromised hosts to establish VoidLink command-and-control (C2) servers, facilitating scanning operations both within and outside networks.

The VoidLink framework, first identified by Check Point in the previous month, is recognized for its extensive feature set. Written in the Zig programming language, it is designed for stealthy and prolonged access to Linux cloud systems, developed through spec-driven methodologies with language model assistance.

Technical Insights on VoidLink

Another analysis by Ontinue suggests that VoidLink’s emergence signals a new era where language model-generated implants, complete with kernel-level rootkits, simplify the creation of elusive malware. Talos believes UAT-9921 has knowledge of Chinese, inferred from the framework’s language, and notes the toolkit’s recent induction, though details on its operational division remain vague.

The operators have access to certain kernel module source codes and tools to interact with implants independently of the C2, hinting at their deep understanding of communication protocols. VoidLink functions post-compromise, allowing adversaries to evade detection, and employs a SOCKS proxy on affected servers for internal reconnaissance and lateral movements using open-source tools like Fscan.

VoidLink’s Advanced Capabilities

Since September 2025, there have been multiple VoidLink-related incidents, indicating earlier development than initially thought. The framework employs ZigLang for implants, C for plugins, and GoLang for backend operations, supporting various Linux distributions and enabling on-demand plugin compilation for gathering intelligence and countering forensic efforts.

VoidLink incorporates numerous stealth measures to hinder analysis, prevent removal from targets, and adapt to evade endpoint detection systems. Talos highlights that the C2 may supply implants with plugins to exploit known vulnerabilities or access specific databases, showcasing its adaptability and sophistication.

Another significant feature is its role-based access control system, comprising SuperAdmin, Operator, and Viewer roles, emphasizing oversight. The main implant, potentially compiled for Windows, can load plugins via DLL side-loading, positioning VoidLink as a versatile framework suitable for complex operations or even red team exercises.

As VoidLink continues to evolve, its capabilities and flexibility indicate its potential to become an even more formidable tool in cyber espionage and security testing.

The Hacker News Tags:cloud security, cyber espionage, Cybersecurity, financial services, Linux, LLM, Malware, Technology, UAT-9921, VoidLink

Post navigation

Previous Post: OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
Next Post: XWorm RAT Campaign Evades Detection with Excel Exploit

Related Posts

Trust Wallet Chrome Extension Breach Caused  Million Crypto Loss via Malicious Code Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code The Hacker News
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data The Hacker News
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks The Hacker News
RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware
  • OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
  • StealC Malware Targets Windows via Fake CAPTCHA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware
  • OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes
  • StealC Malware Targets Windows via Fake CAPTCHA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News