Alibaba Cloud, Tencent Cloud, AWS, Microsoft Azure, LangFlow and NVIDIA: VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave

Alibaba Cloud, Tencent Cloud, AWS, Microsoft Azure, LangFlow and NVIDIA: VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave

VoidLink Malware Framework Exposes Critical Gaps in Kubernetes and AI Workload Security

In December 2025, Check Point Research disclosed VoidLink, a sophisticated Linux malware framework designed to infiltrate cloud-native and AI workloads, marking a shift in how threat actors target modern infrastructure. Developed by the previously unknown advanced persistent threat (APT) group UAT-9921 active since at least 2019 VoidLink is purpose-built for stealthy, long-term persistence in containerized and Kubernetes environments, rather than repurposed from legacy Windows tooling.

The malware employs advanced evasion techniques, including rootkit-style tactics, in-memory execution, self-modifying code, and anti-analysis checks to remain fileless and undetectable by traditional security tools. It fingerprints its environment to identify major cloud providers (AWS, GCP, Azure, Alibaba, Tencent) and adapts its behavior based on whether it runs on bare metal, VMs, Docker containers, or Kubernetes pods. Once deployed typically via stolen credentials or exploited enterprise services like Java serialization flaws VoidLink harvests cloud metadata, credentials, and secrets, enabling command-and-control (C2), lateral movement, and internal reconnaissance.

Cisco Talos highlighted VoidLink’s compile-on-demand capability, describing it as a near-production-ready foundation for AI-enabled attack frameworks that dynamically generate tools for operators. The framework’s design, deemed "defense contractor-grade," underscores a broader trend: adversaries are increasingly focusing on Kubernetes, microservices, and AI workloads as primary attack surfaces.

Recent campaigns reflect this evolution. ShadowRay 2.0 and the TeamPCP worm have weaponized AI infrastructure, hijacking GPU clusters and Kubernetes environments to create self-propagating botnets using LLM-generated payloads and privileged DaemonSets. Meanwhile, container escape vulnerabilities like NVIDIAScape (CVE-2025-23266) demonstrated how minor Dockerfile misconfigurations could grant host-level root access, with researchers estimating exposure in over a third of cloud environments. The AI supply chain is also under siege, with threats ranging from LangFlow RCE enabling remote code execution and account takeovers to malicious Keras models executing arbitrary code when loaded from public repositories. Security researchers have identified nearly 100 poisoned machine-learning models on trusted platforms, revealing how even "safe" AI assets can conceal backdoors.

Industry data underscores the urgency: Red Hat reports that 90% of organizations experienced at least one Kubernetes security incident in the past year, while container-based lateral movement in Kubernetes environments surged in 2025. VoidLink’s evasion tactics encrypting code, operating in memory, and tampering with user-space observability exploit a critical blind spot in many security programs. Traditional detection methods, reliant on user-space agents and log-based monitoring, struggle to counter threats designed to bypass them.

To address this gap, runtime security solutions like Hypershield developed by Isovalent (now part of Cisco) leverage eBPF to provide kernel-level observability and enforcement. By deploying eBPF programs in the Linux kernel, Hypershield monitors process execution, syscalls, file access, and network activity in real time, mapping events to Kubernetes namespaces, pods, and workload identities. Cisco’s analysis demonstrates how Hypershield can track and mitigate VoidLink across its kill chain, circumventing the malware’s evasion tactics by detecting behavior directly at the kernel level.

The rise of VoidLink and similar threats such as AI-driven botnets and supply chain exploits highlights a stark reality: many organizations lack visibility and control within Kubernetes environments, where AI models and core business workloads operate. While investments in endpoint, identity, and cloud monitoring have grown, they have not kept pace with the shift to workload-centric security. Integrating kernel-level runtime telemetry into SOC workflows is now critical to detecting and containing these attacks in real time. Cisco’s approach combines Hypershield’s eBPF-based enforcement with platforms like Splunk to correlate workload signals with broader security operations, offering a model for defending against cloud-native, AI-aware threats.

Source: https://gbhackers.com/voidlink-malware-framework/

Kubert cybersecurity rating report: https://www.rankiteo.com/company/kubertai

NVIDIA cybersecurity rating report: https://www.rankiteo.com/company/nvidia

Tencent Cloud cybersecurity rating report: https://www.rankiteo.com/company/tencent-cloud

Alibaba Cloud Global cybersecurity rating report: https://www.rankiteo.com/company/alibabacloudglobal

Amazon Web Services (AWS) cybersecurity rating report: https://www.rankiteo.com/company/amazon-web-services

Microsoft Security cybersecurity rating report: https://www.rankiteo.com/company/microsoft-security

"id": "KUBNVITENALIAMAMIC1772627215",
"linkid": "kubertai, nvidia, tencent-cloud, alibabacloudglobal, amazon-web-services, microsoft-security",
"type": "Cyber Attack",
"date": "12/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': ['Cloud services', 'AI/ML', 'Technology'],
                        'type': 'Organizations using Kubernetes and AI '
                                'workloads'}],
 'attack_vector': ['Stolen credentials',
                   'Exploited enterprise services (e.g., Java serialization '
                   'flaws)'],
 'data_breach': {'data_encryption': 'Malware uses encryption for evasion',
                 'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Cloud metadata',
                                              'Credentials',
                                              'Secrets']},
 'date_detected': '2025-12',
 'date_publicly_disclosed': '2025-12',
 'description': 'In December 2025, Check Point Research disclosed *VoidLink*, '
                'a sophisticated Linux malware framework designed to '
                'infiltrate cloud-native and AI workloads, marking a shift in '
                'how threat actors target modern infrastructure. Developed by '
                'the previously unknown advanced persistent threat (APT) group '
                '*UAT-9921*, VoidLink is purpose-built for stealthy, long-term '
                'persistence in containerized and Kubernetes environments. The '
                'malware employs advanced evasion techniques, including '
                'rootkit-style tactics, in-memory execution, self-modifying '
                'code, and anti-analysis checks to remain fileless and '
                'undetectable by traditional security tools. It fingerprints '
                'its environment to identify major cloud providers (AWS, GCP, '
                'Azure, Alibaba, Tencent) and adapts its behavior based on the '
                'deployment context. VoidLink harvests cloud metadata, '
                'credentials, and secrets, enabling command-and-control (C2), '
                'lateral movement, and internal reconnaissance. Recent '
                'campaigns like *ShadowRay 2.0* and the *TeamPCP worm* have '
                'weaponized AI infrastructure, hijacking GPU clusters and '
                'Kubernetes environments to create self-propagating botnets '
                'using LLM-generated payloads.',
 'impact': {'data_compromised': ['Cloud metadata', 'Credentials', 'Secrets'],
            'operational_impact': 'Lateral movement, internal reconnaissance, '
                                  'and command-and-control (C2) operations',
            'systems_affected': ['Kubernetes environments',
                                 'Containerized workloads',
                                 'AI workloads',
                                 'GPU clusters']},
 'investigation_status': 'Disclosed',
 'lessons_learned': 'Traditional detection methods (user-space agents, '
                    'log-based monitoring) are insufficient against threats '
                    'like VoidLink. Kernel-level runtime security (e.g., eBPF) '
                    'is critical for detecting and mitigating cloud-native and '
                    'AI-aware threats. Organizations lack visibility and '
                    'control in Kubernetes environments, where AI models and '
                    'core business workloads operate.',
 'post_incident_analysis': {'corrective_actions': ['Deploy eBPF-based runtime '
                                                   'security solutions (e.g., '
                                                   'Hypershield)',
                                                   'Enhance monitoring of '
                                                   'Kubernetes and AI '
                                                   'workloads',
                                                   'Improve vetting of AI '
                                                   'models and cloud '
                                                   'configurations'],
                            'root_causes': ['Lack of kernel-level visibility '
                                            'in Kubernetes environments',
                                            'Over-reliance on user-space '
                                            'agents and log-based monitoring',
                                            'Exploitation of container escape '
                                            'vulnerabilities and AI supply '
                                            'chain threats']},
 'recommendations': ['Integrate kernel-level runtime telemetry (e.g., eBPF) '
                     'into SOC workflows for real-time detection and '
                     'enforcement.',
                     'Adopt runtime security solutions like Hypershield to '
                     'monitor process execution, syscalls, file access, and '
                     'network activity at the kernel level.',
                     'Correlate workload signals with broader security '
                     'operations (e.g., Splunk) to defend against cloud-native '
                     'threats.',
                     'Address Kubernetes security gaps, as 90% of '
                     'organizations experienced at least one incident in the '
                     'past year.',
                     'Secure AI supply chains by vetting machine-learning '
                     'models from public repositories for backdoors.'],
 'references': [{'source': 'Check Point Research'},
                {'source': 'Cisco Talos'},
                {'source': 'Red Hat'}],
 'response': {'enhanced_monitoring': 'Kernel-level runtime telemetry (e.g., '
                                     'Hypershield using eBPF)',
              'third_party_assistance': 'Check Point Research, Cisco Talos'},
 'threat_actor': 'UAT-9921 (APT group)',
 'title': 'VoidLink Malware Framework Exposes Critical Gaps in Kubernetes and '
          'AI Workload Security',
 'type': 'Malware Framework',
 'vulnerability_exploited': ['Container escape vulnerabilities (e.g., '
                             'CVE-2025-23266)',
                             'AI supply chain threats (e.g., LangFlow RCE)',
                             'Poisoned machine-learning models']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.