Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The hantavirus outbreak is not “another new coronavirus”

Quasar Linux RAT steals developer credentials in software supply chain compromise

What 25 million alerts reveal about low-severity risks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Quasar Linux RAT steals developer credentials in software supply chain compromise
Identity

Quasar Linux RAT steals developer credentials in software supply chain compromise

By May 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 8, 2026Linux/DevOps

The previously undocumented Linux implant, codenamed Quasar Linux RAT (QLNX), targets developers’ systems to not only establish a silent foothold, but also facilitate a wide range of post-compromise functions, including credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling.

“QLNX targets developers and DevOps credentials across the software supply chain,” Trend Micro researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahim said in a technical analysis of the malware.

“Its credential harvester extracts secrets from high-value files such as .npmrc (npm tokens), .pypirc (PyPI credentials), .git-credentials, .aws/credentials, .kube/config, .docker/config.json, .vault-token, Terraform credentials, GitHub CLI tokens, and .env. Once these assets are compromised, operators can download malicious packages to NPM Or it might be possible to push to a PyPI registry, access cloud infrastructure, or go through a CI/CD pipeline.”

This malware poses a significant risk to development environments due to its ability to systematically collect a wide range of credentials. An attacker who successfully deploys QLNX to a package administrator could gain unauthorized access to the publishing pipeline, allowing the attacker to push a malicious version, potentially causing cascading downstream effects.

QLNX runs fileless from memory, disguises itself as a kernel thread (such as kworker or ksoftirqd), can profile hosts to detect containerized environments, hide its tracks by erasing system logs, and configure persistence using over seven different methods, including systemd, crontab, and .bashrc shell injection.

It then receives commands that exfiltrate the collected data to attacker-controlled infrastructure, allowing it to execute shell commands, manage files, inject code into processes, take screenshots, log keystrokes, establish SOCKS proxies and TCP tunnels, execute beacon object files (BOFs), and even manage peer-to-peer (P2P) mesh networks.

Exactly how the malware is distributed is unknown. However, once a foothold is established, it enters a major operational phase by running a persistent loop that continually attempts to establish and maintain communication with the command and control (C2) server via raw TCP, HTTPS, and HTTP. QLNX supports a total of 58 different commands, giving operators complete control over compromised hosts.

QLNX also comes with a Pluggable Authentication Module (PAM) inline hook backdoor that intercepts cleartext credentials during authentication events, logs outbound SSH session data, and sends that data to a C2 server. The malware also supports a second PAM-based credential logger that is automatically loaded into all dynamically linked processes to extract service names, usernames, and authentication tokens.

It employs a two-layer rootkit architecture. Userland rootkits are deployed through the Linux dynamic linker’s LD_PRELOAD mechanism, ensuring that implant artifacts and processes remain hidden. There is also a kernel-level eBPF component that uses the BPF subsystem to hide processes, files, and network ports from standard userland tools such as ps, ls, and netstat when instructions are received from the C2 server.

“The QLNX implant was built for long-term stealth and credential theft,” Trend Micro said. “What makes this particularly dangerous is not a single feature, but how that functionality is chained into a consistent attack workflow: arrival, erasure from disk, persistence through six redundant mechanisms, concealment at both user space and kernel level, and most importantly, credential collection.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhat 25 million alerts reveal about low-severity risks
Next Article The hantavirus outbreak is not “another new coronavirus”

Related Posts

What 25 million alerts reveal about low-severity risks

May 8, 2026

New Linux PamDOORa backdoor uses PAM module to steal SSH credentials

May 8, 2026

Linux kernel dirty flag LPE exploit allows root access across major distributions

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The hantavirus outbreak is not “another new coronavirus”

Quasar Linux RAT steals developer credentials in software supply chain compromise

What 25 million alerts reveal about low-severity risks

PFAS destruction and eVTOL project wins first ERS grant from University of Toledo

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.