Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux Rootkit and macOS Crypto Stealer Dominate Headlines

Linux Rootkit and macOS Crypto Stealer Dominate Headlines

Posted on May 11, 2026 By CWS

The cybersecurity landscape remains tumultuous as new threats surface, targeting both Linux and macOS platforms. A notable highlight this week includes the discovery of a new Linux rootkit and a macOS crypto stealer, which continue to challenge digital defenses. As cyber threats evolve, understanding these vulnerabilities becomes crucial for organizations and individuals alike.

Linux Rootkit: A Persistent Threat

Recent reports have identified a new malware framework, dubbed Quasar Linux or QLNX, targeting Linux systems. This modular remote access trojan (RAT) is designed to compromise systems and maintain persistence through advanced evasion techniques. Its peer-to-peer mesh capability allows compromised hosts to communicate, complicating efforts to eliminate the threat. The QLNX framework integrates kernel-level rootkits and backdoors to evade detection and sustain unauthorized access.

Trend Micro highlights the advanced evasion, persistence, and data harvesting capabilities of QLNX, making it a formidable adversary. Its ability to mimic legitimate Linux services ensures it remains undetected, posing a significant risk to cloud infrastructures and supply chains.

macOS Crypto Stealer: An Emerging Concern

macOS systems are not immune, as new malware targeting cryptocurrency wallets has emerged. This threat actor employs social engineering tactics, luring victims into downloading malicious applications disguised as legitimate software. Once installed, the malware harvests sensitive data from cryptocurrency wallets.

Security analysts emphasize the importance of vigilance, especially as attackers refine their tactics. The rise in macOS-targeted threats underscores the need for robust security practices and awareness among users.

WebSocket Skimmers and Emerging Vulnerabilities

In addition to platform-specific threats, WebSocket skimmers have been identified as a growing concern. These backdoors inject credit card skimmers into compromised websites, redirecting stolen data to attacker-controlled domains. The obfuscation techniques employed by these skimmers complicate detection and mitigation efforts.

Organizations are urged to address vulnerabilities promptly, as attackers continue to exploit known security flaws to gain unauthorized access. Regular updates and patches are essential to safeguard against these persistent threats.

As the week concludes, cybersecurity professionals remain on high alert, navigating an ever-evolving threat landscape. The persistent challenges posed by these threats highlight the importance of proactive measures and continuous monitoring to safeguard digital assets. Stay informed and prepared to mitigate the risks of these sophisticated cyber threats.

The Hacker News Tags:Cybersecurity, DAEMON Tools attack, Ivanti EPMM, Linux rootkit, macOS crypto stealer, MuddyWater, Palo Alto PAN-OS, PCPJack, Quasar Linux RAT, WebSocket skimmers

Post navigation

Previous Post: Hackers Exploit JPEG Files to Spread Malware
Next Post: Google Identifies First AI-Created Zero-Day Exploit

Related Posts

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options The Hacker News
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers The Hacker News
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware The Hacker News
Securing AI to Benefit from AI Securing AI to Benefit from AI The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News
The Unusual Suspect: Git Repos The Unusual Suspect: Git Repos The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enhancing Security with Build Application Firewalls
  • ShinyHunters Breaches Canvas LMS via Free Accounts
  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark