Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux Quasar RAT Poses Threat to Developer Security

Linux Quasar RAT Poses Threat to Developer Security

Posted on May 6, 2026 By CWS

A newly discovered Linux backdoor, identified as Quasar Linux (QLNX), poses a significant threat to software developers by targeting their credentials, according to cybersecurity firm Trend Micro. This sophisticated Remote Access Trojan (RAT) employs a modular architecture, integrates multiple persistence and evasion techniques, includes a rootkit, and grants attackers remote access to compromised systems.

Objective of Credential Theft

Trend Micro highlights that QLNX is specifically designed to steal developer credentials, keys, and tokens. This access enables cybercriminals to infiltrate development tools, cloud services, and code repositories. The malware focuses on stealing credentials from platforms like AWS, Kubernetes, Docker Hub, and Git, as well as NPM and PyPI authentication tokens. Such access allows attackers to distribute malicious packages via legitimate developer accounts.

The deployment of QLNX against package maintainers is particularly concerning. Once inside, attackers can compromise the maintainer’s publishing pipeline, allowing them to insert trojans into software packages, introduce backdoors into build artifacts, or even shift into cloud-based production environments.

Advanced Evasion and Persistence Techniques

QLNX demonstrates advanced evasion tactics by executing in memory, spoofing process names, and self-deletion to avoid detection. It conducts system reconnaissance to identify containerized environments, conceals specific processes, ports, and files, and clears system logs to mask its activities.

The malware also employs a Pluggable Authentication Module (PAM) backdoor to gather credentials and extensive system information, including clipboard contents, SSH keys, and browser profiles. Two PAM backdoor implementations are utilized: one for capturing plaintext credentials and logging SSH data, and another for extracting authentication tokens dynamically.

Comprehensive Attack Capabilities

QLNX features a dual-layer rootkit setup, deploying userspace hooks via the LD_PRELOAD shared library for persistence and an eBPF rootkit controller for managing kernel-level BPF maps. This setup allows the malware to hide processes, files, and ports from standard user tools when directed by a command and control server.

For persistence, QLNX can use up to six methods, such as crontab entries, desktop entries, init scripts, service files, and shell lines. These multiple persistence strategies ensure the malware remains active on the system. The RAT supports 58 distinct commands, enabling attackers to perform actions like file manipulation, system reboots, URL openings, and SSH command executions on remote hosts.

In conclusion, the Quasar Linux RAT represents a highly coordinated threat, utilizing its numerous capabilities to achieve stealth and effective credential theft. This makes it a formidable foe in the realm of cybersecurity, particularly for developers and organizations involved in software supply chains.

Security Week News Tags:credential theft, Cybersecurity, developer credentials, Linux security, Malware, PAM backdoor, persistent malware, Quasar RAT, Rootkit, supply chain attack

Post navigation

Previous Post: CISA Urges Critical Infrastructure to Enhance Cybersecurity
Next Post: Critical API Flaw Risks DoD Contractor Data Exposure

Related Posts

Global Operation Halts Major Cryptocurrency Theft Schemes Global Operation Halts Major Cryptocurrency Theft Schemes Security Week News
Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Zero Trust Is 15 Years Old — Why Full Adoption Is Worth the Struggle Security Week News
Prime Security Raises  Million to Build Agentic Security Architect Prime Security Raises $20 Million to Build Agentic Security Architect Security Week News
Fake Claude Site Distributes RAT via Trojan Installer Fake Claude Site Distributes RAT via Trojan Installer Security Week News
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to  Million NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million Security Week News
Chinese APT Hacking Routers to Build Espionage Infrastructure Chinese APT Hacking Routers to Build Espionage Infrastructure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Romanian Extradited to US Over Decade-Old Cybercrime
  • Critical API Flaw Risks DoD Contractor Data Exposure
  • Linux Quasar RAT Poses Threat to Developer Security
  • CISA Urges Critical Infrastructure to Enhance Cybersecurity
  • CloudZ Malware Exploits Phone Link for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Romanian Extradited to US Over Decade-Old Cybercrime
  • Critical API Flaw Risks DoD Contractor Data Exposure
  • Linux Quasar RAT Poses Threat to Developer Security
  • CISA Urges Critical Infrastructure to Enhance Cybersecurity
  • CloudZ Malware Exploits Phone Link for Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark