Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Quasar Linux RAT Endangers Software Supply Chains

Quasar Linux RAT Endangers Software Supply Chains

Posted on May 8, 2026 By CWS

A newly identified malware, Quasar Linux RAT (QLNX), is actively targeting developer environments, posing a threat to software supply chains. The malware aims to infiltrate systems without detection, performing actions such as credential theft, keylogging, and network tunneling. Researchers from Trend Micro, Aliakbar Zahravi and Ahmed Mohamed Ibrahim, have detailed the malware’s capabilities, highlighting its focus on compromising developer and DevOps credentials.

Credential Harvesting Capabilities

Quasar Linux RAT is specifically designed to extract sensitive information from high-value files. This includes credentials stored in .npmrc, .pypirc, .git-credentials, and other critical configuration files used in development environments. Such access enables attackers to potentially distribute malicious packages on platforms like NPM or PyPI and infiltrate cloud infrastructure, posing severe risks to the integrity of software supply chains.

The malware’s credential theft is not limited to a single method; it systematically exploits various entry points to gain unauthorized access. By doing so, attackers can manipulate publishing pipelines, introducing compromised software versions that could have widespread negative consequences.

Stealth and Persistence Mechanisms

Operating stealthily, QLNX executes from memory, disguising itself as legitimate kernel threads to avoid detection. It profiles host systems to identify containerized environments and employs multiple strategies to establish persistence, including systemd, crontab, and .bashrc modifications. This ensures the malware remains active over extended periods, even after system reboots.

In addition, the malware utilizes a Pluggable Authentication Module (PAM) backdoor to capture plaintext credentials during authentication processes. It logs and transmits SSH session data to an external server, further broadening its reach and control over compromised systems.

Comprehensive Control and Concealment

Quasar Linux RAT is capable of executing 58 different commands, providing attackers with full control over victim systems. It maintains communication with a command-and-control (C2) server using various protocols, including raw TCP, HTTPS, and HTTP, facilitating ongoing interaction and data exfiltration.

The malware employs a two-tiered rootkit architecture, utilizing both userland and kernel-level components to hide its presence. By leveraging the Linux dynamic linker and eBPF subsystem, it conceals its operations from standard monitoring tools, ensuring that its activities remain undetected.

Trend Micro’s analysis underscores the sophisticated nature of QLNX, which integrates multiple attack techniques into a seamless workflow. This combination of stealth, persistence, and credential harvesting makes it a formidable threat to developers and software supply chains worldwide.

The Hacker News Tags:credential harvesting, credential theft, Cybersecurity, developer security, DevOps, Linux malware, malware analysis, network tunneling, Quasar Linux RAT, software supply chain, Trend Micro

Post navigation

Previous Post: New Threat: NWHStealer Uses Bun Loader and Encrypted C2
Next Post: Cyberattacks Target Polish Water Facilities in 2025

Related Posts

Detecting Data Leaks Before Disaster Detecting Data Leaks Before Disaster The Hacker News
Google Ordered to Pay 4M for Misusing Android Users’ Cellular Data Without Permission Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
Trusted Open Source Insights: AI and Security Trends Trusted Open Source Insights: AI and Security Trends The Hacker News
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control The Hacker News
South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News
Critical cPanel Flaw Exploited Against Government Networks Critical cPanel Flaw Exploited Against Government Networks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyberattacks Target Polish Water Facilities in 2025
  • Quasar Linux RAT Endangers Software Supply Chains
  • New Threat: NWHStealer Uses Bun Loader and Encrypted C2
  • Braintrust Urges API Key Changes Following Security Breach
  • Enterprise Security Gaps: Insights from 25 Million Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark