Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
The Hacker NewsArchived May 09, 2026✓ Full text saved
A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling. "QLNX targets developers and DevOps credentials across the software supply chain,"
Full text archived locally
✦ AI Summary· Claude Sonnet
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Ravie LakshmananMay 08, 2026Linux / DevOps
A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling.
"QLNX targets developers and DevOps credentials across the software supply chain," Trend Micro researchers Aliakbar Zahravi and Ahmed Mohamed Ibrahim said in a technical analysis of the malware.
"Its credential harvester extracts secrets from high-value files such as .npmrc (npm tokens), .pypirc (PyPI credentials), .git-credentials, .aws/credentials, .kube/config, .docker/config.json, .vault-token, Terraform credentials, GitHub CLI tokens, and .env files. The compromise of these assets could allow the operator to push malicious packages to NPM or PyPI registries, access cloud infrastructure, or pivot through CI/CD pipelines."
The malware's ability to systematically harvest a wide range of credentials poses a severe risk to developer environments. A threat actor who successfully deploys QLNX against a package maintainer gains unauthorized access to their publishing pipeline, allowing the attacker to push poisoned versions that can lead to cascading downstream impacts.
QLNX executes filelessly from memory, masquerades itself as a kernel thread (e.g., kworker or ksoftirqd), and is capable of profiling the host to detect containerized environments, wiping system logs to cover up the tracks, and setting up persistence using no less than seven different methods, including systemd, crontab, and .bashrc shell injection.
Furthermore, it exfiltrates the collected data to an attacker-controlled infrastructure, and receives commands that make it possible to execute shell commands, manage files, inject code into processes, take screenshots, log keystrokes, establish SOCKS proxies and TCP tunnels, run Beacon Object Files (BOFs), and even manage a peer-to-peer (P2P) mesh network.
Exactly how the malware is delivered is unclear. However, once a foothold is established, it enters a primary operational phase by running a persistent loop that continuously attempts to establish and maintain communication with the command-and-control (C2) server over raw TCP, HTTPS, and HTTP. In total, QLNX supports 58 distinct commands that give the operators complete control of the compromised host.
QLNX also comes with a Pluggable Authentication Module (PAM) inline-hook backdoor that intercepts plaintext credentials during authentication events, logs outbound SSH session data, and transmits the data to the C2 server. The malware also supports a second PAM-based credentials logger that's automatically loaded into every dynamically linked process to extract the service name, username, and authentication token.
It employs a two-tiered rootkit architecture: a userland rootkit deployed through the Linux dynamic linker's LD_PRELOAD mechanism to ensure that the implant's artifacts and processes stay hidden. There also exists a kernel-level eBPF component that uses BPF subsystem to conceal processes, files, and network ports from standard userland tools such as ps, ls, and netstat upon receiving instructions from the C2 server.
"The QLNX implant was built for long-term stealth and credential theft," Trend Micro said. "What makes it particularly dangerous is not any single feature, but how its capabilities chain together into a coherent attack workflow: arrive, erase from disk, persist through six redundant mechanisms, hide at both userspace and kernel level, and then harvest the credentials that matter most."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
Credential Harvesting, cybersecurity, DevOps, linux, Remote Access Trojan, rootkit, Supply Chain
⚡ Top Stories This Week
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE and More
Trellix Confirms Source Code Breach With Unauthorized Repository Access
The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
Day Zero Readiness: The Operational Gaps That Break Incident Response
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
2026: The Year of AI-Assisted Attacks
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
Load More ▼
⭐ Featured Resources
[Webinar] Learn How Autonomous Validation Keeps Pace With AI Attacks
[Demo] Stop Email Attacks and Protect Cloud Workspace Data Faster
[Demo] Discover How to Control Autonomous Identity Risks Effectively
[Guide] Get Practical AI SOC Insights to Improve Threat Detection