Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

928+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
NEWS

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

A newly discovered Linux implant called Quasar Linux RAT (QLNX) is silently targeting software developers to harvest credentials, log keystrokes, and enable post-compromise persistence — positioning attackers to stage downstream software supply chain attacks.

Dylan H.

News Desk

May 10, 2026
5 min read

Overview

Security researchers have identified a previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) that is specifically targeting software developers. Unlike opportunistic malware, QLNX is designed to quietly establish persistent footholds on developer workstations — machines with privileged access to source code repositories, CI/CD pipelines, package registries, and cloud infrastructure.

The discovery raises serious concerns about software supply chain integrity, as compromised developer credentials and environments can be weaponized to inject malicious code into widely distributed software packages.

What Is Quasar Linux RAT?

QLNX is a full-featured remote access trojan (RAT) built specifically for Linux systems. Its capabilities include:

  • Credential harvesting: Extracts stored credentials from SSH key files, .netrc, browser credential stores, AWS/GCP/Azure CLI configs, Docker credentials, and npm/PyPI tokens
  • Keylogging: Silently records all keystrokes including passwords, API keys, and two-factor authentication codes entered at the terminal
  • File manipulation: Reads, uploads, downloads, and modifies files on the compromised system
  • Clipboard monitoring: Captures clipboard contents, including copied API keys, tokens, and credentials
  • Network pivoting: Uses the compromised developer machine as a pivot point to reach internal corporate networks and infrastructure
  • Persistence: Establishes persistence via systemd units, cron jobs, and shell profile modifications

Why Developers Are the Target

Developer workstations are among the highest-value targets in modern threat landscapes. A single compromised developer machine can provide attackers with:

  • Source code access: Read and modify proprietary codebases, inject backdoors into future releases
  • Package registry credentials: Push malicious versions of npm, PyPI, RubyGems, or Maven packages to public registries
  • CI/CD pipeline access: Inject malicious steps into automated build and deployment pipelines
  • Cloud credentials: Pivot into AWS, Azure, or GCP environments with developer-level permissions
  • VPN and internal network access: Reach air-gapped internal systems inaccessible from the internet

This attack surface is precisely why supply chain attacks have become so prevalent — compromising one developer can cascade into thousands of downstream victims.

Infection Vector

QLNX is believed to be distributed through several channels:

  1. Trojanized developer tools: Modified versions of commonly used CLI utilities and development frameworks distributed via third-party repositories or phishing
  2. Malicious GitHub repositories: Fake or hijacked open-source projects that include the implant disguised as a library dependency
  3. Targeted phishing: Spear-phishing emails delivering fake security advisories or software update notifications that execute the implant on the victim's Linux system

Technical Details

QLNX operates with a multi-stage architecture:

  • Stage 1 (Dropper): A lightweight executable that checks for analysis environments, disables common monitoring tools if present, and downloads the main payload
  • Stage 2 (Core implant): A persistent daemon that communicates with a command-and-control (C2) server over encrypted channels, mimicking legitimate traffic patterns to evade network detection
  • Stage 3 (Post-compromise modules): On-demand modules for specific credential stores, lateral movement, and supply chain targeting

The implant uses encrypted communications and blends in with legitimate system processes to avoid detection by endpoint security tools.

Who Is at Risk?

Organizations with development teams using Linux workstations face the highest exposure, particularly:

  • Software companies and startups maintaining open-source or proprietary packages
  • DevOps and platform engineering teams with elevated cloud infrastructure access
  • Security tooling vendors whose products have broad deployment and trust relationships
  • Financial and fintech developers with access to payment or trading infrastructure

Recommended Mitigations

For Developers

  • Use hardware security keys for all code signing, SSH authentication, and package registry access — QLNX cannot steal private keys stored on hardware tokens
  • Enable commit signing with GPG keys stored on dedicated hardware devices
  • Review SSH known_hosts and authorized_keys for unauthorized entries
  • Audit cron jobs and systemd units for unexpected new entries
  • Use secrets managers (HashiCorp Vault, AWS Secrets Manager) instead of storing credentials in plaintext config files

For Security Teams

  • Deploy endpoint detection on Linux developer workstations — not just servers
  • Monitor for anomalous outbound connections from developer systems, especially to new or unexpected IP ranges
  • Audit package registry publish events for unexpected releases or version bumps
  • Enable CI/CD pipeline integrity verification — sign build artifacts and verify signatures downstream
  • Implement least-privilege access for developer cloud credentials; restrict IAM permissions to only what each developer needs

For Organizations

  • Establish software bill of materials (SBOM) practices to track all dependencies and quickly identify if a compromised upstream package enters your supply chain
  • Monitor public package registries for unauthorized new versions of packages you maintain or depend on
  • Adopt reproducible builds so that build outputs can be independently verified against source code

Supply Chain Implications

QLNX represents a growing class of threats that specifically target the human element of software supply chains. By compromising the developers who build and maintain critical software, attackers can achieve supply chain access without ever exploiting a vulnerability in the target software itself.

Organizations should treat developer workstation security as equivalent in priority to server security — the compromise of a single developer's Linux machine can have downstream effects on millions of end users.

References

  • The Hacker News — Quasar Linux RAT Steals Developer Credentials
  • CISA Software Supply Chain Security Guidance
  • NIST Secure Software Development Framework (SSDF)
#Supply Chain#Linux#Malware#Credential Theft#Remote Access Trojan

Related Articles

JDownloader Site Hacked to Replace Installers with Python RAT Malware

The official website for JDownloader, one of the most widely-used open-source download managers, was compromised to distribute malicious Windows and Linux installers. The Windows payload deploys a Python-based remote access trojan capable of full system compromise on victim machines.

6 min read

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Security researchers have uncovered a coordinated supply chain attack campaign dubbed 'mini Shai-H' targeting SAP-related npm packages, injecting...

4 min read

Claude Code Leak Used to Push Infostealer Malware on GitHub

Threat actors are capitalising on the Claude Code source code leak by creating fake GitHub repositories that impersonate the leaked source to deliver...

6 min read
Back to all News