Alert: QLNX Linux Malware Harvests Developer Credentials for Software Supply Chain Attacks
Breaking: New Linux Implant QLNX Targets Developers
A previously undocumented Linux remote access trojan (RAT) named Quasar Linux RAT (QLNX) is actively targeting developer systems to steal credentials and execute supply chain compromises, cybersecurity researchers warned today.

The malware establishes a silent foothold on compromised machines, enabling a suite of post-exploitation features including credential harvesting, keylogging, file manipulation, clipboard monitoring, and network tunneling.
“QLNX targets developers and DevOps credentials across the software supply chain,” the researchers said in an advisory shared with journalists.
Core Threat: Developer Credentials as Entry Point
Attackers use QLNX to extract login credentials for code repositories, cloud platforms, and continuous integration pipelines. Once stolen, these credentials can be used to inject malicious code into trusted software updates.
The implant is designed to run silently on Linux systems, making detection difficult for standard antivirus tools. Researchers emphasize that the RAT prioritizes stealth over aggressive propagation.
Background: The Growing Supply Chain Risk
Software supply chain attacks have become a top cybersecurity concern after incidents like SolarWinds and Codecov. These attacks compromise trusted software by infecting the development tools or processes that produce it.
Linux is a dominant platform in development environments, particularly for cloud and containerized workloads. Targeting Linux developers gives attackers access to a wide range of downstream users.
QLNX is believed to be a Linux variant of the Windows-based Quasar RAT, which has been used for years in targeted cyberespionage campaigns. The Linux version indicates an escalation in cross-platform targeting.
What This Means for Organizations
Organizations must urgently review access controls for developer workstations and enforce multi-factor authentication (MFA) on all code repositories. Security teams should monitor for unusual process activity on Linux systems, especially clipboard and keystroke logs.

The credential theft capability of QLNX could allow attackers to move laterally from a single developer’s machine into production environments. This makes early detection critical.
Developers and DevOps engineers are advised to use dedicated, isolated build machines and avoid running development tools with elevated privileges. Researcher warnings underline the need for zero-trust architecture in software supply chains.
Technical Details: Capabilities and Indicators of Compromise
QLNX communicates over encrypted channels to a command-and-control (C2) server. It can download additional payloads, execute arbitrary commands, and exfiltrate files at the attacker’s direction.
Keylogging and clipboard monitoring are specifically aimed at capturing passwords, SSH keys, and API tokens. Network tunneling allows the adversary to pivot through the compromised system into internal networks.
Current indicators include unusual outbound connections to unknown IPs on uncommon ports, and unexpected file modifications in developer directories. Researchers are sharing YARA rules with priority threat intelligence partners.
Response and Mitigation
Security vendors are updating their detection signatures. The researchers recommend that organizations immediately scan for QLNX using available indicators and isolate any affected systems.
Long-term defenses include implementing strict application whitelisting, auditing all developer accounts for unauthorized access, and employing endpoint detection and response (EDR) solutions on Linux endpoints.
This is a developing story. Further details about attribution and infection vectors are expected in the coming weeks.
Related Articles
- How Meta's AI-Powered Agents Supercharge Hyperscale Efficiency
- Fedora KDE Plasma Desktop 44 Launches with Plasma 6.6 and Major Usability Upgrades
- 10 Key Highlights of Fedora Asahi Remix 44 for Apple Silicon Macs
- How to Apply Critical Security Patches Across Major Linux Distributions
- gThumb 4.0 Alpha: A Modernized Image Viewer and Organizer with GTK4 and Libadwaita
- Weekly Security Patch Roundup: Major Linux Distributions Fix Critical Flaws
- The Quasar Linux RAT: 7 Critical Facts Developers Must Know About This Silent Credential Thief
- Upgrading Fedora Silverblue to Version 44: A Step-by-Step Question & Answer Guide