Sophisticated Quasar Linux RAT Campaign Targets Software Developers in Supply Chain Attacks

Cybersecurity researchers have uncovered a sophisticated Linux-based remote access trojan (RAT) known as Quasar Linux, or QLNX, that is actively targeting software developers and engineering environments. The malware is designed to steal credentials, maintain persistent remote access, and potentially facilitate larger supply chain attacks.

According to researchers, the malware demonstrates advanced persistence and evasion capabilities, allowing attackers to quietly maintain long-term access within compromised systems. Once installed, the RAT enables remote command execution, surveillance, credential theft, and exfiltration of sensitive development data, making developer environments a primary target.

The campaign appears closely linked to broader supply chain attack activity involving trojanized software installers and compromised developer ecosystems. Researchers recently connected related operations to malicious versions of Daemon Tools, where attackers injected backdoors into legitimate software distributed through official channels.

In the Daemon Tools campaign, attackers reportedly compromised signed binaries and used them to distribute malware globally across more than 100 countries. While thousands of systems received initial payloads, only a select number of high-value targets—including government, scientific, manufacturing, and retail organizations—received more advanced implants such as QUIC RAT and Quasar Linux components.

Security researchers believe the attackers used staged deployment techniques, first collecting system information at scale before selectively deploying advanced malware only to systems of strategic interest. This targeted approach suggests possible cyberespionage objectives rather than indiscriminate cybercrime.

The malware’s focus on developers is particularly concerning because compromised engineering environments can provide attackers with access to source code, signing keys, CI/CD pipelines, cloud infrastructure credentials, and software distribution channels. Such access can allow threat actors to weaponize trusted software updates and propagate attacks downstream across entire ecosystems.

The discovery highlights the growing sophistication of modern supply chain attacks, where attackers increasingly target software developers and trusted infrastructure to maximize reach while avoiding detection. Security experts are urging organizations to strengthen code-signing security, monitor developer environments closely, and implement stricter software supply chain protections.

 

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch