A newly discovered Linux malware called QLNX is targeting developers and DevOps environments to steal sensitive credentials. Security researchers from Trend Micro say this malware is specially designed for supply chain attacks. Instead of directly attacking users, it focuses on developers’ systems because they often store important secrets like GitHub tokens, cloud credentials, npm and PyPI publishing keys. If attackers gain access to these accounts, they can secretly inject malicious code into trusted software packages used by millions of people. QLNX is a highly advanced Remote Access Trojan (RAT) that mainly targets Linux systems. It uses stealth techniques such as rootkits to hide its files, processes, and network activity from security tools. The malware can collect SSH keys, browser passwords, cloud credentials, Kubernetes configurations, Docker settings, and developer tokens. It also installs hidden authentication backdoors that capture usernames and passwords during login attempts. Once infected, the attacker gains long-term remote access to the victim’s system. The malware communicates with its command-and-control server using encrypted connections and can even create a peer-to-peer network between infected machines to avoid detection. QLNX is dangerous because it can compromise entire software supply chains. Attackers can hijack developer accounts, publish malicious software updates, modify cloud environments, or gain access to private repositories. Since the malware has low detection rates, it can remain hidden for a long time. Organizations should carefully monitor Linux systems used for software development and check for suspicious changes in system files, hidden services, or unusual GCC compiler activity. Developers should also secure credentials, use multi-factor authentication (MFA), and regularly audit cloud and DevOps environments. This incident highlights the growing importance of protecting developer workstations, as they are now major targets for modern cyberattacks.
Cybercriminals are using a signed Logitech installer to distribute a new Brazilian banking trojan known as TCLBANKER. The malware mainly targets users in Brazil and monitors dozens...
A newly disclosed Linux kernel vulnerability named “Dirty Frag” has raised serious security concerns due to its ability to enable local privilege escalation (LPE) attacks on af...
Threat actors have successfully executed a sophisticated prompt injection attack targeting AI-powered Web3 agents, resulting in the unauthorized transfer of nearly $200,000 in cryp...