Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials

PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials

Posted on May 8, 2026 By CWS

A newly identified backdoor, known as PamDOORa, poses an escalating threat to Linux systems by stealthily capturing SSH credentials. This dangerous malware exploits a critical component of the operating system, raising significant concerns among cybersecurity experts.

Emergence and Market Activity

PamDOORa first appeared on a Russian-speaking cybercrime forum called Rehub, where it was initially offered for sale at $1,600. The price was later reduced to $900, which sparked curiosity among researchers. This price drop may indicate a lack of buyer interest or a strategic decision to sell quickly.

The malware operates by infiltrating the Pluggable Authentication Module (PAM) framework, a crucial part of Linux systems responsible for managing login processes and identity verification. Unlike traditional malware, PamDOORa does not run as a visible process but integrates into the authentication layer, making it difficult to detect.

Technical Insights and Methodology

Researchers at Group-IB discovered that PamDOORa exploits the pam_exec module, a standard PAM component, to execute external commands during authentication. This method is not yet part of the MITRE ATT&CK framework, suggesting that many security teams may not be prepared to counter it.

The malware’s creator, operating under the alias “darkworm,” has demonstrated advanced knowledge of Linux systems. Code analysis indicates that the techniques used are consistent with known PAM exploitation methods, making the threat credible and sophisticated.

Operational Tactics and Concealment

PamDOORa is particularly concerning due to its ability to erase traces of unauthorized access by modifying authentication logs. It manipulates files such as lastlog, btmp, utmp, and wtmp, thereby obscuring any evidence of breach from incident responders.

Designed as a post-exploitation tool, PamDOORa requires root access to be installed. It injects a malicious PAM module, pam_linux.so, into the authentication stack, blending with legitimate system files to avoid detection. It ensures persistent SSH access using a specific TCP port and a secret “magic password.”

Detection Challenges and Security Recommendations

PamDOORa’s anti-forensic capabilities further complicate detection, as it actively removes attacker login traces from system logs. To mitigate the risk, security teams should assume that any compromised Linux server has exposed credentials.

Experts recommend enabling SELinux and AppArmor for enhanced process isolation, employing Auditd with DISA-STIG rules for monitoring system changes, and using tools like rkhunter to detect unauthorized software. Disabling root SSH login and restricting sudo access are crucial steps in minimizing PamDOORa’s attack potential.

Security teams must stay vigilant and consider these protective measures to safeguard against this emerging threat, ensuring robust defenses against similar future attacks.

Cyber Security News Tags:anti-forensics, Backdoor, cyber threat, Cybersecurity, Group-IB, Linux security, Malware, PAM framework, PamDOORa, SSH credentials

Post navigation

Previous Post: Škoda Online Shop Data Breach Exposes Customer Information
Next Post: Modular RAT Targets Southeast Asia with Credential Theft

Related Posts

Here’s How to Spot Them Early Here’s How to Spot Them Early Cyber Security News
Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News
Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Cyber Security News
Self-Propagating GlassWorm Weaponizing VS Code Extensions to Attack macOS Users Self-Propagating GlassWorm Weaponizing VS Code Extensions to Attack macOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Modular RAT Targets Southeast Asia with Credential Theft
  • PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials
  • Škoda Online Shop Data Breach Exposes Customer Information
  • New Brazilian Malware Targets Financial Platforms
  • Infostealer Uses GitHub for Covert Payload Distribution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Modular RAT Targets Southeast Asia with Credential Theft
  • PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials
  • Škoda Online Shop Data Breach Exposes Customer Information
  • New Brazilian Malware Targets Financial Platforms
  • Infostealer Uses GitHub for Covert Payload Distribution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark