Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

Posted on August 2, 2025August 2, 2025 By CWS

Aug 02, 2025Ravie LakshmananThreat Detection / SSH Safety
Cybersecurity researchers have flagged a beforehand undocumented Linux backdoor dubbed Plague that has managed to evade detection for a yr.
“The implant is constructed as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and achieve persistent SSH entry,” Nextron Methods researcher Pierre-Henri Pezier mentioned.
Pluggable Authentication Modules refers to a set of shared libraries used to handle person authentication to functions and companies in Linux and UNIX-based programs.
Provided that PAM modules are loaded into privileged authentication processes, a rogue PAM can allow theft of person credentials, bypass authentication checks, and stay undetected by safety instruments.

The cybersecurity firm mentioned it uncovered a number of Plague artifacts uploaded to VirusTotal since July 29, 2024, with none of them detected by antimalware engines as malicious. What’s extra, the presence of a number of samples alerts energetic improvement of the malware by the unknown menace actors behind it.
Plague boasts of 4 outstanding options: Static credentials to permit covert entry, resist evaluation and reverse engineering utilizing anti-debugging and string obfuscation; and enhanced stealth by erasing proof of an SSH session.
This, in flip, is achieved by unsetting surroundings variables similar to SSH_CONNECTION and SSH_CLIENT utilizing unsetenv, and redirecting HISTFILE to /dev/null to stop shell command logging, so as in any other case keep away from leaving an audit path.
“Plague integrates deeply into the authentication stack, survives system updates, and leaves virtually no forensic traces,” Pezier famous. “Mixed with layered obfuscation and surroundings tampering, this makes it exceptionally laborious to detect utilizing conventional instruments.”

The Hacker News Tags:Backdoor, Credential, Critical, Exposes, Linux, PAM, Plague, Silent, Systems, Theft

Post navigation

Previous Post: New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
Next Post: CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

Related Posts

Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The Hacker News
Mesh CSMA: Breaking Attack Paths to Sensitive Data Mesh CSMA: Breaking Attack Paths to Sensitive Data The Hacker News
Perseus Malware Targets Android Devices for Financial Fraud Perseus Malware Targets Android Devices for Financial Fraud The Hacker News
See Threats to Your Industry & Country in Real Time See Threats to Your Industry & Country in Real Time The Hacker News
ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens The Hacker News
CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark