By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
Tech News

New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

By Viral Trending Content 2 Min Read
Share
SHARE

Aug 02, 2025Ravie LakshmananThreat Detection / SSH Security

Linux Malware

Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection for a year.

“The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access,” Nextron Systems researcher Pierre-Henri Pezier said.

Pluggable Authentication Modules refers to a suite of shared libraries used to manage user authentication to applications and services in Linux and UNIX-based systems.

Given that PAM modules are loaded into privileged authentication processes, a rogue PAM can enable theft of user credentials, bypass authentication checks, and remain undetected by security tools.

Identity Security Risk Assessment

The cybersecurity company said it uncovered multiple Plague artifacts uploaded to VirusTotal since July 29, 2024, with none of them detected by antimalware engines as malicious. What’s more, the presence of several samples signals active development of the malware by the unknown threat actors behind it.

Plague boasts of four prominent features: Static credentials to allow covert access, resist analysis and reverse engineering using anti-debugging and string obfuscation; and enhanced stealth by erasing evidence of an SSH session.

This, in turn, is accomplished by unsetting environment variables such as SSH_CONNECTION and SSH_CLIENT using unsetenv, and redirecting HISTFILE to /dev/null to prevent shell command logging, in order otherwise avoid leaving an audit trail.

“Plague integrates deeply into the authentication stack, survives system updates, and leaves almost no forensic traces,” Pezier noted. “Combined with layered obfuscation and environment tampering, this makes it exceptionally hard to detect using traditional tools.”

You Might Also Like

How the World’s Largest 3D Object Library By Microsoft & NVIDIA

Oracle links Clop extortion attacks to July 2025 vulnerabilities

Is Social Media the Best Tool for Business Growth?

Five SETU scientists listed among world’s top 2pc on Stanford list

7 Key Workflows for Maximum Impact

TAGGED: Antivirus, Credential Theft, Cyber Security, cyber Threat Intelligence, Cybersecurity, Internet, Linux, Malware, Nextron Systems, reverse engineering, ssh security, threat detection
Share This Article
Facebook Twitter Copy Link
Previous Article 11 Best Coolers WIRED Tested for Every Budget, Any Situation (2025)
Next Article SharpLink buys another $54M in ETH, now holds $1.65B worth of Ether
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Netflix Hiring A Director Of Generative AI For Gaming With A Starting Salary Of Up To $840K
Gaming News
All aboard: High-speed train links for travel to major European cities gets under way
Travel
Megabonk Sells 1 Million Units in Two Weeks
Gaming News
Pepper Pong game of ‘Shark Tank’ fame lands in Dick’s Sporting Goods and Scheels stores
Business
With a 22% annual return, I think this growth stock may be too good to ignore
Business
How the World’s Largest 3D Object Library By Microsoft & NVIDIA
Tech News
Oracle links Clop extortion attacks to July 2025 vulnerabilities
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Netflix Hiring A Director Of Generative AI For Gaming With A Starting Salary Of Up To $840K

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Netflix Hiring A Director Of Generative AI For Gaming With A Starting Salary Of Up To $840K
October 3, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?