Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

HTS-110 and Stelar launch compact benchtop NMR instrument

New Linux PamDOORa backdoor uses PAM module to steal SSH credentials

Linux kernel dirty flag LPE exploit allows root access across major distributions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Linux PamDOORa backdoor uses PAM module to steal SSH credentials
Identity

New Linux PamDOORa backdoor uses PAM module to steal SSH credentials

By May 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 8, 2026Malware/Threat Intelligence

Cybersecurity researchers have revealed details of a new Linux backdoor named PamDOORa that is being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called “darkworm.”

The backdoor is designed as a Pluggable Authentication Module (PAM)-based post-exploitation toolkit that allows persistent SSH access through a combination of a magic password and a specific TCP port. It can also collect credentials from all legitimate users who authenticate through a compromised system.

“The tool, called PamDOORa, is a new PAM-based backdoor designed to act as a post-exploitation backdoor, allowing authentication to the server via OpenSSH,” Flare.io researcher Assaf Morag said in a technical report. “This is said to be persistent on Linux systems (x86_64).”

PamDOORa is the second Linux backdoor after Plague to target the PAM stack. PAM is a security framework for Unix/Linux operating systems that allows system administrators to use pluggable modules to incorporate multiple authentication mechanisms into existing systems or update them (for example, switching from passwords to biometrics) without having to rewrite existing applications.

Because PAM modules typically run with root privileges, a compromised, misconfigured, or malicious module can pose a significant security risk and open the door to credential harvesting and unauthorized access.

“Despite its strengths, the modular nature of the Pluggable Authentication Module (PAM) poses risks. In particular, since PAM does not store passwords and transmits values ​​in clear text, malicious modifications to the PAM module could create backdoors or steal user credentials,” Group-IB noted in September 2024.

“The pam_exec module, which allows the execution of external commands, could be exploited by attackers to gain unauthorized access or establish persistent control by injecting malicious scripts into PAM configuration files.”

The Singaporean security vendor also detailed how to manipulate PAM settings for SSH authentication to run scripts via pam_exec. This effectively allows a malicious attacker to obtain a privileged shell on the host and facilitate stealth persistence.

According to Flare.io’s latest findings, PamDOORa not only enables credential theft, but also incorporates anti-forensic features that systematically alter authentication logs to erase any trace of malicious activity.

Although there is no evidence that this malware has been used in real-world attacks, the infection chain for distributing the malware likely involves the attacker first gaining root access to the host through other means, deploying the PamDOORa PAM module to obtain credentials, and establishing persistent access via SSH.

The initial asking price on March 17, 2026 was $1,600, but the “Dark Worm” persona has since lowered the price by almost 50% to $900 as of April 9, indicating either a lack of buyer interest or an intention to accelerate the sale.

“PamDOORa represents an evolution of existing open source PAM backdoors,” Morag explained. “While the individual techniques (PAM hooks, credential capture, log tampering) are well documented, their integration into a unified, modular implant with debug protection, network-enabled triggers, and builder pipelines brings them closer to operator-level tools than the crude proof-of-concept scripts found in most public repositories.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLinux kernel dirty flag LPE exploit allows root access across major distributions
Next Article HTS-110 and Stelar launch compact benchtop NMR instrument

Related Posts

Linux kernel dirty flag LPE exploit allows root access across major distributions

May 8, 2026

Ivanti EPMM CVE-2026-6973 Active exploit allows RCE to grant administrator-level access

May 7, 2026

PCPJack Credential Stealer exploits five CVEs to spread like a worm across cloud systems

May 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

HTS-110 and Stelar launch compact benchtop NMR instrument

New Linux PamDOORa backdoor uses PAM module to steal SSH credentials

Linux kernel dirty flag LPE exploit allows root access across major distributions

Why my doctor won’t call me back

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.