New 'Plague' PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
03.08.2025
5574

Undetected for a year, Plague malware targets Linux PAM to hijack SSH access and erase forensic traces.
The Silent Threat: Plague Malware
For over a year, a stealthy malware named 'Plague' has been lurking in the shadows, targeting Linux systems with a precision that's both terrifying and impressive. This isn't your average malware; it's a sophisticated backdoor that specifically attacks the Pluggable Authentication Module (PAM) to hijack SSH credentials, all while covering its tracks like a digital ninja.

The discovery of Plague has sent shockwaves through the cybersecurity community. Its ability to remain undetected while compromising critical systems is a stark reminder of the evolving threats in the digital landscape. The malware not only steals credentials but also employs advanced techniques to erase any forensic evidence of its presence, making it a nightmare for security teams.
Undetected for a year, Plague malware targets Linux PAM to hijack SSH access and erase forensic traces.
The implications of such a malware are vast. Linux systems, known for their robustness and security, are often the backbone of critical infrastructure. The fact that Plague can bypass traditional security measures and maintain persistence is a wake-up call for organizations relying on these systems.
- • Targets Linux PAM to hijack SSH credentials.
- • Remains undetected by erasing forensic traces.
- • Highlights the need for advanced threat detection mechanisms.
As the cybersecurity arms race continues, the discovery of Plague underscores the importance of vigilance, advanced threat intelligence, and the need for continuous monitoring to protect against such sophisticated threats.
#hack#malware#cybersecurity#Linux rootkits#CVE vulnerabilities
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community

