Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Plague PAM-Based Backdoor for Linux

Plague PAM-Based Backdoor for Linux

Type
Campaign
Actors
❓Unknown
Pub. date
August 4, 2025
Initial access
Password attack
Impact
Data exfiltration
Observed techniques
Create SSH backdoor
Observed tools
Plague backdoor
Targeted technologies
Linux
References
https://www.nextron-systems.com/2025/08/01/plague-a-newly-discovered-pam-based-backdoor-for-linux/
Status
Finalized
Last edited
Aug 5, 2025 9:08 AM

A newly discovered Linux backdoor, dubbed Plague, was embedded as a malicious PAM (Pluggable Authentication Module) component. Designed to silently bypass system authentication, Plague grants attackers persistent SSH access while evading all known antivirus detection and leaving minimal forensic traces. It has been in active development for at least a year, with samples dating back to mid-2024.

Plague integrates deeply into the Linux authentication stack by impersonating legitimate shared libraries like libselinux.so.8, ensuring it is loaded at login. It leverages multiple layers of obfuscation, including XOR, custom KSA/PRGA-like routines, and DRBG (Deterministic Random Bit Generator) to protect both strings and memory offsets. Antidebug checks prevent execution in monitored environments, and the implant clears SSH-related environment variables and shell history to remove evidence of attacker presence. Access is controlled via hardcoded static passwords, and the malware checks runtime conditions before activating, ensuring stealth in dynamic environments.