Overview of the New PamDOORa Backdoor
A new backdoor named PamDOORa is targeting Linux systems to steal SSH credentials. This sophisticated malware leverages the Pluggable Authentication Modules (PAM) framework, a critical component in Unix and Linux-based operating systems for managing user authentication.
Key Features of PamDOORa
-
Infection Vector:
- The backdoor infects Linux servers by modifying PAM configurations to execute malicious scripts during SSH login attempts.
-
Malicious Script Execution:
- A script named
tn.shis executed via thepam_exec.somodule, which is a legitimate PAM module used for executing external commands.
- A script named
-
Credential Capture and Exfiltration:
- Captured credentials are stored in
/tmp/with dynamically generated filenames. - The stolen credentials are exfiltrated using netcat (nc) over port
1234.
- Captured credentials are stored in
Indicators of Compromise (IoCs)
-
File Name:
pam_linux.so- Description: Malicious PAM shared object injected into the authentication stack.
-
Script Executed via pam_exec:
- File
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



