PamDOORa Linux Backdoor Leverages PAM for Persistent SSH Access
The Hacker News reports on a new Linux backdoor named PamDOORa, currently being peddled on the Russian cybercrime forum Rehub for $1,600 by a threat actor known as “darkworm.” This isn’t just another piece of malware; it’s a post-exploitation toolkit designed around Pluggable Authentication Modules (PAM).
PamDOORa’s core functionality revolves around establishing persistent SSH access. It achieves this by combining a “magic password” with a specific TCP port. This method allows attackers to maintain stealthy access even after initial compromise, bypassing standard authentication mechanisms by manipulating a critical system component.
For defenders, this is a clear signal to scrutinize PAM configurations and SSH access logs. Attackers are weaponizing legitimate system functionalities to maintain persistence. Relying solely on perimeter defenses is insufficient when internal components become the attack vector. This backdoor underscores the need for robust internal network monitoring and strict PAM module integrity checks.
What This Means For You
- If your Linux systems are exposed or have been compromised, PamDOORa is a significant threat. This backdoor, leveraging PAM, could grant persistent SSH access with a 'magic password' that bypasses your standard authentication. You need to immediately audit your PAM configurations for unauthorized modifications and review SSH logs for unusual login patterns, especially on non-standard ports.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| PamDOORa-Backdoor | Auth Bypass | Linux systems with PamDOORa backdoor installed, allowing SSH access via magic password and specific TCP port |
| PamDOORa-Backdoor | Information Disclosure | Linux systems with PamDOORa backdoor installed, designed to steal SSH credentials |
| PamDOORa-Backdoor | Persistence | Linux systems utilizing PAM modules for post-exploitation persistence via PamDOORa |