Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Elon Musk’s last co-founder reportedly leaves xAI

    March 28, 2026

    From Moon hotels to cattle herding: 8 startups investors chased at YC Demo Day

    March 28, 2026

    Aetherflux reportedly raising Series B at $2 billion valuation

    March 27, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Elon Musk’s last co-founder reportedly leaves xAI
    • From Moon hotels to cattle herding: 8 startups investors chased at YC Demo Day
    • Aetherflux reportedly raising Series B at $2 billion valuation
    • OpenAI shuts down Sora while Meta gets shut out in court
    • VCs are betting billions on AI’s next wave, so why is OpenAI killing Sora?
    • 16 of the most interesting startups from YC W’26 Demo Day
    • Defense startup Shield AI lands $12.7B valuation, up 140%, after US Air Force deal
    • Silicon Valley’s two biggest dramas have intersected: LiteLLM and Delve
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»How ‘Plague’ infiltrated Linux systems without leaving a trace
    Security

    How ‘Plague’ infiltrated Linux systems without leaving a trace

    TechurzBy TechurzAugust 4, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    malware skull
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Security researchers have discovered an unusually evasive Linux backdoor, undetected even by VirusTotal, compromising systems as a malicious pluggable authentication module (PAM). Dubbed “Plague” by Nextron researchers, the stealthy backdoor lets attackers slip past authentication unnoticed and establish persistent secure shell (SSH) access.

    “Plague integrates deeply into the authentication stack, survives system updates, and leaves almost no forensic traces,” the researchers said in a blog post. “Combined with layered obfuscation and environment tampering, this makes it exceptionally hard to detect using traditional tools.”

    Disguising itself as PAM, Linux’s trusted authentication framework, the implant allows attackers covert access. Active since July 29, 2024, it has evolved with new variants appearing as recently as March 2025, researchers added.

    The payloads observed by Nextron bore compilation traces for Debian, Ubuntu, and other distributors, suggesting broader targeting across Linux environments.

    Integrating into the authentication stack

    Plague’s architecture allows it to deeply integrate into the system’s authentication stack, operating through a benign-looking shared library file (libselinus.so.8) while hijacking PAM functions like “pam_sm_authenticate(),” the very mechanism that verifies user credentials on login.

    The injection makes Plague part of the login process, granting attackers a hidden backdoor via a hardcoded password without user authentication, researchers added. Because it’s operating at the authentication level, no separate malware loader or persistence mechanism is needed. Backdoor is triggered any time the PAM stack is invoked, such as through SSH or sudo.

    The design of hijacking legitimate system behavior also makes Plague resistant to upgrades and difficult to detect with traditional security tools, including antivirus engines on VirusTotal.

    “Although several variants of this backdoor have been updated to VirusTotal over the past year, not a single antivirus engine flags them as malicious,” the researchers said. “ To our knowledge, there are no public reports or detection rules available for this threat, suggesting that it has quietly evaded detection across multiple environments.”

    According to screenshots shared in the blog, dozens of variants uploaded to VirusTotal over the past year registered 0/66 detections.

    From obfuscation to audit evasion

    Plague’s stealth begins at compile time. Early versions used simple XOR-based string encoding, but later variants deployed multi-layer encryption, including custom KSA/PRGA routines and DRBG-based stages, to obfuscate decrypted payloads and strings.

    The use of advanced cryptographic routines, including algorithms like the Key Scheduling algorithm (KSA), the Pseudo-Random Generation algorithm (PRGA), and Deterministic Random Bit Generation (DRBG), guarantees a layered protection for evading both static signature scanning and sandbox-based analysis tools.
    Despite its long runtime, the attribution of Plague remains unknown. Authors of the malware, however, did drop some clues after the de-obfuscation routines. A sample named “hijack” made a reference to the movie “Hackers” in a message printed after “pam-authenticate.” “Uh. Mr. The Plague, sir? I think we have a hacker,” the message said.
    Nextron recommends adopting behavioral, memory-based, and PAM-focused forensic strategies. Additionally, security teams are advised to actively audit PAM configurations, monitor newly dropped .so files in /lib/security/, and track environment-level tampering or suspicious cleanup behaviors.

    infiltrated Leaving Linux Plague systems trace
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy continuous security improvement for developers is the key to renewed resilience
    Next Article iPhone just tipped for killer OLED upgrade that could leapfrog Samsung phones
    Techurz
    • Website

    Related Posts

    Opinion

    Conntour raises $7M from General Catalyst, YC to build an AI search engine for security video systems

    March 26, 2026
    Opinion

    Fuse raises $25M to disrupt aging loan origination systems used by US credit unions

    March 16, 2026
    Opinion

    Trace raises $3M to solve the AI agent adoption problem in enterprise

    February 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Our Picks

    Elon Musk’s last co-founder reportedly leaves xAI

    March 28, 2026

    From Moon hotels to cattle herding: 8 startups investors chased at YC Demo Day

    March 28, 2026

    Aetherflux reportedly raising Series B at $2 billion valuation

    March 27, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.