New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
The Hacker NewsArchived May 09, 2026✓ Full text saved
Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called "darkworm." The backdoor is designed as a Pluggable Authentication Module (PAM)-based post-exploitation toolkit that enables persistent SSH access by means of a magic password and specific TCP port combination.
Full text archived locally
✦ AI Summary· Claude Sonnet
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
Ravie LakshmananMay 08, 2026Malware / Threat Intelligence
Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called "darkworm."
The backdoor is designed as a Pluggable Authentication Module (PAM)-based post-exploitation toolkit that enables persistent SSH access by means of a magic password and specific TCP port combination. It's also capable of harvesting credentials from all legitimate users who authenticate through the compromised system.
"The tool, called PamDOORa, is a new PAM-based backdoor, designed to serve as a post-exploitation backdoor, enabling authentication to servers via OpenSSH," Flare.io researcher Assaf Morag said in a technical report. "Allegedly this would remain persistent on Linux systems (x86_64)."
PamDOORa is the second Linux backdoor after Plague to be discovered targeting the PAM stack over the past year. PAM is a security framework in Unix/Linux operating systems that grants system administrators the ability to incorporate multiple authentication mechanisms or update them (e.g., switching from passwords to biometrics) into an existing system through the use of pluggable modules without the need for rewriting existing applications.
Because PAM modules typically run with root privileges, a compromised, misconfigured, or malicious module can introduce significant security risks and open the door to credential harvesting and unauthorized access.
"Despite its strengths, the Pluggable Authentication Module's (PAM) modularity introduces risks, as malicious modifications to PAM modules can create backdoors or steal user credentials, especially since PAM does not store passwords but transmits values in plaintext," Group-IB noted in September 2024.
"The pam_exec module, which allows the execution of external commands, can be exploited by attackers to gain unauthorized access or establish persistent control by injecting malicious scripts into PAM configuration files."
The Singaporean security vendor also detailed how it's possible to manipulate PAM configuration for SSH authentication to execute a script via pam_exec, effectively allowing a bad actor to obtain a privileged shell on a host and facilitate stealthy persistence.
The latest findings from Flare.io show that PamDOORa, besides enabling credential theft, incorporates anti-forensic capabilities to methodically tamper with authentication logs to erase traces of malicious activity.
Although there is no evidence that the malware has been put to use in real-world attacks, infection chains distributing the malware are likely to involve the adversary first obtaining root access to the host through some other means and deploying the PamDOORa PAM module to capture credentials and establish persistent access over SSH.
Morag told The Hacker News that PamDOORa was compared with several similar PAM-based backdoors, including Plague. Although they share a similar approach of altering the PAM behavior to enable credential capture, the "small differences in the design" indicate that the backdoor does not overlap with any of them. "But without comparing the two binaries, we cannot completely rule out," Morag added.
After an initial asking price of $1,600 on March 17, 2026, the "darkworm" persona has since reduced it by almost 50% to $900 as of April 9, indicating either a lack of buyer interest or an intent to accelerate a sale.
"PamDOORa represents an evolution over existing open-source PAM backdoors," Morag explained. "While the individual techniques (PAM hooks, credential capture, log tampering) are well-documented, the integration into a cohesive, modular implant with anti-debugging, network-aware triggers, and a builder pipeline places it closer to operator-grade tooling than the crude proof-of-concept scripts found in most public repositories."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
Authentication, Backdoor, Credential Theft, cybersecurity, linux, Malware, Threat Intelligence
⚡ Top Stories This Week
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions
Day Zero Readiness: The Operational Gaps That Break Incident Response
⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE and More
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries
Trellix Confirms Source Code Breach With Unauthorized Repository Access
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass
2026: The Year of AI-Assisted Attacks
The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
Load More ▼
⭐ Featured Resources
[Demo] Discover How to Control Autonomous Identity Risks Effectively
[Demo] Stop Email Attacks and Protect Cloud Workspace Data Faster
[Webinar] Learn How Autonomous Validation Keeps Pace With AI Attacks
[Guide] Get Practical AI SOC Insights to Improve Threat Detection