PamDOORa the backdoor hidden in PAM and stealing credentials in Linux

Published 4 min de lectura 59 reading

A new backdoor for Linux baptized as PamDOORa has been described by security researchers and put on sale in cybercrime forums, which again puts the focus on an old but dangerous vector: the PAM modules. Unlike many concept test tools, PamDOORa is a post-exploitation kit designed to integrate into the Unix / Linux authentication stack and provide persistent SSH access through a combination of "magic password" and specific TCP port, in addition to capture credentials from legitimate users passing through the compromised system.

The central problem is that PAM modules are usually run with root privileges; therefore, a malicious modification not only allows unauthorized login but can steal clear credentials, modify authentication flow and make detection difficult. PAM is a critical piece of the platform - official documentation and resources are found in linux-pam.org- and any abuse in that space has a direct impact on confidence in the login system, including OpenSSH ( openssh.com).

PamDOORa the backdoor hidden in PAM and stealing credentials in Linux
Image generated with IA.

The authors behind PamDOORa, who are announced in a forum called Rehub under the alias "darkworm," have shown a more professional approach than previous public evidence: the implant combines hooks in PAM, capture of credentials, misrepresentation of records and anti-forensic functions, as well as a modular construction system to generate variants. This packaging turns known techniques into an operational tool ready for deployment by attackers with prior access to the host.

It is important to stress that, according to the analysis, PamDOORa seems to require root privileges for its installation, which suggests a two-phase attack pattern: first to obtain a lift of privileges by another means, and then to deploy the PAM module to consolidate access and collect secrets. The fact that the seller has reduced the launch price from 1,600 to about $900 in a few weeks can be interpreted as a sign of a market with low demand or the urgency to monetize, but does not subtract technical gravity from the threat.

From the operational point of view, the combination of persistence through PAM and handling of records complicates forensic detection. A SOC that depends only on local login may not see the suspicious activity if they have been altered. In addition, the presence of anti-debugging and network-dependent triggers in PamDOORa increases its ability to remain latent to specific conditions and reduce exposure to analysis.

Defensive measures should give priority to preventing the insertion of unauthorized modules and early detection of PAM surface changes. It is appropriate to immediately audit directories and files that host PAM modules, verify system package sums and signatures, and apply file integrity control using tools such as AIDE or similar. It is also critical to limit who can write in / lib / security, / lib64 / security and / etc / pam.d, and review any legitimate use of pam _ exec, which can be abused to run arbitrary code during authentication.

In parallel, OpenSSH hardener reduces the effectiveness of this type of backdoors: disable password authentication where possible, prefer keys and certificates, require PAM-integrated multifactor authentication (MFA), and monitor attempts to connect to non-standard ports or abnormal session patterns. For incident response teams, assume that the presence of a suspicious PAM module involves systemic commitment and run a complete isolation, reimages of hosts and rotation of credentials is the safest way.

PamDOORa the backdoor hidden in PAM and stealing credentials in Linux
Image generated with IA.

Detection also requires off-host visibility: correlate authentication events with network records and central logging systems, use EDR with ability to detect unusual memory loads and kernel calls, and use configuration analysis tools to detect changes in PAM files. For organizations that handle sensitive data, considering the integrity of the supply chain of packages and reproducible signatures reduces the likelihood that an attacker will place a malicious module without being detected.

Beyond the technical response, this incident is a reminder that even "mature" components such as PAM can become critical vectors when treated with administrative laxity. The security community should continue to document and share commitment indicators, while managers should operate with the principle of minimum privilege, apply network segmentation and review root access and changes in authentication settings with priority.

In order to deepen the risks associated with PAM modules and previous examples of abuse, the technical literature and specialized blogs, as well as the official documentation repositories of PAM and OpenSSH, are available. Equipment that detect authentication-related anomalies or newly installed modules should activate their response protocol, preserve evidence and coordinate with security providers for containment and mediation.

Coverage

Related

More news on the same subject.