Pam Backdoor Targets Linux Systems to Steal SSH Credentials
A newly observed Linux backdoor technique, dubbed Pam, is exploiting the flexibility of Pluggable Authentication Modules (PAM) to capture SSH credentials and maintain persistence on compromised systems stealthily. Since its introduction in 1991 by Linus Torvalds, Linux has been designed for simplici
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] OpenAI rolls out new model for cybersecurity teams a month after Anthropic's Mythos debut
- [CYBER] Dirty Frag: Unpatched Linux vulnerability delivers root access
- [CYBER] This Week in Security: Another Linux Exploit, Ubuntu Knocked Offline, Finals Interrupted, and Backdoored Tools
- [CYBER] Major data breach impacts schools across US
- [CYBER] Anthropic's Mythos set off a cybersecurity 'hysteria.' Experts say the threat was already here
- [CYBER] 'Dirty Frag' Linux flaw one-ups CopyFail with no patches and public root exploit