“`html

An advanced Linux backdoor called Plague has surfaced as an unparalleled risk to corporate security, evading recognition by all primary antivirus software while securing persistent SSH access through manipulation of essential authentication processes.

Identified by cybersecurity experts at Nextron Systems, this malware signifies a significant transformation in attacks targeting Linux, exploiting Pluggable Authentication Modules (PAM) to achieve nearly perfect stealth and enduring access to the system.

The malware’s most troubling feature is its total invisibility to standard security systems. Despite numerous variants being submitted to VirusTotal in the past year, no antivirus engines have flagged any samples as harmful, achieving an impeccable 0/66 detection rate.

Malware undetected

This extraordinary evasion capability arises from its incorporation into Linux’s core authentication framework, where it functions as a legitimate PAM module while undermining security measures.

Plague Malware Evasion Techniques

Plague utilizes a multi-tiered strategy that merges sophisticated obfuscation with system-level manipulation. The malware employs evolving string obfuscation methods that have advanced from simple XOR-based encryption to complex multi-stage algorithms featuring Key Scheduling Algorithm (KSA), Pseudo-Random Generation Algorithm (PRGA), and Deterministic Random Bit Generator (DRBG) layers. This evolution reflects continuous enhancements by threat actors to remain ahead of analysis mechanisms.

The malware’s antidebug techniques ensure that the binary retains its expected filename libselinux.so.8 and checks for the absence of ld.so.preload in environment variables.

These verifications allow the malware to identify sandbox environments and debuggers that frequently rename binaries or employ preloading techniques for analysis, as reported by Nextron report.

Such strategies align with established antidebug practices where malware examines execution environment integrity before enabling harmful functions.

Antidebug
Antidebug

String encryption is a vital facet of Plague’s stealth capabilities. Initial samples employed basic XOR processes, where each byte underwent bitwise exclusive-or with a designated key.

Nonetheless, recent variants have embraced RC4-like implementations featuring customized KSA and PRGA routines. The KSA phase sets up a 256-byte state array through key-dependent permutations, whereas PRGA generates a pseudorandom keystream for decrypting obfuscated strings in real time.

Plague maintains persistence by masquerading as a legitimate PAM module, specifically targeting the pam_sm_authenticate() function accountable for confirming user credentials.

This strategy exploits PAM’s modular design, where authentication operations load shared libraries dynamically according to configuration files in /etc/pam.d/. By situating itself within this reliable execution pathway, Plague gains access to plaintext credentials and authentication decisions.

Feature Description Purpose / Benefit for Attacker
Antidebug Implements checks (e.g., filename, environment vars) to avoid debuggers Prevents exposure by analysts and sandboxes
String Obfuscation Multi-layer encryption of strings and offsets within the binary Hides sensitive details, evades signature-based antivirus
Static Password Hardcoded credentials into the PAM module Enables persistent, discreet SSH access
Hidden Session Artifacts Cleanses environment, removes vars, disables shell history Erases signs of intrusion and utilization

The malware applies static password authentication, allowing intruders to bypass standard credential checks through hardcoded backdoor passwords.

This method resembles documented PAM backdoor strategies where malicious modules return PAM_SUCCESS unconditionally for certain credential combinations. The implant’s inclusion into the authentication hierarchy guarantees it endures system updates and functions with elevated rights typical of authentication processes.

Plague demonstrates a high level of understanding of Linux forensic artifacts through intricate session stealth methods. The malware systematically eliminates evidence of SSH sessions by unsetting crucial environment variables, including SSH_CONNECTION, SSH_CLIENT, and SSH_TTY.

Such variables usually hold connection metadata such as client IP addresses, ports, and terminal data that system administrators rely on for auditing.

Moreover, Plague redirects the HISTFILE environment variable to /dev/null, effectively hindering shell command history from being recorded.

This approach guarantees that intruder actions leave no trace in bash history files, which are typically scrutinized during incident response. The malware’s awareness of Linux forensic protocols indicates development by actors with substantial expertise.

“““html

operational security proficiency.

Examination of compilation artifacts indicates ongoing, consistent development across various environments and periods. Seven unique samples compiled between July 2024 and March 2025 reveal continuous enhancement, with compiler metadata showing builds on Debian, Ubuntu, and Red Hat platforms.

The geographical distribution of VirusTotal submissions is predominantly from the United States, with one sample hailing from China, implying either extensive deployment or intentional redirection.

The malware features a cultural nod to the 1995 film “Hackers,” showcasing the message “Uh. Mr. The Plague, sir? I believe we have a hacker.” following a successful authentication bypass.

This easter egg, only apparent post-deobfuscation, offers a glimpse into the threat actors’ cultural influences and potentially links them to Western threat factions acquainted with classic hacker culture.

Plague’s introduction underscores significant weaknesses in traditional endpoint security strategies that heavily depend on signature-based detection.

The malware’s capability to receive zero detections across 66 antivirus engines highlights the shortcomings of conventional security measures when confronted with innovative attack vectors exploiting trusted system elements.

The focus on PAM infrastructure signifies a strategic shift in Linux malware, advancing beyond application-layer assaults to emphasize core system components.

This tactic allows attackers to retain access regardless of application updates or security corrections, as the authentication layer remains perpetually susceptible. Security teams must enforce PAM module integrity checks and observe modifications in the authentication subsystem to identify similar threats.

IoC List

SHA-256 Size Filename First Submission Country Compiler
85c66835657e3ee6a478a2e0b1fd3d87119bebadc43a16814c30eb94c53766bb 36.18 KB libselinux.so.8 2024-07-29 17:55:52 USA GCC: (Debian 10.2.1-6) 10.2.1 20210110
7c3ada3f63a32f4727c62067d13e40bcb9aa9cbec8fb7e99a319931fc5a9332e 41.65 KB libselinux.so.8 2024-08-02 21:10:51 USA GCC: (Debian 10.2.1-6) 10.2.1 20210110
9445da674e59ef27624cd5c8ffa0bd6c837de0d90dd2857cf28b16a08fd7dba6 49.55 KB libselinux.so.8 2025-02-04 16:53:45 USA GCC: (Ubuntu 13.3.0-6ubuntu2~24.04) 13.3.0
5e6041374f5b1e6c05393ea28468a91c41c38dc6b5a5230795a61c2b60ed14bc 58.77 KB libselinux.so.8 2025-02-09 21:27:32 USA GCC: (Ubuntu 13.3.0-6ubuntu2~24.04) 13.3.0
6d2d30d5295ad99018146c8e67ea12f4aaa2ca1a170ad287a579876bf03c2950 49.59 KB hijack 2025-02-10 03:07:24 CHINA GCC: (Ubuntu 9.4.0-1ubuntu1~20.04.2) 9.4.0
e594bca43ade76bbaab2592e9eabeb8dca8a72ed27afd5e26d857659ec173261 109.67 KB libselinux.so.8 2025-02-13 22:58:43 UTC USA stripped
14b0c90a2eff6b94b9c5160875fcf29aff15dcfdfd3402d953441d9b0dca8b39 41.77 KB libse.so 2025-03-22 18:46:36 USA GCC: (GNU) 4.8.5 20150623 (Red Hat 4.8.5-44)

Organizations should promptly conduct audits of PAM configurations, confirm the integrity of authentication modules, and establish monitoring for unusual authentication behavior.

The malware’s complexity suggests state-sponsored or advanced persistent threat capabilities, necessitating heightened security measures for critical infrastructure and defense contractors.

“`