“`html
An advanced Linux backdoor called Plague has surfaced as an unparalleled risk to corporate security, evading recognition by all primary antivirus software while securing persistent SSH access through manipulation of essential authentication processes.
Identified by cybersecurity experts at Nextron Systems, this malware signifies a significant transformation in attacks targeting Linux, exploiting Pluggable Authentication Modules (PAM) to achieve nearly perfect stealth and enduring access to the system.
The malware’s most troubling feature is its total invisibility to standard security systems. Despite numerous variants being submitted to VirusTotal in the past year, no antivirus engines have flagged any samples as harmful, achieving an impeccable 0/66 detection rate.

This extraordinary evasion capability arises from its incorporation into Linux’s core authentication framework, where it functions as a legitimate PAM module while undermining security measures.
Plague Malware Evasion Techniques
Plague utilizes a multi-tiered strategy that merges sophisticated obfuscation with system-level manipulation. The malware employs evolving string obfuscation methods that have advanced from simple XOR-based encryption to complex multi-stage algorithms featuring Key Scheduling Algorithm (KSA), Pseudo-Random Generation Algorithm (PRGA), and Deterministic Random Bit Generator (DRBG) layers. This evolution reflects continuous enhancements by threat actors to remain ahead of analysis mechanisms.
The malware’s antidebug techniques ensure that the binary retains its expected filename libselinux.so.8
and checks for the absence of ld.so.preload
in environment variables.
These verifications allow the malware to identify sandbox environments and debuggers that frequently rename binaries or employ preloading techniques for analysis, as reported by Nextron report.
Such strategies align with established antidebug practices where malware examines execution environment integrity before enabling harmful functions.

String encryption is a vital facet of Plague’s stealth capabilities. Initial samples employed basic XOR processes, where each byte underwent bitwise exclusive-or with a designated key.
Nonetheless, recent variants have embraced RC4-like implementations featuring customized KSA and PRGA routines. The KSA phase sets up a 256-byte state array through key-dependent permutations, whereas PRGA generates a pseudorandom keystream for decrypting obfuscated strings in real time.
Plague maintains persistence by masquerading as a legitimate PAM module, specifically targeting the pam_sm_authenticate()
function accountable for confirming user credentials.
This strategy exploits PAM’s modular design, where authentication operations load shared libraries dynamically according to configuration files in /etc/pam.d/
. By situating itself within this reliable execution pathway, Plague gains access to plaintext credentials and authentication decisions.
Feature | Description | Purpose / Benefit for Attacker |
---|---|---|
Antidebug | Implements checks (e.g., filename, environment vars) to avoid debuggers | Prevents exposure by analysts and sandboxes |
String Obfuscation | Multi-layer encryption of strings and offsets within the binary | Hides sensitive details, evades signature-based antivirus |
Static Password | Hardcoded credentials into the PAM module | Enables persistent, discreet SSH access |
Hidden Session Artifacts | Cleanses environment, removes vars, disables shell history | Erases signs of intrusion and utilization |
The malware applies static password authentication, allowing intruders to bypass standard credential checks through hardcoded backdoor passwords.
This method resembles documented PAM backdoor strategies where malicious modules return PAM_SUCCESS
unconditionally for certain credential combinations. The implant’s inclusion into the authentication hierarchy guarantees it endures system updates and functions with elevated rights typical of authentication processes.
Plague demonstrates a high level of understanding of Linux forensic artifacts through intricate session stealth methods. The malware systematically eliminates evidence of SSH sessions by unsetting crucial environment variables, including SSH_CONNECTION
, SSH_CLIENT
, and SSH_TTY
.
Such variables usually hold connection metadata such as client IP addresses, ports, and terminal data that system administrators rely on for auditing.
Moreover, Plague redirects the HISTFILE
environment variable to /dev/null
, effectively hindering shell command history from being recorded.
This approach guarantees that intruder actions leave no trace in bash history files, which are typically scrutinized during incident response. The malware’s awareness of Linux forensic protocols indicates development by actors with substantial expertise.
“““html
operational security proficiency.
Examination of compilation artifacts indicates ongoing, consistent development across various environments and periods. Seven unique samples compiled between July 2024 and March 2025 reveal continuous enhancement, with compiler metadata showing builds on Debian, Ubuntu, and Red Hat platforms.
The geographical distribution of VirusTotal submissions is predominantly from the United States, with one sample hailing from China, implying either extensive deployment or intentional redirection.
The malware features a cultural nod to the 1995 film “Hackers,” showcasing the message “Uh. Mr. The Plague, sir? I believe we have a hacker.” following a successful authentication bypass.
This easter egg, only apparent post-deobfuscation, offers a glimpse into the threat actors’ cultural influences and potentially links them to Western threat factions acquainted with classic hacker culture.
Plague’s introduction underscores significant weaknesses in traditional endpoint security strategies that heavily depend on signature-based detection.
The malware’s capability to receive zero detections across 66 antivirus engines highlights the shortcomings of conventional security measures when confronted with innovative attack vectors exploiting trusted system elements.
The focus on PAM infrastructure signifies a strategic shift in Linux malware, advancing beyond application-layer assaults to emphasize core system components.
This tactic allows attackers to retain access regardless of application updates or security corrections, as the authentication layer remains perpetually susceptible. Security teams must enforce PAM module integrity checks and observe modifications in the authentication subsystem to identify similar threats.
IoC List
SHA-256 | Size | Filename | First Submission | Country | Compiler |
---|---|---|---|---|---|
85c66835657e3ee6a478a2e0b1fd3d87119bebadc43a16814c30eb94c53766bb | 36.18 KB | libselinux.so.8 | 2024-07-29 17:55:52 | USA | GCC: (Debian 10.2.1-6) 10.2.1 20210110 |
7c3ada3f63a32f4727c62067d13e40bcb9aa9cbec8fb7e99a319931fc5a9332e | 41.65 KB | libselinux.so.8 | 2024-08-02 21:10:51 | USA | GCC: (Debian 10.2.1-6) 10.2.1 20210110 |
9445da674e59ef27624cd5c8ffa0bd6c837de0d90dd2857cf28b16a08fd7dba6 | 49.55 KB | libselinux.so.8 | 2025-02-04 16:53:45 | USA | GCC: (Ubuntu 13.3.0-6ubuntu2~24.04) 13.3.0 |
5e6041374f5b1e6c05393ea28468a91c41c38dc6b5a5230795a61c2b60ed14bc | 58.77 KB | libselinux.so.8 | 2025-02-09 21:27:32 | USA | GCC: (Ubuntu 13.3.0-6ubuntu2~24.04) 13.3.0 |
6d2d30d5295ad99018146c8e67ea12f4aaa2ca1a170ad287a579876bf03c2950 | 49.59 KB | hijack | 2025-02-10 03:07:24 | CHINA | GCC: (Ubuntu 9.4.0-1ubuntu1~20.04.2) 9.4.0 |
e594bca43ade76bbaab2592e9eabeb8dca8a72ed27afd5e26d857659ec173261 | 109.67 KB | libselinux.so.8 | 2025-02-13 22:58:43 UTC | USA | stripped |
14b0c90a2eff6b94b9c5160875fcf29aff15dcfdfd3402d953441d9b0dca8b39 | 41.77 KB | libse.so | 2025-03-22 18:46:36 | USA | GCC: (GNU) 4.8.5 20150623 (Red Hat 4.8.5-44) |
Organizations should promptly conduct audits of PAM configurations, confirm the integrity of authentication modules, and establish monitoring for unusual authentication behavior.
The malware’s complexity suggests state-sponsored or advanced persistent threat capabilities, necessitating heightened security measures for critical infrastructure and defense contractors.
“`