https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html?m=1
On Sun, 10 May 2026 11:49:51 +1000, Axel wrote:
https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html?m=1
I doubt it can use Ram modules to affect my system. I'm using old DDR3
Ram and they are so old they are probably immune. It would be like someone that owns a '66 426 Plymouth Roadrunnner being afraid of being spied on
like they own a new Chinese BYD vehicle or something.
CtrlAltDel wrote:
On Sun, 10 May 2026 11:49:51 +1000, Axel wrote:
https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html?m=1
I doubt it can use Ram modules to affect my system. I'm using old DDR3
Ram and they are so old they are probably immune. It would be like
someone
that owns a '66 426 Plymouth Roadrunnner being afraid of being spied on
like they own a new Chinese BYD vehicle or something.
I have pc's using DDR3 and others DDR4. I don't understand these news
items. I just post them in case they're relevant
I have pc's using DDR3 and others DDR4. I don't understand these news
items. I just post them in case they're relevant
https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html?m=1
On Sun, 10 May 2026 11:49:51 +1000, Axel wrote:
https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html?m=1
I doubt it can use Ram modules to affect my system.
On 10/05/2026 02:49, Axel wrote:systems/>
https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses- pam.html?m=1
"Although there is no evidence that the malware has been put to use in real-world attacks, infection chains distributing the malware are likely
to involve the adversary first obtaining root access to the host through
some other means and deploying the PamDOORa PAM module to capture
credentials and establish persistent access over SSH."
How does the adversary gain root access in the first place? The above
states "are /likely/ to involve...", but <https://cybersecuritynews.com/new-pamdoora-backdoor-attacking-linux-
puts it even more strongly:
"PamDOORa is designed as a post-exploitation tool, meaning the attacker
must already have root access before deploying it."
So the attacker /must/ have root access. How do they get that?
If CtrlAltDel is trying to make a joke of sorts, then it is a very lame
joke.
If CtrlAltDel really cannot see the difference between "PAM" and "RAM"
at 32px, the headline font size on that web page, then a visit to the optician is needed.
On Sun, 10 May 2026 11:51:04 +0100, PC-3FingerSalute wrote:
If CtrlAltDel is trying to make a joke of sorts, then it is a very lameWhat's the difference between PAM and RAM, Mr. Genius?
joke.
If CtrlAltDel really cannot see the difference between "PAM" and "RAM"
at 32px, the headline font size on that web page, then a visit to the
optician is needed.
| Sysop: | DaiTengu |
|---|---|
| Location: | Appleton, WI |
| Users: | 1,116 |
| Nodes: | 10 (0 / 10) |
| Uptime: | 86:07:45 |
| Calls: | 14,305 |
| Files: | 186,338 |
| D/L today: |
824 files (255M bytes) |
| Messages: | 2,525,504 |