Microsoft and Windows Have Many Back Doors, But LLM Slop Keep Claiming That Linux Has "Backdoor"
The above slopfarm of the Serial Slopper (SS) shows us how far some Microsofters [1] can manage to spread their claims of a "Linux backdoor" [2] or claim "backdoor sets sights on Linux" [3] when the real backdoors are in Microsoft products and Windows.
It's another example of LLM slop as FUD amplifier, via slopfarms as well. They flood the zone with BS, using what Richard Stallman calls "bullshit generators". They also try to make "SSH" sound like the problem, e.g. in [4,5]. █
Related/contextual items from the news:
-
WARNING: New Linux Backdoor ‘Plague’ Evades Detection For A Year [Ed: It's not a Linux backdoor, a Microsoft site spreads drama and misinformation]
Cybersecurity researchers have uncovered a previously unknown Linux backdoor, dubbed Plague, that has remained undetected for over a year.
-
New Linux backdoor Plague bypasses auth via malicious PAM module [Ed: Misnomer to call this "Linux backdoor"]
A stealthy Linux backdoor named Plague, hidden as a malicious PAM module, allows attackers to bypass auth and maintain persistent SSH access.
-
New Plague backdoor sets sights on Linux systems - SC Media [Ed: It is not because of Linux]
-
How ‘Plague’ infiltrated Linux systems without leaving a trace
Security researchers have discovered an unusually evasive Linux backdoor, undetected even by VirusTotal, compromising systems as a malicious pluggable authentication module (PAM). Dubbed “Plague” by Nextron researchers, the stealthy backdoor lets attackers slip past authentication unnoticed and establish persistent secure shell (SSH) access.
“Plague integrates deeply into the authentication stack, survives system updates, and leaves almost no forensic traces,” the researchers said in a blog post. “Combined with layered obfuscation and environment tampering, this makes it exceptionally hard to detect using traditional tools.”
-
New Plague Linux malware stealthily maintains SSH access
A newly discovered Linux malware, which has evaded detection for over a year, allows attackers to gain persistent SSH access and bypass authentication on compromised systems.
Nextron Systems security researchers, who identified the malware and dubbed it "Plague," describe it as a malicious Pluggable Authentication Module (PAM) that uses layered obfuscation techniques and environment tampering to avoid detection by traditional security tools.

