You must log in or # to comment.
Yet another backdoor. Runs as a PAM module with root privileges. Since you need to have been pwned before an attacker or malware can deploy this you’re screwed anyway.
Yet another backdoor. Runs as a PAM module with root privileges. Since you need to have been pwned before an attacker or malware can deploy this you’re screwed anyway.