Linux backdoors created by abusing Pluggable Authentication Modules

Read the original article on Cyber Security Wizard.