PSA Stealer: New Linux Malware Steals Passwords and Crypto Data

A new Linux malware, PSA Stealer, efficiently steals passwords, personal data, and crypto info by exploiting vulnerabilities and evading detection, affecting thousands of systems. Similar to the Plague backdoor, it highlights rising threats to Linux. Vigilance through updates, MFA, and monitoring is essential for protection.
PSA Stealer: New Linux Malware Steals Passwords and Crypto Data
Written by Corey Blackwell

In the ever-evolving world of cybersecurity threats, a new strain of Linux malware has emerged as a formidable adversary, targeting users’ passwords and sensitive personal information with alarming efficiency. Dubbed PSA Stealer by security experts, this malware has reportedly compromised thousands of systems, evolving from rudimentary tools into a sophisticated threat that exploits vulnerabilities in Linux environments. According to a recent report from TechRadar, PSA Stealer is not just stealing credentials but also adapting to evade detection, making it a persistent danger for both individual users and enterprises reliant on Linux servers.

The malware’s modus operandi involves infiltrating systems through seemingly innocuous downloads or phishing attempts, then quietly harvesting data such as login credentials, browser histories, and even cryptocurrency wallet information. What sets PSA Stealer apart is its ability to mutate, incorporating techniques from other infostealers like those seen in massive breaches involving billions of credentials, as highlighted in a June 2025 analysis by CyberNews.

Evolution of a Digital Predator

Experts warn that PSA Stealer’s rapid evolution mirrors broader trends in malware development, where attackers leverage open-source tools to refine their payloads. In one documented case, the malware has been observed injecting itself into legitimate processes, allowing it to siphon data without triggering standard antivirus alerts. This stealth is particularly concerning for Linux users, who often assume their systems are inherently more secure than Windows counterparts—a myth increasingly debunked by incidents like this.

Compounding the issue is the malware’s global reach. Reports indicate infections spanning from personal desktops to cloud servers, with thousands of users already affected. Security firm ANY.RUN, in its January 2025 overview of top malware threats published on The Hacker News, flagged similar infostealers as rising stars in the threat ecosystem, predicting a surge in Linux-targeted attacks throughout the year.

Parallels with Emerging Backdoors

Adding to the urgency, PSA Stealer’s tactics echo those of another recent discovery: the Plague backdoor, a Linux-specific malware that has evaded detection for over a year. As detailed in an August 2025 article from The Hacker News, Plague targets the Pluggable Authentication Modules (PAM) system, silently stealing SSH credentials and erasing traces of its presence. This backdoor allows attackers persistent access, bypassing authentication entirely—a nightmare for critical infrastructure operators.

Posts on X (formerly Twitter) from cybersecurity accounts like The Hacker News and independent researchers have amplified concerns, noting how Plague exploits unpatched vulnerabilities in distributions like Ubuntu and Fedora. One such post from early August 2025 highlighted the malware’s ability to hijack crash dumps for secret extraction, including password hashes, underscoring the need for immediate patching.

Industry Responses and Mitigation Strategies

In response, major Linux distributors are scrambling to issue updates. Red Hat, for instance, has advised users to audit their PAM configurations and enable multi-factor authentication (MFA) as a frontline defense. Yet, as Tom’s Guide reported in a piece just 13 hours ago on their site, even these measures may not suffice against adaptive strains like PSA Stealer, which can steal browser-stored data before MFA kicks in.

For industry insiders, the key takeaway is proactive monitoring. Tools like sandbox environments from ANY.RUN can simulate and detect such threats, as emphasized in their 2025 malware report. Enterprises should also consider behavioral analytics to spot anomalies, such as unusual SSH access patterns indicative of Plague infections.

The Broader Implications for Cybersecurity

This wave of Linux malware signals a shift: attackers are increasingly viewing open-source ecosystems as lucrative targets, especially with the rise of cloud computing and IoT devices. The colossal breach of 16 billion credentials earlier this year, covered extensively by CyberNews, serves as a stark reminder that stolen data fuels further attacks, creating a vicious cycle.

Looking ahead, experts predict that without unified standards for Linux security, threats like PSA Stealer and Plague will proliferate. As one X post from a prominent security researcher noted in late July 2025, the undetected nature of these malwares for extended periods highlights gaps in current detection frameworks. For now, vigilance—through regular updates, encrypted storage, and employee training—remains the best armor against this digital plague.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us