Security researchers have discovered a new Apache web server backdoor that is so stealthy it leaves almost no trace of its redirection behaviour on the hard drive or in server log files.

According to an analysis by security firms ESET and Sucuri, spotting the Linux/Cdorked.A module will prove a challenge to even the most diligent web admin.

Unlike the majority of such malware, Cdorked writes no files to the server’s hard drive beyond its modified binary, storing its configuration in a few megabytes of main memory that it happily shares with other processes.

No traces of command and control are left on the victim server thanks to the way it pushes its configuration through obfuscated HTTP that doesn't appear in logs.

“There are two ways the attacker can control the behaviour of the backdoored server: through a reverse connect shell or through special commands, all of them are triggered via HTTP requests,” said ESET’s Pierre-Marc Bureau.

The malware’s purpose is mostly to serve the redirects to Blackhole Exploit Kit that currently dominates the threat landscape although it is well designed enough to avoid this behaviour if it detects it is being accessed by an admin interface.

Although small by Internet standards, ESET’s engineers still estimate that hundreds of servers are affected which probably equates to thousands of websites co-opted to serve redirects.

Detecting and getting rid of it means either checking the integrity of the Apache package or, better still, looking at a memory dump to spot the malware’s binary.

"We urge system administrators to check their servers and verify that they are not affected by this threat," said ESET.

ESET previously reported on Linux/Chapro.A, an attack aimed at Internet bank users, and the Snasko server rootkit.

As with these attacks, Cdorked is a reminder to apply all patches and that attackers are now aiming at vulnerable servers as a weakness.