399
top 50 comments
sorted by: hot top controversial new old
[-] possiblylinux127@lemmy.zip 49 points 1 year ago* (last edited 1 year ago)

I'm genuinely disturbed that a person who was a core developer could just go rogue.

[-] dan@upvote.au 78 points 1 year ago* (last edited 1 year ago)

From what I've been reading, it sounds like they were malicious from the very beginning. The work to integrate the malware goes back to 2021. https://boehs.org/node/everything-i-know-about-the-xz-backdoor

It's an extremely sophisticated attack that was hidden very well, and was only accidentally discovered by someone who noticed that rejected SSH connections (eg invalid key or password) were using more CPU power and taking 0.5s longer than they should have. https://mastodon.social/@AndresFreundTec/112180406142695845

[-] Moonrise2473@lemmy.ml 16 points 1 year ago

From that post, commits set to UTC+0800 and activity between UTC 12-17 indicate that the programmer wasn't operating from California but from another country starting with C. The name is also another hint.

[-] dan@upvote.au 36 points 1 year ago* (last edited 1 year ago)

That could be part of their plan though... Make people think they're from China when in reality they're a state-sponsored actor from a different country. Hard to tell at this point. The scary thing is they got very close to sneaking this malware in undetected.

A lot of critical projects are only maintained by one person who may end up burning out, so I'm surprised we haven't seen more attacks like this. Gain the trust of the maintainer (maybe fix some bugs, reply to some mailing-list posts, etc), take over maintenance, and slowly add some malware one small piece at a time, interspersed with enough legit commits that you become one of the top contributors (and thus people start implicitly trusting you).

Edit: Based on this analysis, they may have been based in a European timezone and just changed their timezone to UTC+8 before committing to Git to make it look like they were in China: https://rheaeve.substack.com/p/xz-backdoor-times-damned-times-and. Their commits were usually between 9 am and 6 pm Eastern European Time, and there are a few commits where the timezone was set to UTC+2 instead of UTC+8.

load more comments (8 replies)
[-] stardreamer 8 points 1 year ago* (last edited 1 year ago)

According to this post, the person involved exposed a different name at one point.

https://boehs.org/node/everything-i-know-about-the-xz-backdoor

Cheong is not a Pingyin name. It uses Romanization instead. Assuming that this isn't a false trail (unlikely, why would you expose a fake name once instead of using it all the time?) that cuts out China (Mainland) and Singapore which use the Pingyin system. Or somebody has a time machine and grabbed this guy before 1956.

Likely sources of the name would be a country/Chinese administrative zone that uses Chinese and Romanization. Which gives us Taiwan, Macau, or Hong Kong, all of which are in GMT+8. Note that two of these are technically under PRC control.

Realistically I feel this is just a rogue attacker instead of a nation state. The probability of China 1. Hiring someone from these specific regions 2. Exposing a non-pinying full name once on purpose is extremely low. Why bother with this when you have plenty of graduates from Tsinghua in Beijing? Especially after so many people desperate for jobs after COVID.

[-] Moonrise2473@lemmy.ml 4 points 1 year ago

Unrelated, I really like the idea that the author of that blog post to place the favicon near each link

[-] Tywele@lemmy.dbzer0.com 39 points 1 year ago

Yeah, what if they go blue next?

(It's rogue not rouge)

[-] delirious_owl@discuss.online 5 points 1 year ago

I'm pretty sure you just said the same word twice

[-] Moonrise2473@lemmy.ml 13 points 1 year ago

I'm kinda hoping it was just that a state sponsored attacker showed up on their door and said "include this snippet or else..." otherwise it's terrifying thinking of someone planning some long con like this

We are all relying on the honesty of a few overworked volunteers...

load more comments (3 replies)
[-] kaleissin@sopuli.xyz 34 points 1 year ago

Bad title. This is CVE-2024-3094. Run "xz --version" to see if you are affected.

[-] 1henno1@feddit.de 62 points 1 year ago

AFAIK it‘s better to use rpm -q xz xz-libs (copied from the forum replies) to avoid running xz itself just in case the affected version is already installed

[-] Aradia@lemmy.ml 52 points 1 year ago

If you go to the post, on the comments, there is someone that is already telling you to run dnf list xz --installed. So you don't need to run xz directly.

[-] unionagainstdhmo@aussie.zone 6 points 1 year ago

Yeah that's just the title from the thread over on the Fedora forum

[-] InnerScientist@lemmy.world 3 points 1 year ago
[-] unionagainstdhmo@aussie.zone 2 points 1 year ago

Yes but that would be disingenuous. The current title better captures the urgency of the situation

[-] bitwolf@lemmy.one 2 points 1 year ago

If you are checking out the extent of damage on your system do not use ldd to check the links.

You can inadvertently executed the exploit this way.

[-] 0x2d@lemmy.ml 25 points 1 year ago

could this be a nation-state attack? since jiat75 spent multiple years developing a fake persona and it seems like a lot of effort was put into this

load more comments (1 replies)
[-] 56_@lemmy.ml 22 points 1 year ago

I'm on Void, and I had the malicious version installed. Updating the system downgraded xz to 5.4.6, so it seems they are on it. I'll be watching discussions to decide if my system might still be compromised.

load more comments (3 replies)
[-] gnuplusmatt@reddthat.com 14 points 1 year ago

some people in my mastodon feed are suggesting that the backdoor might have connected out to malicious infrastructure or substituted its own SSH host keys, but I can't find any clear confirmation. More info as the investigation progresses.

I guess at this point if you're on Fedora 40 or rawhide clear / regen your host keys, even after xz version rollback

[-] Deathcrow@lemmy.ml 9 points 1 year ago

or substituted its own SSH host keys,

why would the backdoor do that? It would immediately expose itself because every ssh client on the planet warns about changed host keys when connecting.

[-] gnuplusmatt@reddthat.com 3 points 1 year ago* (last edited 1 year ago)

Perhaps it was a poorly worded way of suggesting that invalidating host keys would invalidate all client keys it could potentially generate? Either way it's a lot of speculation.

Resetting the keys and SSH config on any potentially compromised host is probably not a terrible idea

[-] possiblylinux127@lemmy.zip 3 points 1 year ago

If you are on a affected system I would nuke from orbit.

[-] gnuplusmatt@reddthat.com 4 points 1 year ago

Nuke from orbit might be an overreaction, if you need that machine perhaps disable ssh or turn the machine off until later next week when the postmortems happen. If you need that trusted machine now, then yes fresh install

[-] possiblylinux127@lemmy.zip 4 points 1 year ago

Honestly doing a fresh install is a good test of your recovery abilities. You should always have a way to restore critical content in an emergency

load more comments (1 replies)
[-] delirious_owl@discuss.online 14 points 1 year ago

What is the name of the software that is affected??

[-] milicent_bystandr@lemm.ee 15 points 1 year ago

xz is the compromised package, but it in turn compromises ssh authentication

[-] Synnr@sopuli.xyz 20 points 1 year ago* (last edited 1 year ago)

In turn it ~~compromises ssh authentication~~ allows remote code execution via system(); if the connecting SSH certificate contains the backdoor key. No user account required. Nothing logged anywhere you'd expect. Full root code execution.

https://news.ycombinator.com/item?id=39877312

There is also a killswitch hard-coded into it, so it doesn't affect machines of whatever state actor developed it.

https://news.ycombinator.com/item?id=39881018

It's pretty clear this is a state actor, targeting a dependency of one of the most widely used system control software on Linux systems. There are likely tens or hundreds of other actors doing the exact same thing. This one was detected purely by chance, as it wasn't even in the code for ssh.

If people ever wonder how cyber warfare could potentially cause a massive blackout and communications system interruption - this is how.

load more comments (2 replies)
load more comments (2 replies)
[-] IsoSpandy@lemm.ee 11 points 1 year ago

I am looking at these gaggle of posts and all of lemmy is flooded with this and then think that there is an entire Spyware OS on the other side... Which who knows what code it runs and people are chill about it. I am so thankful for this community.

[-] Commiunism@lemmy.wtf 6 points 1 year ago

Damn, I had a malicious version installed on my Arch machine. I've since done a system update which removes the backdoor, but looking more into it, it does seem that only fedora and debian(?) are affected/targeted but better safe than sorry.

load more comments (1 replies)
[-] Auli@lemmy.ca 6 points 1 year ago

Makes you wonder how many of these are out there that have not been found?

load more comments (1 replies)
[-] Player2@lemm.ee 5 points 1 year ago

Using the F40 preview with KDE and a regular update from Discover rolled xz back to the known good version 5.4.6

[-] loops@beehaw.org 5 points 1 year ago

Running Ubuntu 23.10 with xz-utils 5.41 which is unaffected. Versions 5.6.0 and 5.6.1 are the malicious packages. I used Synaptic Package Manager to search for it.

[-] Bitrot@lemmy.sdf.org 8 points 1 year ago

The bad actor had a launchpad bug to pull it into the Ubuntu LTS beta. Serious kudos to the person who discovered it, literally in the nick of time.

[-] possiblylinux127@lemmy.zip 4 points 1 year ago

Same story with Fedora

[-] lengau@midwest.social 3 points 1 year ago

On Ubuntu the only affected people were those running the prerelease of Ubuntu 24.04 who had installed the update from the proposed pocket.

[-] Ludrol@szmer.info 4 points 1 year ago* (last edited 1 year ago)

So far I was affected on termux. There is already package update.

[-] HowManyNimons@lemmy.world 3 points 1 year ago
[-] unionagainstdhmo@aussie.zone 4 points 1 year ago* (last edited 1 year ago)

No thanks. Lol. How many backdoors exist in Windows because we don't see the source? And if something is found they'll probably keep quiet about it. Happy April Fools' a whole day dedicated to people like you

load more comments (4 replies)
[-] prettydarknwild@lemmy.world 3 points 1 year ago

if this happened on windows probably no one would have noticed it until a large cyberattack happened, also, using that logic no one should be using CPU's created after 1995 due to meltdown / spectre

load more comments (2 replies)
load more comments
view more: next ›
this post was submitted on 29 Mar 2024
399 points (100.0% liked)

Linux

52873 readers
279 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS