eighthave, to fdroid

Three years ago, #FDroid had a similar kind of attempt as the #xz #backdoor. A new contributor submitted a merge request to improve the search, which was oft requested but the maintainers hadn't found time to work on. There was also pressure from other random accounts to merge it. In the end, it became clear that it added a #SQLinjection #vuln. In this case, we managed to catch it before it was merged. Since similar tactics were used, I think its relevant now

https://gitlab.com/fdroid/fdroidclient/-/merge_requests/889

eb, to security
@eb@social.coop avatar

Unfolding now: https://news.ycombinator.com/item?id=39865810

An incredibly technically complex in xz (potentially also in libarchive and elsewhere) was just discovered. This backdoor has been quietly implemented over years, with the assistance of a wide array of subtly interconnected accounts:

The timeline on this is going to take so long to unravel

scy, to random
@scy@chaos.social avatar

Eek. Apparently liblzma (part of the xz package) has a backdoor in versions 5.6.0 and 5.6.1, causing SSH to be compromised.

https://www.openwall.com/lists/oss-security/2024/03/29/4

This might even have been done on purpose by the upstream devs.

Developing story, please take with a grain of salt.

The 5.6 versions are somewhat recent, depending on how bleeding edge your distro is you might not be affected.

#liblzma #xz #lzma #backdoor #ITsecurity #OpenSSH #SSH

tyx, to Meme

I've found the best about .

jdkiser, to fediverse
@jdkiser@social.sdf.org avatar

A week or so later, one good thing about the is how it all pretty much played out on Mastodon and in the . The discussion wasn't on #x or , not or or whatever. Analysis and investigation and discussion happened here on . Even magazine gave credit.

That's a pretty cool milestone.

Tutanota, to microsoft
@Tutanota@mastodon.social avatar

Here's a stark reminder that any #backdoor is a #vulnerability:

"China-based hackers used a stolen sign-in key" to hack into US government's #Microsoft email accounts.

That's why we at Tutanota fight for strong encryption - without any backdoor. 🔒

https://edition.cnn.com/2023/07/12/politics/china-based-hackers-us-government-email-intl-hnk/index.html

rysiek, to microsoft
@rysiek@mstdn.social avatar

Hey it's totally cool that #Microsoft #GitHub blocked access to one of the repositories in the very center of the #xz backdoor saga. :blobeyes:

It's not like a bunch of people are scrambling to try and make sense of all this right now, or that specific commits got linked to directly from media and blogposts and the like. :blobcatcoffee:

Cool, cool. :blobcatfingerguns:

#InfoSec #Backdoor

clairegiordano, to PostgreSQL
@clairegiordano@hachyderm.io avatar

I always liked being on the same Postgres team as @AndresFreundTec because he was smart + hard-working + hypercompetent.

But with his xz backdoor discovery Andres has taken things to a whole new level. Hence this NYT Kevin Roose story and the whole breadbaking & yeast analogy 🤯 for Andres's stubbornly persistent investigation, driven by a "That's weird" feeling....

/cc @bcantrill

Thank you Andres 🙌 https://www.nytimes.com/2024/04/03/technology/prevent-cyberattack-linux.html

#xz #backdoor #PostgreSQL #OpenSource #Microsoft

shamanix, to opensource
@shamanix@mastodon.gamedev.place avatar
0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 ✈️ breach: LockBit leaks 50 GB of data
➝ 🇨🇳 World’s largest commercial bank confirms attack
➝ 🔓 ☁️ Sumo Logic alerts customers about ; advises rotate Sumo Logic API access keys
➝ 🔓 🇮🇪 Electric Ireland admits data breach that could see customer financial data compromised
➝ 🔓 🇨🇦 says ransomware data breach affects 267,000 patients
➝ 🔓 🇸🇬 Marina Bay Sands reward members data breached, over 650k people exposed
➝ 🇮🇱 🇵🇸 🇮🇷 Cyber ops linked to - conflict largely improvised, researchers say
➝ 🧨 🤖 confirms attacks behind ongoing outages
➝ 🛍️ 💸 Fake Ledger Live app in Store steals $768,000 in
➝ 🔓 🐰 ‘Looney Tunables’ Vulnerability Exploited in Attacks
➝ 🇺🇸 🇷🇺 US Sanctions Russian National for Helping Ransomware Groups Launder Money
➝ 🇮🇷 🇮🇱 Iranian Hackers Launch Destructive Cyber Attacks on Israeli and Sectors
➝ 🇫🇷 🇬🇧 , Seek Greater Regulation of Commercial
➝ 🇪🇺 🤐 is trading security for digital
➝ 🇷🇺 🇺🇦 Russian Hackers Used Attack to Disrupt Power in Amid Mass Missile Strikes
➝ 🦠 🚪 Highly invasive snuck into packages targets developers
➝ 🦠 🇰🇵 N. Korea's Blamed for Hacking Machines with ObjCShellz
➝ 🫣 tests usernames that keep your phone number private
➝ 🔐 Microsoft Authenticator now blocks suspicious alerts by default
➝ ☁️ 💰 Researchers Uncover Undetectable Technique on Automation
➝ 👥 💰 Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study
➝ 🩹 Microsoft Says Exchange ‘Zero Days’ Disclosed by Already Patched or Not Urgent
➝ 🐛 Veeam warns of critical bugs in ONE monitoring platform

📚 This week's recommended reading is: "How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language" by Dr Darryl Carlton

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-452023

glynmoody, to opensource
@glynmoody@mastodon.social avatar

The Mystery of ‘Jia Tan,’ the XZ #Backdoor Mastermind - https://www.wired.com/story/jia-tan-xz-backdoor/ "The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code." another reason for governments to support #opensource properly

PrivacyDigest, to python
@PrivacyDigest@mas.to avatar

Fake job target with new

A new campaign tracked as “Dev Popper” is software developers with fake job interviews in an attempt to trick them into installing a Python remote access (RAT).

https://www.bleepingcomputer.com/news/security/fake-job-interviews-target-developers-with-new-python-backdoor/

highway2009, to linux French

#xz #backdoor is a proof #linux et strong! #humor

w8emv, to random
@w8emv@hachyderm.io avatar

Red Hat assigned this issue CVE-2024-3094.

"Subject: backdoor in upstream xz/liblzma leading to ssh server compromise"

As posted to oss-security by Andres Freund andres@

https://www.openwall.com/lists/oss-security/2024/03/29/4

pixelcats, to kpop
@pixelcats@apobangpo.space avatar

For ... long outros are not really a common KPop thing, however this track is a classic and has a cool dance break outro that you gotta love. And they look like such babies! :blobhaj_heart:

Stray Kids - Back Door
https://youtu.be/X-uJtV8ScYk

jbzfn, to debian
@jbzfn@mastodon.social avatar

🍥 Debian Decided to Postpone the 12.6 Release | Linuxiac

「 Without a doubt, the deliberate infiltration of backdoored upstream XZ tarballs into the Debian sid repository a few days ago, allowing remote SSH access without authentication, sparked a real storm in the Linux community 」

https://linuxiac.com/debian-decided-to-postpone-the-12-6-release/

roguelazer, to random
@roguelazer@hachyderm.io avatar

This #xz #backdoor really sucks. You know it's serious because it doesn't even seem to be designed to mine shitcoins!

https://www.openwall.com/lists/oss-security/2024/03/29/4

GayOldTime, to Vintage
@GayOldTime@masto.ai avatar

I don't even know why I have this image in my collection. It clearly doesn't contain innuendo or double entendres of any kind.
#vintage #gay #backdoor #comics

benbe, to random
@benbe@social.chaotikum.org avatar

Interesting analysis of the backdoored function in the #xz #backdoor payload:

https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b

0x58, to Cybersecurity

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #35/2023 is out! It includes the following and much more:

➝ 🔓 🏌🏻‍♂️Golf gear giant #Callaway data breach exposes info of 1.1 million
➝ 🔓👕 Forever 21 data breach affects half a million people
➝ 🔓 🤦🏻‍♂️ #LogicMonitor customers hit by hackers, because of default passwords
➝ 🇺🇸 ⚖️ Lawsuit Accuses University of Minnesota of Not Doing Enough to Prevent #DataBreach
➝ 🎬 🔓 #Paramount discloses data breach following security incident
➝ 🏥 🔓 #Healthcare Organizations Hit by Cyberattacks Last Year Reported Big Impact, Costs
➝ 🇺🇸 🌎 #Microsoft joins a growing chorus of organizations criticizing a #UN cybercrime treaty
➝ 🇺🇸 🦠 U.S. Hacks #QakBot, Quietly Removes Botnet Infections
➝ 🇷🇺 🇺🇦 #Russia targets #Ukraine with new Android #backdoor, intel agencies say
➝ 🇷🇺 🕵🏻‍♂️ Unmasking #Trickbot, One of the World’s Top Cybercrime Gangs
➝ 🇨🇳 👀 ‘Earth Estries’ #Cyberespionage Group Targets Government, Tech Sectors
➝ 🇨🇳 Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
➝ 💸 🇪🇺 Pay our ransom instead of a #GDPR fine, #cybercrime gang tells its targets
➝ 🇺🇸 🇨🇳 #Meta: Pro-Chinese influence operation was the largest in history
➝ 🇪🇸 📸 Spain warns of #LockBit Locker ransomware phishing attacks
➝ 🇵🇱 🚂 Two Men Arrested Following #Poland Railway Hacking
➝ 🇰🇵 🐍 #Lazarus hackers deploy fake #VMware PyPI packages in #VMConnect attacks
➝ 💸 #Classiscam fraud-as-a-service expands, now targets banks and 251 brands
➝ 💬 🎠 Trojanized #Signal and #Telegram apps on Google Play delivered spyware
➝ 🦠 📄 MalDoc in PDFs: Hiding malicious Word docs in PDF files
➝ 🇧🇷 👀 A Brazilian phone #spyware was hacked and victims’ devices ‘deleted’ from server
➝ 👨🏻‍💻 🔐 #GitHub Enterprise Server Gets New Security Capabilities
➝ 🚗 💰 Over $1 Million Offered at New #Pwn2Own #Automotive Hacking Contest
➝ 🩹 #Splunk Patches High-Severity Flaws in Enterprise, IT Service Intelligence
➝ ⛏️ 🔓 Recent #Juniper Flaws Chained in Attacks Following #PoC Exploit Publication

📚 This week's recommended reading is: "Spam Nation: The Inside Story of Organized Cybercrime―from Global Epidemic to Your Front Door" by @briankrebs

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-352023

Freemind, to Cybersecurity
@Freemind@mastodon.online avatar

Despite varied initial infection methods, the core of the attack remains consistent: reliance on PowerShell and the establishment of a scheduled task executing a VBS file.

https://cybersec84.wordpress.com/2023/12/25/winrar-exploited-by-lonepage-unveiling-a-new-data-stealing-backdoor/

freezenet, (edited ) to business
@freezenet@noc.social avatar

Signal CEO Reaffirms Exit of UK if Ordered to Break Encryption Via Online Safety Bill

The CEO of encrypted chat service, Signal, has reaffirmed that they will leave the UK if they are asked to break their encryption.

Fallout from the UKs disastrous passage

https://www.freezenet.ca/signal-ceo-reaffirms-exit-of-uk-if-ordered-to-break-encryption-via-online-safety-bill/

#Business #Privacy #Security #backdoor #britain #encryption #EndtoendEncryption #OnlineSafetyBill #Signal #UK

js, to random
@js@nil.im avatar

One of the sad side-effects of the is that many projects feel like they need to move away from , when the problem wasn’t autoconf itself, but shipping a bunch of .m4 files – and that nobody diffed repo vs tarball (if nobody does that, it doesn’t matter what you do in the repo, e.g. switching build systems).

This is sad because it means cross-compiling stuff will soon no longer be possible, as autoconf is so far the only thing that gets cross-compiling right. CMake is a complete mess, Meson is far from great for cross-compiling and everything else just outright doesn’t support it.

People, clean up your configure.ac, get rid of .m4 and audit repo vs. tarball! That’s less work, much more effective and doesn’t kill cross-compiling!

Also, if you absolutely must blame a piece of software that was used by xz for this: That’ll be , which was the reason for the insane amount of .m4 files in the first place. gettext is a mess and that is really something we should get rid of.

jschauma, to random
@jschauma@mstdn.social avatar

Here's a thorough analysis of all the commits by "Jia Tan" from 2023-08 through 2024-03, showing the many legitimate code changes done before the introduction of the :

https://tukaani.org/xz-backdoor/review.html

jschauma,
@jschauma@mstdn.social avatar

Excellent summary by Solar Designer on oss-security of what's happened in the last two weeks in response to the #xz #backdoor:

https://www.openwall.com/lists/oss-security/2024/04/16/5

Noteworthy:

kernellogger, to linux
@kernellogger@fosstodon.org avatar

Lasse Collin's patch-series updating the #LinuxKernel's #xz code that a few days ago hit #linux-next was dropped for now until backdooring of upstream xz is understood better:

https://lore.kernel.org/all/20240329195602.382cb1c99bb70e3d8c6093ae@linux-foundation.org/

kernellogger,
@kernellogger@fosstodon.org avatar

Lasse Collin, original author of #Xz, replied on #LKML: https://lore.kernel.org/lkml/20240330144848.102a1e8c@kaneli/

"'"[…] I'm on a holiday and only happened to look at my emails and it seems to be a major mess.

My proper investigation efforts likely start in the first days of April. That is, I currently know only a few facts which alone are bad enough.

Info will be updated here: https://tukaani.org/xz-backdoor/"'"

#CVE20243094 #Linux #kernel #LinuxKernel #Backdoor

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines