cross-posted from: https://programming.dev/post/36983916

Freund wasn’t looking for a backdoor when he noticed SSH connections to his Debian testing system taking 500 milliseconds longer than usual. As a database engineer benchmarking PostgreSQL performance, he initially dismissed the anomaly. But the engineer’s curiosity persisted.

The backdoor’s technical sophistication was breathtaking. Hidden across multiple stages, from modified build scripts that only activated under specific conditions to obfuscated binary payloads concealed in test files, the attack hijacked SSH authentication through an intricate chain of library dependencies. When triggered, it would grant the attacker complete remote access to any targeted system, bypassing all authentication and leaving no trace in logs.

The backdoored versions 5.6.0 and 5.6.1 had been released in February and March 2024, infiltrating development versions of Fedora, Debian, openSUSE, and Arch Linux. Ubuntu’s upcoming 24.04 LTS release, which would have deployed to millions of production systems, was mere weeks away.

The technical backdoor was merely the final act of a three-year psychological operation that began not with code, but with studying a vulnerable human being.

  • x00z@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 days ago

    The amount of time needed to do this to an opensource project compared to the time needed to do this to closed source software makes this article almost completely meaningless, especially since it’s a recent article and not when this news was still news. It’s clickbait and useless.

    • Kissaki@programming.devOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      5 days ago

      This talks about one issue. You seem to be confident that this one case is representative of the whole FOSS space? I am not.

      Can you elaborate how it would be much easier in closed source software? Because as far as I can see, it’s different. In most cases, you need an actual person instead of an online persona, pass interview and contracting, and then you’re still “the new guy” or Junior in the company or project. It’s not like closed off from public eyes means anyone can do anything without any eyes.

    • A_A@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 days ago

      Since paranoia seems to be a virtue in this case, here i go :

      While your username is essentially XZ, you are advocating for the community to dismissing an analysis addressing the root causes that made it possible for a backdoor in the xz compression utility to be made.

      Hummm … how did you come to choose that username ? … and were there any other articles written previously identifying theses social and funding problems in software infrastructure ?

      Probably i am completely wrong since i know close to nothing about this subject.

      Thanks for your time and attention.

    • BluescreenOfDeath@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 days ago

      I feel like this is missing a big point of the article.

      The vulnerability that the xz backdoor attempt revealed was the developers. The elephant in the room is that for someone capable of writing and maintaining a program so important to modern technical infrastructure, we’re making sure to hang them out to dry. When they burn out because their ‘hobby’ becomes too emotionally draining (either because of a campaign to wear them down intentionally or fully naturally) someone will be waiting to take control. Who can you trust? Here, we see someone attempted (and nearly succeeded) a multi-year effort to establish themselves as a trusted member of the development community who was faking it all along. With the advent of LLMs, it’s going to be even harder to tell if someone is trustworthy, or just a long-running LLM deception campaign.

      Maybe, we should treat the people we rely on for these tools a little better for how much they contribute to modern tech infrastructure?

      And I’ll point out that’s less aimed at the individuals who use tech, and more at the multi-billion-dollar multi-national tech companies that make money hand over fist using the work others donate.