Saturday, October 5, 2024
Old
Archived

The Other Players Who Helped (Almost) Make the World’s Biggest Backdoor Hack

A shadowy figure spent years ingratiating themself to a developer, then injected a backdoor that could have taken over millions of computers.

A shadowy figure spent years ingratiating themself to a developer, then injected a backdoor that could have taken over millions of computers.

On March 29, Microsoft software developer Andres Freund was trying to optimize the performance of his computer when he noticed that one program was using an unexpected amount of processing power. Freund dove in to troubleshoot and “got suspicious.”

Eventually, Freund found the source of the problem, which he subsequently posted to a security mailing list: He had discovered a backdoor in XZ Utils, a data compression utility used by a wide array of various Linux-based computer applications — a constellation of open-source software that, while often not consumer-facing, undergirds key computing and internet functions like secure communications between machines.

By inadvertently spotting the backdoor, which was buried deep in the code in binary test files, Freund averted a large-scale security catastrophe. Any machine running an operating system that included the backdoored utility and met the specifications laid out in the malicious code would have been vulnerable to compromise, allowing an attacker to potentially take control of the system.

The XZ backdoor was introduced by way of what is known as a software supply chain attack, which the National Counterintelligence and Security Center defines as “deliberate acts directed against the supply chains of software products themselves.” The attacks often employ complex ways of changing the source code of the programs, such as gaining unauthorized access to a developer’s system or through a malicious insider with legitimate access.

Continue reading on the Intercept
Nikita Mazurov is a security researcher focusing on privacy issues revolving around source protection, counter-forensics, and privacy assurance.

Related Posts