{"id":13130,"date":"2025-01-14T13:46:34","date_gmt":"2025-01-14T20:46:34","guid":{"rendered":"https:\/\/mattfife.com\/?p=13130"},"modified":"2025-01-04T14:22:50","modified_gmt":"2025-01-04T21:22:50","slug":"hackers-are-now-targeting-open-source","status":"publish","type":"post","link":"https:\/\/mattfife.com\/?p=13130","title":{"rendered":"Hackers are targeting open-source"},"content":{"rendered":"\n<p>A Microsoft engineer became suspicious of performance problems while optimizing his code. After digging in, he discovered that a simple data compression library called XZ Utils was creating a secret backdoor. What made this discovery noteworthy is that the innocuous looking compression library is used in tons of open-source projects and Linux distributions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"823\" data-attachment-id=\"13131\" data-permalink=\"https:\/\/mattfife.com\/?attachment_id=13131\" data-orig-file=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?fit=896%2C1152&amp;ssl=1\" data-orig-size=\"896,1152\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"00000-3045123986\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?fit=640%2C823&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?resize=640%2C823&#038;ssl=1\" alt=\"\" class=\"wp-image-13131\" style=\"width:529px;height:auto\" srcset=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?resize=796%2C1024&amp;ssl=1 796w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?resize=233%2C300&amp;ssl=1 233w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?resize=768%2C987&amp;ssl=1 768w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?resize=210%2C270&amp;ssl=1 210w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2025\/01\/00000-3045123986.png?w=896&amp;ssl=1 896w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n<\/div>\n\n\n<p>The analysis of how the code got into XZ utils uncovered a fiendishly sophisticated operation. The XZ utility was understaffed with only one primary maintainer. He was increasingly catching flack for falling behind &#8211; an <a href=\"https:\/\/mattfife.com\/?p=11486\" data-type=\"link\" data-id=\"https:\/\/mattfife.com\/?p=11486\">increasing problem with open source projects<\/a>.  An eager developer named Jia Tan had been a contributor to the XZ project since at least\u00a0<a href=\"https:\/\/www.mail-archive.com\/xz-devel@tukaani.org\/msg00512.html\" target=\"_blank\" rel=\"noreferrer noopener\">late 2021<\/a>\u00a0and built trust with the community of developers working on it. Eventually Tan ascended to being co-maintainer of the project which allowed him to add code without needing the contributions to be approved. <\/p>\n\n\n\n<p>Tan did this by what now appears to be a coordinated set of accounts and discussions that were aimed at installing him as a co-owner. Various accounts appeared and started complaining about the speed of updates, features, and questions. They coordinated questions and complaints as well as contributions by Tan appear to create pressure for the owner to elevate Tan as a co-owner. Whether this was done by one person or several, this mechanism is known as &#8216;persona management&#8217; &#8211; <a href=\"https:\/\/aleph.occrp.org\/datasets\/1061?cslimit=30#mode=search&amp;preview%3Aid=5cf88370716b0d35f5f6f298ceb07ced6301bdd4.3ff78af3808ce6d817cc6f7dd3ce7dbd33bafa24&amp;preview%3Aprofile=true\" data-type=\"link\" data-id=\"https:\/\/aleph.occrp.org\/datasets\/1061?cslimit=30#mode=search&amp;preview%3Aid=5cf88370716b0d35f5f6f298ceb07ced6301bdd4.3ff78af3808ce6d817cc6f7dd3ce7dbd33bafa24&amp;preview%3Aprofile=true\">something that&#8217;s been proposed as far back as 2010<\/a>. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cI think the multiple green accounts seeming to coordinate on specific goals at key times fits the pattern of using networks of sock accounts for social engineering that we\u2019ve seen all over social media,\u201d said Molly, the EFF system administrator. \u201cIt\u2019s very possible that the rogue dev, hacking group, or state sponsor employed this tactic as part of their plan to introduce the back door. Of course, it\u2019s also possible these are just coincidences.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>The code introduced was sophisticated enough that analysis of its precise functionality and capability is still\u00a0<a href=\"https:\/\/gist.github.com\/thesamesam\/223949d5a074ebc3dce9ee78baad9e27\" target=\"_blank\" rel=\"noreferrer noopener\">ongoing<\/a>.<\/p>\n\n\n\n<p>The National Counterintelligence and Security Center has defined this kind of attack as a &#8216;supply chain attack&#8217;; and open-source projects are particularly susceptible to it.<\/p>\n\n\n\n<p>It&#8217;s definitely worth reading the article because these kinds of sophisticated social attacks are obviously now reality.<\/p>\n\n\n\n<p>Articles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/theintercept.com\/2024\/04\/03\/linux-hack-xz-utils-backdoor\/\">https:\/\/theintercept.com\/2024\/04\/03\/linux-hack-xz-utils-backdoor\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/arstechnica.com\/security\/2024\/04\/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ars Technica<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.wired.com\/story\/jia-tan-xz-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wired<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gist.github.com\/thesamesam\/223949d5a074ebc3dce9ee78baad9e27\">https:\/\/gist.github.com\/thesamesam\/223949d5a074ebc3dce9ee78baad9e27<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A Microsoft engineer became suspicious of performance problems while optimizing his code. After digging in, he discovered that a simple data compression library called XZ Utils was creating a secret backdoor. What made this discovery noteworthy is that the innocuous looking compression library is used in tons of open-source projects and Linux distributions. The analysis of how the code got into XZ utils uncovered a fiendishly sophisticated operation. The XZ utility was understaffed with only one primary maintainer. He was&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/mattfife.com\/?p=13130\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9,5],"tags":[],"class_list":["post-13130","post","type-post","status-publish","format-standard","hentry","category-cool","category-technical"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4WECr-3pM","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/13130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13130"}],"version-history":[{"count":2,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/13130\/revisions"}],"predecessor-version":[{"id":13133,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/13130\/revisions\/13133"}],"wp:attachment":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}