WARNING: Malicious code in current pre-release & testing versions/variants: F40 and rawhide affected - users of F40/rawhide need to respond

https://aussie.zone/post/8403669

WARNING: Malicious code in current pre-release & testing versions/variants: F40 and rawhide affected - users of F40/rawhide need to respond - Aussie Zone

I’m genuinely disturbed that a person who was a core developer could just go rogue.

From what I’ve been reading, it sounds like they were malicious from the very beginning. The work to integrate the malware goes back to 2021. boehs.org/…/everything-i-know-about-the-xz-backdo…

It’s an extremely sophisticated attack that was hidden very well, and was only accidentally discovered by someone who noticed that rejected SSH connections (eg invalid key or password) were using more CPU power and taking 0.5s longer than they should have. mastodon.social/…/112180406142695845

Everything I know about the XZ backdoor

Please note: This is being updated in real-time. The intent is to make sense of lots of simultaneous discoveries

From that post, commits set to UTC+0800 and activity between UTC 12-17 indicate that the programmer wasn’t operating from California but from another country starting with C. The name is also another hint.

That could be part of their plan though… Make people think they’re from China when in reality they’re a state-sponsored actor from a different country. Hard to tell at this point. The scary thing is they got very close to sneaking this malware in undetected.

A lot of critical projects are only maintained by one person who may end up burning out, so I’m surprised we haven’t seen more attacks like this. Gain the trust of the maintainer (maybe fix some bugs, reply to some mailing-list posts, etc), take over maintenance, and slowly add some malware one small piece at a time, interspersed with enough legit commits that you become one of the top contributors (and thus people start implicitly trusting you).

Edit: Based on this analysis, they may have been based in a European timezone and just changed their timezone to UTC+8 before committing to Git to make it look like they were in China: …substack.com/…/xz-backdoor-times-damned-times-an…. Their commits were usually between 9 am and 6 pm Eastern European Time, and there are a few commits where the timezone was set to UTC+2 instead of UTC+8.

XZ Backdoor: Times, damned times, and scams

Some timezone observations on the recently discovered backdoor hidden in an xz tarball.

Rhea's Substack
Except China is one of the countries involved in cyber warfare
Pretty much every country is engaged in cyber warfare to some degree
It is kind of sad
That’s what states, militaries and other competition-infected minds do. Usually they say they imagine this to protect from it, then it becomes a weapon and “oops all wars”
I hate to be the bringer of bad news for you but everyone is “completion minded” as you say. That’s how the world works
No, it simply isn’t. And even if it were true, there are people like me, who will gladly only be competitive in games and sports.
No that’s a poisonous ideology that maskerades as normal.