84
Kaspersky analysis of the backdoor in XZ
(web.archive.org)
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
Ngl kaspersky is the close to the last group I care to hear from about security
https://www.techopedia.com/news/kasperskys-us-ban-a-long-history-of-espionage-kgb-nsa-and-edward-snowden
Right. After posting this I saw the blog post by jfrog, which seems to do a very good job : https://jfrog.com/blog/xz-backdoor-attack-cve-2024-3094-all-you-need-to-know/
Well, it doesn't invalidate the analysis.
This was a sophisticated attack happening over 2 years, from knowing the current maintainer was emotionally vulnerable to the structure of using the build system to introduce the patched code to Linux distro repos.
I'm guessing Kaspersky will come to the same conclusions many others have; that this was a state actor or similiarly well heeled group.
First time I've seen somebody acknowledge that it's not just nation states with such capabilities. There are some huge organized crime syndicates.
But from what I've seen cybersec is mostly about blaming Russia/China/DPRK