🚨 Incident Tracking : 2024-03-29 xz-liblzma
Malicious code was embedded in XZ Utils versions 5.6.0 and 5.6.1 impacting SSH, possibly allowing remote access or code execution.
🤔 Open Questions
- What does the payload do?
- What do we know about the threat actor?
- Are there confirmed exploitations?
- No links yet.
📅 Timeline
2024-04-03
2024-04-02
2024-04-01
2024-03-30
- ⭐️ Filippo Valsorda - “It’s RCE, not auth bypass, and gated/unreplayable.”
- ⭐️ XZ Backdoor: Times, damned times, and scams
2024-03-29
- Start Here: 🏁 oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise
- ⭐️ Attack Timeline
- ⭐️ Backdoor in upstream xz/liblzma leading to SSH server compromise - Hacker News
- ⭐️ Payload Analysis
- Debian
- Xe Iaso
- Red Hat, CISA Warn of XZ Utils Backdoor - Decipher
- Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094 - CISA
- Bug #2059417 “Sync xz-utils 5.6.1-1 (main) from Debian unstable …” : Bugs : xz-utils package : Ubuntu
- lcamtuf analysis