MITB Banner

Open Source Community’s Swift Response Thwarts Massive Linux Backdoor Attack

Collaborative effort by developers, security experts, and system administrators neutralises threats to millions of computers worldwide

Share

Illustration by Diksha Mishra

Listen to this story

It was an ordinary Wednesday for Andres Freund, a Microsoft software engineer, as he ran routine tests on his Linux machine. But as he investigated a curious slowdown in the “xz” compression library, a little-known piece of Linux software, he stumbled upon something far more nefarious. This sophisticated backdoor could have given attackers unfettered access to millions of computers worldwide.

“The upstream xz repository and the xz tarballs have been back doored,” Freund posted on the OSS-Security mailing list on March 29th, 2024. The news ricocheted through the Linux world as the implications came into focus.

It soon became clear that the attack was a deliberate and sophisticated subversion of a critical piece of the open-source ecosystem. The malicious code, cunningly disguised, granted attackers a foothold on countless Linux systems worldwide.

“This could have been the most widespread and effective backdoor ever planted in any software product,” warned Alex Stamos, the chief trust officer at SentinelOne, on the severity of the breach.

As the Linux community scrambled to contain the damage, a clearer picture of the attack emerged. Under the alias “Jia Tan,” the person had spent months patiently worming their way into the xz project, first with innocuous contributions, then with subtle malicious changes.

Lasse Collin, the project’s original owner for over a decade, was bullied into giving it up to ‘Jia Tan.’ When he could not keep up with the work, he was pressured by a couple of phantom online accounts to relinquish control of the project. Today, Collin, the original XZ maintainer, has taken back control of the project and is cleaning the code.

The Power of Open Source Community 

As Freund alerted the community, security experts and system administrators worked to understand the scope of the problem and develop a fix. One of the first steps was to identify which versions of xz were compromised. 

The community quickly determined that versions 5.6.0 and 5.6.1 contained the malicious code. Linux distributions that had included these versions in their testing or unstable branches swiftly replaced them with safe versions.

When the backdoor was discovered, Linux distributions immediately acted to protect their users. Debian, for example, replaced the compromised version of xz with an earlier, safe version. They kept the new version number to avoid breaking any dependencies but added a note to clarify that it was actually the older, secure version.

Meanwhile, security experts dug into the malicious code to determine exactly how it worked. They found that the attackers had used a clever trick to hijack certain functions in the xz library, allowing them to run their own code and gain control over affected systems. 

Andres Freund, the Microsoft engineer who first discovered the backdoor, described it as “a very mysterious attack.” He noted that “the attackers clearly spent a lot of effort trying to hide what they were doing.”

Despite the attackers’ attempts to cover their tracks, the open-source community was able to dissect the malware and share their findings. By working together and leveraging their collective expertise, the community was able to develop and distribute fixes for the vulnerability quickly.

Within hours, a group of volunteer developers, security experts, and system administrators had mobilised to analyse the malware, patch the vulnerability, and share vital information. One person wrote on HackerNews, “We had to race last night to fix the problem after an inadvertent break of the embargo.”

The Godot Foundation of the open-source Godot Engine posted on X, “As an open-source project ourselves, we try our best to guard the product and our contributors against malicious actors. We consider ourselves really fortunate to have co-maintainers in many areas, even whole teams, to be able to scrutinise PRs closely.”

“Open source (community) caught it and reacted quickly. Like, good job random people on the Internet, open source worked,” Darren Shepherd, Chief Architect & Co-Founder of Acorn Labs, posted on X. In the face of the unprecedented attack on one of the widely used compression libraries, the open source community’s swift response and collaborative problem solving is what open source is all about: working together to fix problems. 

Share
Picture of K L Krithika

K L Krithika

K L Krithika is a tech journalist at AIM. Apart from writing tech news, she enjoys reading sci-fi and pondering the impossible technologies, trying not to confuse it with reality.
Related Posts

CORPORATE TRAINING PROGRAMS ON GENERATIVE AI

Generative AI Skilling for Enterprises

Our customized corporate training program on Generative AI provides a unique opportunity to empower, retain, and advance your talent.

Upcoming Large format Conference

May 30 and 31, 2024 | 📍 Bangalore, India

Download the easiest way to
stay informed

Subscribe to The Belamy: Our Weekly Newsletter

Biggest AI stories, delivered to your inbox every week.

AI Courses & Careers

Become a Certified Generative AI Engineer

AI Forum for India

Our Discord Community for AI Ecosystem, In collaboration with NVIDIA. 

Flagship Events

Rising 2024 | DE&I in Tech Summit

April 4 and 5, 2024 | 📍 Hilton Convention Center, Manyata Tech Park, Bangalore

MachineCon GCC Summit 2024

June 28 2024 | 📍Bangalore, India

MachineCon USA 2024

26 July 2024 | 583 Park Avenue, New York

Cypher India 2024

September 25-27, 2024 | 📍Bangalore, India

Cypher USA 2024

Nov 21-22 2024 | 📍Santa Clara Convention Center, California, USA

Data Engineering Summit 2024

May 30 and 31, 2024 | 📍 Bangalore, India

Subscribe to Our Newsletter

The Belamy, our weekly Newsletter is a rage. Just enter your email below.