Still paniking, cause the backdoor was apparently targetting Debian servers, it was discovered just by chance and the “mantainer” made commits for 2 years in the same repo
and it was only discovered accidentally, when someone was profiling some stuff, noticed SSH using a bit too much CPU power when receiving connections even for invalid usernames/passwords, and spent the time to investigate it more deeply. A lot of developers aren’t that attentive, and it could have easily snuck through.
I’ve never read your blogs but I think it would be good for more people to do write ups on the XZ backdoor. There is a lot that can be learned and improved
Still paniking, cause the backdoor was apparently targetting Debian servers, it was discovered just by chance and the “mantainer” made commits for 2 years in the same repo
The fact that this was planned is what makes me nervous. Imagine what else is lurking.
and it was only discovered accidentally, when someone was profiling some stuff, noticed SSH using a bit too much CPU power when receiving connections even for invalid usernames/passwords, and spent the time to investigate it more deeply. A lot of developers aren’t that attentive, and it could have easily snuck through.
hey Dan, why don’t you post blogs now?
I’ve been meaning to start blogging again. It’s just been a lack of free time. Need to think of ideas, too.
understandable mate, have a nice day!
I’ve never read your blogs but I think it would be good for more people to do write ups on the XZ backdoor. There is a lot that can be learned and improved