Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

We can defeat gravity. The problem is the paperwork involved.


computers / comp.os.linux.misc / Re: Malware find in the news: xz related.

SubjectAuthor
* Malware find in the news: xz related.pH
+- Re: Malware find in the news: xz related.Woozy Song
+* Re: Malware find in the news: xz related.Eli the Bearded
|`- Re: Malware find in the news: xz related.Computer Nerd Kev
+* Re: Malware find in the news: xz related.MarioCCCP
|`* Re: Malware find in the news: xz related.Computer Nerd Kev
| `* Re: Malware find in the news: xz related.Computer Nerd Kev
|  +* Re: Malware find in the news: xz related.D
|  |`* Re: Malware find in the news: xz related.Lew Pitcher
|  | +* Re: Malware find in the news: xz related.Nuno Silva
|  | |+- Re: Malware find in the news: xz related.Lew Pitcher
|  | |+- Re: Malware find in the news: xz related.Rich
|  | |`* Re: Malware find in the news: xz related.Richard Kettlewell
|  | | `* Re: Malware find in the news: xz related.Carlos E.R.
|  | |  `* Re: Malware find in the news: xz related.Rich
|  | |   `* Re: Malware find in the news: xz related.Carlos E.R.
|  | |    `* Re: Malware find in the news: xz related.MarioCCCP
|  | |     `* Re: Malware find in the news: xz related.Rich
|  | |      `* Re: Malware find in the news: xz related.The Natural Philosopher
|  | |       +- Re: Malware find in the news: xz related.Computer Nerd Kev
|  | |       `- Re: Malware find in the news: xz related.Rich
|  | +- Re: Malware find in the news: xz related.D
|  | `- Re: Malware find in the news: xz related.Popping Mad
|  +- Re: Malware find in the news: xz related.Woozy Song
|  `* Re: Malware find in the news: xz related.Carlos E.R.
|   +- Re: Malware find in the news: xz related.David W. Hodgins
|   `* Re: Malware find in the news: xz related.D
|    `* Re: Malware find in the news: xz related.Carlos E.R.
|     `- Re: Malware find in the news: xz related.D
`* Re: Malware find in the news: xz related.John McCue
 `* Re: Malware find in the news: xz related.Grant Taylor
  +* Re: Malware find in the news: xz related.David W. Hodgins
  |+* Re: Malware find in the news: xz related.Rich
  ||`* Re: Malware find in the news: xz related.David W. Hodgins
  || `* Re: Malware find in the news: xz related.Lew Pitcher
  ||  `* Re: Malware find in the news: xz related.Marco Moock
  ||   `* Re: Malware find in the news: xz related.Grant Taylor
  ||    +- Re: Malware find in the news: xz related.David W. Hodgins
  ||    `* Re: Malware find in the news: xz related.Marco Moock
  ||     `- Re: Malware find in the news: xz related.Grant Taylor
  |`* Re: Malware find in the news: xz related.Grant Taylor
  | `- Re: Malware find in the news: xz related.Marc Haber
  `* Re: Malware find in the news: xz related.Rich
   +* Re: Malware find in the news: xz related.David W. Hodgins
   |+* Re: Malware find in the news: xz related.Grant Taylor
   ||`- Re: Malware find in the news: xz related.Richard Kettlewell
   |`- Re: Malware find in the news: xz related.D
   +* Re: Malware find in the news: xz related.Carlos E.R.
   |`* Re: Malware find in the news: xz related.D
   | +* Re: Malware find in the news: xz related.Carlos E.R.
   | |`* Re: Malware find in the news: xz related.Computer Nerd Kev
   | | +- Re: Malware find in the news: xz related.candycanearter07
   | | +- Re: Malware find in the news: xz related.John Dallman
   | | `- Re: Malware find in the news: xz related.Charlie Gibbs
   | `- Re: Malware find in the news: xz related.Popping Mad
   `* Re: Malware find in the news: xz related.Grant Taylor
    +- Re: Malware find in the news: xz related.Rich
    `* Re: Malware find in the news: xz related.Marco Moock
     `* Re: Malware find in the news: xz related.Carlos E.R.
      `- Re: Malware find in the news: xz related.John Dallman

Pages:123
Re: Malware find in the news: xz related.

<qu3sdkxb3m.ln2@Telcontar.valinor>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13081&group=comp.os.linux.misc#13081

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_li...@es.invalid (Carlos E.R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Tue, 2 Apr 2024 03:34:50 +0200
Lines: 24
Message-ID: <qu3sdkxb3m.ln2@Telcontar.valinor>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me>
<6608ab05@news.ausics.net> <6608acc9@news.ausics.net>
<27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net>
<uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me>
<wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor>
<uueer2$2h6d2$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net ZbDbMa3yt+d9+M++tr72ngxGEJx7/gYPaHctom5tbv/E20MIAw
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:jPFccbEXEHibyJTV4egvGm/Nsfg= sha256:s9LQ+J33sXewYcrTjcW4UcyjxWT5Zt3jKFKL+QP/taA=
User-Agent: Mozilla Thunderbird
Content-Language: es-ES, en-CA
In-Reply-To: <uueer2$2h6d2$1@dont-email.me>
 by: Carlos E.R. - Tue, 2 Apr 2024 01:34 UTC

On 2024-04-01 16:03, Rich wrote:
> Carlos E.R. <robin_listas@es.invalid> wrote:
>> On 2024-03-31 23:37, Richard Kettlewell wrote:
>>> Incredibly good luck that it was spotted before it was too widely
>>> deployed. Or bad luck if you were the originator l-)
>>
>> I saw a post (es.comp.os.linux.redes) of someone in which the sshd
>> had weird peaks of high cpu (40%)
>
> The individual who discovered the backdoor was doing some kind of
> performance testing of PostgreSQL. Because of that they were
> monitoring their system's processe's usage and noticed unusual CPU
> usage from sshd. When they started digging into why sshd was spiking
> CPU usage (because it was messing with their PostgreSQL performance
> monitoring) they discovered the sshd backdoor.

No, I mean that it has been seen in the wild.

When the thread I mentioned appeared, we knew nothing of the
vulnerability, it was March 21st.

--
Cheers, Carlos.

Re: Malware find in the news: xz related.

<uuq1br$o5n$1@reader1.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13082&group=comp.os.linux.misc#13082

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.www.mrbrklyn.com!not-for-mail
From: rain...@colition.gov (Popping Mad)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Fri, 5 Apr 2024 19:26:15 -0400
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <uuq1br$o5n$1@reader1.panix.com>
References: <uu7r9s$kh5b$2@dont-email.me> <uubp1i$1qg47$1@dont-email.me>
<uuc1l6$lfl$1@tncsrv09.home.tnetconsulting.net>
<uuc2rc$1sek4$4@dont-email.me> <d1modkxetc.ln2@Telcontar.valinor>
<196482cd-226c-0462-3fb0-f809000a97c3@example.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 5 Apr 2024 23:26:51 -0000 (UTC)
Injection-Info: reader1.panix.com; posting-host="www.mrbrklyn.com:96.57.23.83";
logging-data="24759"; mail-complaints-to="abuse@panix.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <196482cd-226c-0462-3fb0-f809000a97c3@example.net>
 by: Popping Mad - Fri, 5 Apr 2024 23:26 UTC

On 3/31/24 16:46, D wrote:
>>
>
> I'm one hundred percent sure state level actors

I'm 100% sure that usenet users without recognizable names that can be
tracked to real people and shout out irrelevant conspiracy theories need
mental health internvention and can't be taken seriously.

Reuvain

Re: Malware find in the news: xz related.

<uuq2v8$cq2$1@reader1.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13083&group=comp.os.linux.misc#13083

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.www.mrbrklyn.com!not-for-mail
From: rain...@colition.gov (Popping Mad)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Fri, 5 Apr 2024 19:53:40 -0400
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <uuq2v8$cq2$1@reader1.panix.com>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me>
<6608ab05@news.ausics.net> <6608acc9@news.ausics.net>
<27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net>
<uubq8s$1qpft$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 5 Apr 2024 23:54:16 -0000 (UTC)
Injection-Info: reader1.panix.com; posting-host="www.mrbrklyn.com:96.57.23.83";
logging-data="13122"; mail-complaints-to="abuse@panix.com"
User-Agent: Mozilla Thunderbird
Content-Language: en-US
In-Reply-To: <uubq8s$1qpft$1@dont-email.me>
 by: Popping Mad - Fri, 5 Apr 2024 23:53 UTC

On 3/31/24 09:59, Lew Pitcher wrote:
> On Sun, 31 Mar 2024 11:29:08 +0200, D wrote:
>
>> On Sun, 31 Mar 2024, Computer Nerd Kev wrote:
>>
>>> Computer Nerd Kev <not@telling.you.invalid> wrote:
>>>> MarioCCCP <NoliMihiFrangereMentulam@libero.it> wrote:
>>>>>
>>>>> any hints to patch the vulnerability, or will it be
>>>>> addressed soon and be released as security updates ?
>>>>
>>>> The code was targeting Debian, and only reached the Testing version
>>>> of Debian
>>>
>>> And RHEL, and of course all the distros based on those (or at least
>>> those using Systemd).
>>>
>>>
>>
>> How is this exploited? Does it require login/pw?
>
> An "infected" system just needs an SSH server exposed to the internet
> to be exploited. The "bad actor" uses a pre-built key to initiate
> contact and contact doesn't go any further than key validation.
>
> However, the key validation of a bad-actor key causes SSHd to extract
> a payload from the key, and pass that payload to a system(3) call.
>
> So, while the "bad actor" initiator never officially "logs on" to
> the system (no userid, etc), they are afforded sshd privilege-level
> access to the system to run commands.
>
> HTH

Thanks for the rundown Lew.

Reuvain

Re: Malware find in the news: xz related.

<uurb0n$21frv$4@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13084&group=comp.os.linux.misc#13084

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: NoliMihi...@libero.it (MarioCCCP)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Sat, 6 Apr 2024 13:17:43 +0200
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <uurb0n$21frv$4@dont-email.me>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me>
<6608ab05@news.ausics.net> <6608acc9@news.ausics.net>
<27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net>
<uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me>
<wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor>
<uueer2$2h6d2$1@dont-email.me> <qu3sdkxb3m.ln2@Telcontar.valinor>
Reply-To: MarioCCCP@CCCP.MIR
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
Injection-Date: Sat, 06 Apr 2024 11:17:43 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="0962cab837e719e678e7bb94a08060be";
logging-data="2146175"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+i7H1J8Dzz7etuvbJAm4pQ"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:05hX96JNVTdf5lHDkN5sqOprQFc=
In-Reply-To: <qu3sdkxb3m.ln2@Telcontar.valinor>
Content-Language: en-GB, it-IT
 by: MarioCCCP - Sat, 6 Apr 2024 11:17 UTC

On 02/04/24 03:34, Carlos E.R. wrote:
> On 2024-04-01 16:03, Rich wrote:
>> Carlos E.R. <robin_listas@es.invalid> wrote:
>>> On 2024-03-31 23:37, Richard Kettlewell wrote:
>>>> Incredibly good luck that it was spotted before it was
>>>> too widely
>>>> deployed. Or bad luck if you were the originator l-)
>>>
>>> I saw a post (es.comp.os.linux.redes) of someone in which
>>> the sshd
>>> had weird peaks of high cpu (40%)
>>
>> The individual who discovered the backdoor was doing some
>> kind of
>> performance testing of PostgreSQL.  Because of that they were
>> monitoring their system's processe's usage and noticed
>> unusual CPU
>> usage from sshd.  When they started digging into why sshd
>> was spiking
>> CPU usage (because it was messing with their PostgreSQL
>> performance
>> monitoring) they discovered the sshd backdoor.
>
> No, I mean that it has been seen in the wild.
>
> When the thread I mentioned appeared, we knew nothing of the
> vulnerability, it was March 21st.
>
apart from all tech details, had the chap that put this
backdoor in the systems been detained yet ?

--
1) Resistere, resistere, resistere.
2) Se tutti pagano le tasse, le tasse le pagano tutti
MarioCPPP

Re: Malware find in the news: xz related.

<uurmtf$24mkl$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13085&group=comp.os.linux.misc#13085

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ric...@example.invalid (Rich)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Sat, 6 Apr 2024 14:40:47 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <uurmtf$24mkl$3@dont-email.me>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me> <6608ab05@news.ausics.net> <6608acc9@news.ausics.net> <27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net> <uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me> <wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor> <uueer2$2h6d2$1@dont-email.me> <qu3sdkxb3m.ln2@Telcontar.valinor> <uurb0n$21frv$4@dont-email.me>
Injection-Date: Sat, 06 Apr 2024 14:40:47 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3b8ed155215b6d4ec970ef050f5bcd80";
logging-data="2251413"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX183YlRm2fLgI4J1p3ZqdCPp"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:e7rKpH6oMagDcQL5lK/XVcLPRiI=
 by: Rich - Sat, 6 Apr 2024 14:40 UTC

MarioCCCP <NoliMihiFrangereMentulam@libero.it> wrote:
> apart from all tech details, had the chap that put this
> backdoor in the systems been detained yet ?

Last reports have been that no one knows who is behind the Jia Tan name
in real life.

So if that info is not "being withheld" then it is reasonable to
presume that no one has been detained yet.

And, if the attack, given its patience and sophistication, is as some
surmise, the work of state actors in the employ of their government
(i.e. NSA, CIA, Russia, China, North Korea, etc.) then it is unlikely
that anyone will ever be detained nor will anyone be named.

Re: Malware find in the news: xz related.

<uurvd2$26q3g$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13086&group=comp.os.linux.misc#13086

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: tnp...@invalid.invalid (The Natural Philosopher)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Sat, 6 Apr 2024 18:05:38 +0100
Organization: A little, after lunch
Lines: 28
Message-ID: <uurvd2$26q3g$1@dont-email.me>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me>
<6608ab05@news.ausics.net> <6608acc9@news.ausics.net>
<27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net>
<uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me>
<wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor>
<uueer2$2h6d2$1@dont-email.me> <qu3sdkxb3m.ln2@Telcontar.valinor>
<uurb0n$21frv$4@dont-email.me> <uurmtf$24mkl$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 06 Apr 2024 17:05:39 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="9ec14bb54f6124da973f498fc0a61e6e";
logging-data="2320496"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/9Z5q+rQYvUoAYtg6xP/n7gtzu+ZOqNVo="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:xu2kL6oGqvH+wAxFbrNJT73L+ro=
Content-Language: en-GB
In-Reply-To: <uurmtf$24mkl$3@dont-email.me>
 by: The Natural Philosop - Sat, 6 Apr 2024 17:05 UTC

On 06/04/2024 15:40, Rich wrote:
> MarioCCCP <NoliMihiFrangereMentulam@libero.it> wrote:
>> apart from all tech details, had the chap that put this
>> backdoor in the systems been detained yet ?
>
> Last reports have been that no one knows who is behind the Jia Tan name
> in real life.
>
Oh I think someone does..

> So if that info is not "being withheld" then it is reasonable to
> presume that no one has been detained yet.
>
> And, if the attack, given its patience and sophistication, is as some
> surmise, the work of state actors in the employ of their government
> (i.e. NSA, CIA, Russia, China, North Korea, etc.) then it is unlikely
> that anyone will ever be detained nor will anyone be named.

It is at least comforting that if it were, they must not already have
such access, or they would not have bothered.

--
“It is hard to imagine a more stupid decision or more dangerous way of
making decisions than by putting those decisions in the hands of people
who pay no price for being wrong.”

Thomas Sowell

Re: Malware find in the news: xz related.

<6611ca71@news.ausics.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13087&group=comp.os.linux.misc#13087

  copy link   Newsgroups: comp.os.linux.misc
Message-ID: <6611ca71@news.ausics.net>
From: not...@telling.you.invalid (Computer Nerd Kev)
Subject: Re: Malware find in the news: xz related.
Newsgroups: comp.os.linux.misc
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me> <6608ab05@news.ausics.net> <6608acc9@news.ausics.net> <27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net> <uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me> <wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor> <uueer2$2h6d2$1@dont-email.me> <qu3sdkxb3m.ln2@Telcontar.valinor> <uurb0n$21frv$4@dont-email.me> <uurmtf$24mkl$3@dont-email.me> <uurvd2$26q3g$1@dont-email.me>
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i586))
NNTP-Posting-Host: news.ausics.net
Date: 7 Apr 2024 08:19:29 +1000
Organization: Ausics - https://newsgroups.ausics.net
Lines: 29
X-Complaints: abuse@ausics.net
Path: i2pn2.org!i2pn.org!news.bbs.nz!news.ausics.net!not-for-mail
 by: Computer Nerd Kev - Sat, 6 Apr 2024 22:19 UTC

The Natural Philosopher <tnp@invalid.invalid> wrote:
> On 06/04/2024 15:40, Rich wrote:
>>
>> And, if the attack, given its patience and sophistication, is as some
>> surmise, the work of state actors in the employ of their government
>> (i.e. NSA, CIA, Russia, China, North Korea, etc.) then it is unlikely
>> that anyone will ever be detained nor will anyone be named.
>
> It is at least comforting that if it were, they must not already have
> such access, or they would not have bothered.

I don't follow that. Hackers, especially state funded hackers with
unlimited resources, will always want more options for getting into
systems. That way when one vulnerability is discovered or doesn't
apply to a particular usage case, another can be selected straight
away.

It's identical to arms development. Nobody ever stops working on
this stuff unless the money gets cut off.

What this does show is that social engineering techniques are
being used very successfully, which means it's quite likely that
similar attacks _are_ going on against other software projects.
Some probably from the same office, if not the same person, as
"Jia Tan".

--
__ __
#_ < |\| |< _#

Re: Malware find in the news: xz related.

<eplaekx4iu.ln2@Telcontar.valinor>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13094&group=comp.os.linux.misc#13094

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_li...@es.invalid (Carlos E.R.)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Sun, 7 Apr 2024 16:05:02 +0200
Lines: 30
Message-ID: <eplaekx4iu.ln2@Telcontar.valinor>
References: <uu7r9s$kh5b$2@dont-email.me> <uubp1i$1qg47$1@dont-email.me>
<uuc1l6$lfl$1@tncsrv09.home.tnetconsulting.net>
<uuc2rc$1sek4$4@dont-email.me>
<uucdc3$47g$2@tncsrv09.home.tnetconsulting.net>
<uuds4o$2bid0$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Gm5Ut//rjAUAhRRuMbTZEA4kTtQ+IoRps8GNpmgYWjqA3wJ75/
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:IrO+RBM8gZMJZhYk+IHxdfcf7oQ= sha256:/osgtKwl/yaxlhwG2TgipV+ghwXUkHNyKwX1MCO61QU=
User-Agent: Mozilla Thunderbird
Content-Language: es-ES, en-CA
In-Reply-To: <uuds4o$2bid0$2@dont-email.me>
 by: Carlos E.R. - Sun, 7 Apr 2024 14:05 UTC

On 2024-04-01 10:44, Marco Moock wrote:
> On 31.03.2024 um 14:25 Uhr Grant Taylor wrote:
>
>> N.B. there is a big difference in saying that *BSD / Slackware /
>> Gentoo (OpenRC) aren't effected by the topic at hand because they
>> aren't using systemd and saying that they are obviously more secure
>> because they aren't vulnerable to the topic at hand.
>
> They are not affected because the author of the backdoor maybe intended
> to only affect sshd linked to xz or simply forgot that there are
> systems that won't be affected by the back door.
> Linux distributions with systemd are now the vast majority, so maybe
> the author didn't care about some Gentoo or slackware machines.

Maybe they have certain machines in mind for attacking, and they know
what they run

And maybe another actor is working on attacking those others. They do
not want/need a single vulnerability for attacking everything. Less
surface for detection.

> If he liked, he could affect them too because they most likely have
> liblzma installed for other purposes. Although, sshd could be affected,
> but various other packages could be if the author intended to do that.
>

--
Cheers, Carlos.

Re: Malware find in the news: xz related.

<memo.20240407170504.4708h@jgd.cix.co.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13095&group=comp.os.linux.misc#13095

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: jgd...@cix.co.uk (John Dallman)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Sun, 7 Apr 2024 17:05 +0100 (BST)
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <memo.20240407170504.4708h@jgd.cix.co.uk>
References: <eplaekx4iu.ln2@Telcontar.valinor>
Reply-To: jgd@cix.co.uk
Injection-Date: Sun, 07 Apr 2024 16:05:05 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="a679e9d63eb883101d763daff28b2175";
logging-data="3028129"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19E8qQTRhHRuycdNlSvh0M7EFP3UpFXR5g="
Cancel-Lock: sha1:xCLR7sh6C6OeTprtOxxx4CPl+6g=
 by: John Dallman - Sun, 7 Apr 2024 16:05 UTC

In article <eplaekx4iu.ln2@Telcontar.valinor>, robin_listas@es.invalid
(Carlos E.R.) wrote:
> On 2024-04-01 10:44, Marco Moock wrote:
> > Linux distributions with systemd are now the vast majority, so
> > maybe the author didn't care about some Gentoo or slackware machines.
>
> Maybe they have certain machines in mind for attacking, and they
> know what they run

The build script part of the attack activated when building .deb or .rpm
packages. If it had not been detected, it would have got into Debian
stable, and then into the vast array of derivatives, notably Ubuntu. It
would also have got into RHEL. That doesn't have direct downstreams any
more, but Rocky, Alma and Oracle follow its example in taking updated
packages, and Amazon Linux takes a fair bit of notice.

The combination of these targets would have compromised a large fraction
of the world's cloud servers. The problem for an intelligence agency
would have been finding the most interesting data, not in getting it.

John

Re: Malware find in the news: xz related.

<uv0t6j$3hgh7$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13107&group=comp.os.linux.misc#13107

  copy link   Newsgroups: comp.os.linux.misc
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ric...@example.invalid (Rich)
Newsgroups: comp.os.linux.misc
Subject: Re: Malware find in the news: xz related.
Date: Mon, 8 Apr 2024 13:58:43 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 54
Message-ID: <uv0t6j$3hgh7$1@dont-email.me>
References: <uu7r9s$kh5b$2@dont-email.me> <uua83j$19ff9$1@dont-email.me> <6608ab05@news.ausics.net> <6608acc9@news.ausics.net> <27bd4b53-920c-f119-6d15-7e844d4a39ea@example.net> <uubq8s$1qpft$1@dont-email.me> <uuc04d$1s3mb$1@dont-email.me> <wwvsf06rsjs.fsf@LkoBDZeT.terraraq.uk> <61oqdkx35b.ln2@Telcontar.valinor> <uueer2$2h6d2$1@dont-email.me> <qu3sdkxb3m.ln2@Telcontar.valinor> <uurb0n$21frv$4@dont-email.me> <uurmtf$24mkl$3@dont-email.me> <uurvd2$26q3g$1@dont-email.me>
Injection-Date: Mon, 08 Apr 2024 13:58:43 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="86121a6074976ba33ebd98cad4b36a65";
logging-data="3719719"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX187aMyViWFu8hlUTgq68ESb"
User-Agent: tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Cancel-Lock: sha1:u5YPrXit/CImUufUvDSt7l7di+0=
 by: Rich - Mon, 8 Apr 2024 13:58 UTC

The Natural Philosopher <tnp@invalid.invalid> wrote:
> On 06/04/2024 15:40, Rich wrote:
>> MarioCCCP <NoliMihiFrangereMentulam@libero.it> wrote:
>>> apart from all tech details, had the chap that put this
>>> backdoor in the systems been detained yet ?
>>
>> Last reports have been that no one knows who is behind the Jia Tan name
>> in real life.
>>
> Oh I think someone does..

Well, obviously, the individual(s) behind the Jia Tan name know their
own name(s).

If they were, as has been surmised, for pay state actors, then their
bosses also know their names (and also may know what they were up to).

But so far we've not been made privy to those details, so if anyone
outside the ones behind the nick and/or their bosses (if they are
employed by one of the world's governments) know the names, such
details having been revealed to the greater world.

>> So if that info is not "being withheld" then it is reasonable to
>> presume that no one has been detained yet.
>>
>> And, if the attack, given its patience and sophistication, is as some
>> surmise, the work of state actors in the employ of their government
>> (i.e. NSA, CIA, Russia, China, North Korea, etc.) then it is unlikely
>> that anyone will ever be detained nor will anyone be named.
>
> It is at least comforting that if it were, they must not already have
> such access, or they would not have bothered.

There is that. Other than a govt. sponsored entity wanting to insert
plural back doors so that should one be found, they still have another
to utilize. And in this case the backdoor was caught before it was
deployed.

On the other hand, a compression library did also give a good cover for
hiding the actual package. The actual backdoor was hiding inside
purported "broken test archives" for testing the error handling paths
of the compression library. The test data had been "broken" in a
reversible way so that the autoconf changes could "unbreak" the xz
archives and actually extract the payloads.

Other libraries that are not parsers for binary data formats will not
normally have binary test data blobs for their unit tests in their
tests section, so any back door code has fewer hidden 'caves' into
which to hide itself. Note, I'm not saying this means non-crompression
libraries are /safe/ from an attack like this. All I'm saying is there
are fewer hidden corners to stuff things when there are no binary blobs
as part of the build/test process. So the process of hiding the
payload from view becomes much more difficult.

Pages:123
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor