
A sophisticated software supply chain attack targeting the open-source community has been uncovered, revealing a years-long effort to compromise Linux distributions such as Debian and RedHat. The breach, described as a "nightmare scenario" by experts, involved a contributor making suspicious changes to the libarchive project in 2021, replacing the safe_fprint function with a less secure variant, unnoticed at the time. This attack, which could have been disastrous for the IT industry and customers, was aimed at embedding malicious code into software that runs on nearly all publicly accessible internet servers. The discovery of the backdoored package, xz, used in nearly every Linux distribution, came just days after ENISA announced software supply chain attacks as the top cybersecurity threat for the next five years. Further investigations suggest that nation-state hackers could be behind this meticulously planned operation.
The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code. https://t.co/cSo0Or46Ic
Malicious code embedded deep in a piece of software that runs on virtually all publicly accessible internet servers would have served as a “master key” for attackers to steal encrypted data. The most interesting part of the story is how it got there https://t.co/QZmqweA6LD 👇
Software supply chain attacks are now the top cybersecurity threat for the next five years. This announcement was made by ENISA just days prior to the accidental discovery of a backdoored package (xz) used in nearly every Linux distribution. Very prescient https://t.co/w5UqUuYUcB




