DiscoverThreat Talks - Your Gateway to Cybersecurity InsightsXZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code
XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

Update: 2024-11-19
Share

Description

How much time would you spend on executing the perfect hack?  


The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to a GitHub repo for one singular reason – access to release manager rights for the next XZ Utils update.




In this episode of Threat Talks, host Lieuwe Jan Koning is joined by Thomas Manolis, Information Security Officer at AMS-IX, and Jeroen Scheerder, Security Specialist at ON2IT, to discuss this meticulously executed breach in the open-source community.


 


Using clever social engineering tactics, Jia Tan (JIAT75) built a credible reputation within said community, gaining trust and access to introduce malicious code undetected. The breach was only discovered by chance when Andres Freund, an engineer at Microsoft, traced unusual system latency back to XZ Utils and uncovered the backdoor.


 


What exactly happened?


How lucky did we get with Freund discovering the backdoor? And how do we know that something like this hasn’t happened before?



🔔 Follow to Support our channel! 🔔
► YOUTUBE: https://youtube.com/@ThreatTalks


► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E


► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520




🗾 Explore the XZ Utils Critical Backdoor Details 🗾



https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf


Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead.


 


👕 Get your own Threat Talks T-shirt


https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/


 


🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX


===


#ThreatTalks #ON2IT #Cybersecurity #Fallacies #CrowdStrike #SecurityMatters

Comments 
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

XZ Utils Critical Backdoor (CVE- 2024-3094) - The Fallacy of Secure Open Source Code

Threat Talks