Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

  Рет қаралды 22,874

Jadi

Jadi

Күн бұрын

In the latest liblzma update, a trusted bad actor called 'JiaT75' implemented a backdoor which allows RCE (sending calls to system()) on ssh connections. Here I'm looking into the case and explaining how it works.
Links:
- AndresFreundTec on Mastodon: mastodon.socia...
- openwall email: www.openwall.c...
- debian repo: salsa.debian.o...
- Filippo Valsorda on bsky: bsky.app/profi...

Пікірлер: 98
@isbestlizard
@isbestlizard 6 ай бұрын
God bless we have open source developers CURIOUS enough to pull the thread of a 0.5 second ssh slowdown until it unravels, not merely to shrug and think 'huh computer must be acting a little slow today whatever'
@dominikvonlavante6113
@dominikvonlavante6113 3 ай бұрын
An 0,5s slowdown is actually tremendous. But nobody pays attention to that detail.
@bradleypout1820
@bradleypout1820 6 ай бұрын
WOW amazing how you explained it, step by step BUT explained the little things average person wouldnt know. THANKS!
@geekingjadi
@geekingjadi 5 ай бұрын
You're very welcome!
@AllanSitte
@AllanSitte 5 ай бұрын
This should be a gut check to the open source community. Everyone should take time to review all components of their respective projects. Yes... everyone. Considering the complexity of this compromise (including the time spent to social engineer the project team), it plausible that this kind of attack may have been successful in other projects.
@iilliya8
@iilliya8 6 ай бұрын
for someone to go this length to put a backdoor,I don't think it be a person or even small groups of people this was definitely from a larger entity 😑
@geekingjadi
@geekingjadi 6 ай бұрын
My blind guest is also a nation state level attack
@iilliya8
@iilliya8 6 ай бұрын
@@geekingjadi yeah I guess that so 🤔 lm thinking ,maybe there be other backdoors like this which still not been found! What’s your opinion?
@tonyzone8999
@tonyzone8999 6 ай бұрын
Ya our government. I’ve seen this attack done and I’ve also analyzed the code. It’s a government back door 100%
@Batwam0
@Batwam0 5 ай бұрын
@@iilliya8ssh is obviously a primary target to allow access but I hope that they will look around in case similar attacks have been included anywhere else
@IMBlakeley
@IMBlakeley 5 ай бұрын
Makes you wonder how many others there maybe
@morningstar2219
@morningstar2219 5 ай бұрын
Thanks to YT Recommendation for showing this channel !
@geekingjadi
@geekingjadi 5 ай бұрын
Thanks for coming
@thanostzia
@thanostzia 4 ай бұрын
Very nice video! Good explanation, was able to follow along even if I didn't have knowledge on some of the things that were mentioned
@geekingjadi
@geekingjadi 4 ай бұрын
Glad it was helpful! And if you knew everything in the video, it was a waste of time to watch :) and if you grasped 100% of it in one go, you were not learning much. The best learning is when you learn some new things and have a glance on some other stuff which you may learn about in the future.
@surfingbilly9654
@surfingbilly9654 5 ай бұрын
best explanation by far regarding this issue so far, keep it up!
@geekingjadi
@geekingjadi 5 ай бұрын
Awesome, thank you!
@k1tajfar714
@k1tajfar714 6 ай бұрын
LOVED THIS!!! Super interesting. More and more videos like this please! Checking on the CVE s and stuff like that! To me it sounds more like I'm in a hackerish movie having the same journey with you. Pretty informative and entertaining video. Thanks.
@obtron
@obtron 6 ай бұрын
Wow, superb explanation. Subscribed!
@geekingjadi
@geekingjadi 5 ай бұрын
Awesome, thank you!
@StuXan0
@StuXan0 6 ай бұрын
so basically he was using the infected xz library which was injected to ssh initialization method to literally login into every single server which is using key-based authentication on their ssh? tbh he was about to land a very historical attack, but fortunately he was unlucky enough to get caught fast
@geekingjadi
@geekingjadi 6 ай бұрын
This was a remote code execution attack. And yes.. would be a historical access to all servers if found it's way to major distros unnoticed
@danyalt8221
@danyalt8221 6 ай бұрын
Interesting and cool content, Thanks Jadi!👍
@geekingjadi
@geekingjadi 6 ай бұрын
Glad you liked it!
@forivall
@forivall 6 ай бұрын
My guess with lang is that gettext lookups help obscure or enable the backdoor's behaviour. I don't know gettext, but I imagine it does some addressing magic to make translation lookups fast.
@forivall
@forivall 6 ай бұрын
Also, from what I read, xz is loaded because systemd uses it
@geekingjadi
@geekingjadi 5 ай бұрын
Right right.. thanks for adding this. forgot to mention it. Will thumbs up so people will see it
@LiEnby
@LiEnby 5 ай бұрын
I dont understand how they made the tarball different to the upstream repo .. its not like he had access to github itself It looks like an autoconf rule to make it not include the backdoor rather than the tarballs actually differing?
@geekingjadi
@geekingjadi 5 ай бұрын
I have not checked this personally because the xz repo is not public / accessible anymore. but consider these points: 1. github tarballs can be uploaded separately. So you can have code in your tarball which is not in your git. 2. The malicious code was in a "test" file and was summoned using a m4 file.
@panagiotischagias4119
@panagiotischagias4119 6 ай бұрын
Thanks for the explanation.
@agnescode
@agnescode 6 ай бұрын
The video was exciting and interesting 👌🏼
@geekingjadi
@geekingjadi 6 ай бұрын
Glad you enjoyed it!
@tigros999
@tigros999 3 ай бұрын
but now some bad actors just learned some really neat tricks heh
@vahidmostofi6940
@vahidmostofi6940 6 ай бұрын
Thank you for explaining this. this was super exciting. Unrealted, but can you mention what Pen tool you are using? Hardware/Software
@geekingjadi
@geekingjadi 5 ай бұрын
Sure thing! Its a super old bamboo from wacom. So old that the driver wont works on Mac anymore and needs patching. the software under mac is Screenbrush and under linux I use gromit-mpx
@isbestlizard
@isbestlizard 6 ай бұрын
Is it possible to automatically diff every source tarball and the github contents and look for what could be extra lines in any of the other tens of thousands of packages being built?
@geekingjadi
@geekingjadi 5 ай бұрын
yes. but it will be 1000s of lines of code. in this case, the distros are trusting the "trusted" packages... In some countries the state do have a "recommended" distro which is checked by auditors. But they should be using older versions of everything.
@isbestlizard
@isbestlizard 6 ай бұрын
Is it possible to use AI to fingerprint the malicious script? Like, look at the way they use line breaks, spacing, indentation, quirks and ideosyncracies, to extract a fingerprint and use that to link to other scripts that use the same 'hand'?
@johncarlson2632
@johncarlson2632 6 ай бұрын
currently AI can’t reliably detect sometimes even basic patterns. It’s also very prone to giving false positives. Catching stuff like that is very high level digital forensics. Maybe a specific AI developed to recognize those patterns and trained to recognize those patterns could in a few years. But it would only be used as a compass and not a metal detector
@geekingjadi
@geekingjadi 5 ай бұрын
AI works based on seen patterns / lots of samples. Your idea already works on things like "recognizing the vandalism on wikipedia" but we do not have enough/alot of samples in programming yet... so as @johncarlson2632 said, it is possible to train an AI, but there will be lots of false positives. And.... in this case, the person with high privileges has done this... he would disable / bypass the AI too.
@Noname23489
@Noname23489 5 ай бұрын
just curious.... why would large organizations be using operating systems that get updates from open source git repositories? maybe im understanding this attack wrong just curious if you dont mind educating me
@geekingjadi
@geekingjadi 5 ай бұрын
Whats the other choice? Otherwise they have to use an operating system which they do not know anything about its source code / programmers / ... . If someone is doing something super critical, they have to have their own GNU/Linux distro and audit all the code they use. This means 1. a super minimal distro and 2. using the older software and 3. lots of expenses.
@rar4-s5j
@rar4-s5j 6 ай бұрын
🔥
@Entropy67
@Entropy67 5 ай бұрын
this should serve as a PSA, no binaries should ever be committed to open source, never in the codebase itself.
@mechassistant
@mechassistant 6 ай бұрын
Danke 😁
@alimahdavi9775
@alimahdavi9775 6 ай бұрын
nice
@miladganji1921
@miladganji1921 6 ай бұрын
انگلیسیت خیلی کیوته جادی 😍
@lv3609
@lv3609 5 ай бұрын
It scape detection for almost 2 years, until some unique developer locked into the strange execution delay in milliseconds (most people wouldn’t care much). Meaning, this could have been going for much longer (if was not for that odd developer), bleeding heart hack is just another example. That is, millions of lines of code, trowing thousands or million of man looking at that millions lines of code doesn’t mean every bug or every hack will be detected.
@NoONE-bk7ud
@NoONE-bk7ud 5 ай бұрын
you are just better
@GyroO7
@GyroO7 6 ай бұрын
so even code bros are not safe on the internet
@AndreyDerkach8
@AndreyDerkach8 6 ай бұрын
it's a huge lol
@prajnaparamitahrdaya
@prajnaparamitahrdaya 6 ай бұрын
Anonymous
@hqcart1
@hqcart1 5 ай бұрын
the fact that repos are moderated by individuals makes the whole echo system unreliable.
@geekingjadi
@geekingjadi 5 ай бұрын
Right. Another critical, single point of failure attack vector
@Noname23489
@Noname23489 5 ай бұрын
just curious.... why would large organizations be using operating systems that get updates from open source git repositories? maybe im understanding this attack wrong just curious if you dont mind educating me
@hqcart1
@hqcart1 5 ай бұрын
@@Noname23489 This is how life was going before, but i don't think it will be anymore, just like before and after 9/11, going to security checks has changed forever.
@stefsot2
@stefsot2 5 ай бұрын
stop repeating the same stuff 3-4 times with different words, it gets tiring
@geekingjadi
@geekingjadi 5 ай бұрын
thanks for the hint. will try.
@xamashee
@xamashee 5 ай бұрын
Best explainer so far 🎉 good on you
@geekingjadi
@geekingjadi 5 ай бұрын
Glad it was helpful!
@pedramardakani
@pedramardakani 6 ай бұрын
Tests and benchmarks save the day 😄This could add to the good reputation of tests and benchmarks :)) Great stuff Jadi. The content is great 👍
@geekingjadi
@geekingjadi 5 ай бұрын
Very true!
@AlexanderTrefz
@AlexanderTrefz 5 ай бұрын
The exploit literally was hidden in the tests, this does not add to the reputation of tests.
@pedramardakani
@pedramardakani 5 ай бұрын
@@AlexanderTrefz How come? It's not about the test files, environment, or functions, it's about the act of "testing" itself.
@bowserlv100
@bowserlv100 5 ай бұрын
What I find most ABSURD about this is that practically NOBODY anywhere pays due attention to; HOW was it possible to see something like a failure where EVERYONE was blindly ignoring, TIME. The guy who discovered this flaw said: "I noticed an unusual delay in access... I ran a checking program and saw that there was an increase of 300 ms." NOBODY talks about it, no one cares and right now what must be backdoors are being hastily explored before they are blocked. FOR LOVE.
@AndreaBorman
@AndreaBorman 5 ай бұрын
Yes I have heard about this. I am a Linux user who changed to Linux two years ago after Microsoft stopped support for Windows 8. On Windows we would just install an anti virus program and scan our computer with that. We also had Windows Firewall. Maybe we will have to start using anti virus on Linux. There are anti virus programs for Linux as well as Firewalls. I am a bit surprised that no one has suggested this.
@geekingjadi
@geekingjadi 5 ай бұрын
In most cases anti viruses are used on Linux to detect windows based viruses on share files, emails, ... . On Linux we trust our distro and the fact that no virus can not just spread to servers as it does in the windows world. Firewalls are also there, deep in the OS (iptables).
@Entropy67
@Entropy67 5 ай бұрын
lol on windows your antivirus is the virus, and the backdoors are built in to windows by some upset employee. Since no one can look at closed source code, the back doors go eternally undiscovered. Antivirus can't stop what it doesn't know, and it can't analyze that which has greater authority (the OS itself). The reason why you are hearing about this is because this is open source. You would not hear about it if it was closed source, you would just quietly get violated. After all, who would look into a half second delay on windows?
@CrazyUncleJack
@CrazyUncleJack 5 ай бұрын
The Linux version of “antivirus” is that it’s open source and the holes get patched quickly, thus utterly negating the virus. It’s a completely different paradigm.
@atajahangiri5861
@atajahangiri5861 6 ай бұрын
VERY very GOOD video
@Griimnak
@Griimnak 6 ай бұрын
Great explanation Jadi
@tajsec498
@tajsec498 6 ай бұрын
خیال کردم از این ویژگی های جدیده یوتوبِ که جادی انگلیسی شده، بعد دیدم نه واقعا انگلیسی صحبت میکنه :)) کمی عجیب به نظر میاد. گریت ویدیو تنکس.
@samas69420
@samas69420 5 ай бұрын
how do you draw on screen to take notes?
@geekingjadi
@geekingjadi 5 ай бұрын
Screenbrush on Mac, gromit mpx on Linux
@r.e.434
@r.e.434 6 ай бұрын
what are you using for the writing?
@geekingjadi
@geekingjadi 5 ай бұрын
on the screen you mean? screenbrush under Mac & gromit-mpx under Linux
@md.hasanurrohmankhan5173
@md.hasanurrohmankhan5173 5 ай бұрын
Thank you 😊
@geekingjadi
@geekingjadi 5 ай бұрын
You're welcome 😊
@sepidehsoroush
@sepidehsoroush 6 ай бұрын
Very well explained👏🏻
@geekingjadi
@geekingjadi 6 ай бұрын
Thank you 🙂
@erfanffa
@erfanffa 6 ай бұрын
great as always
@geekingjadi
@geekingjadi 5 ай бұрын
Thank you! Cheers!
@IMBlakeley
@IMBlakeley 5 ай бұрын
The irony that the fellah that found this works for MS isn't lost on me.
@geekingjadi
@geekingjadi 5 ай бұрын
right :) the irony.
@a46475
@a46475 5 ай бұрын
I heard from a certain internet personality that there is/was supposed an unprecedented worldwide cyber attack on the financial system this year and this would serve as the pretext to roll out a very different regime. For example requiring ID to go online among other things. I wonder....
@glarynth
@glarynth 5 ай бұрын
The great thing about vague prophecy is that it can claim credit for predicting whatever random thing happens next.
@a46475
@a46475 5 ай бұрын
@@glarynth Unprecedented cyber attack on the global financial system some time in 2024 that ushers in identification requirements online among other things. Yeah I can see how that's vague and imprecise. That could mean anything. What degree of power would this entity have had, had this hack been successful? I doubt very much.
@a46475
@a46475 5 ай бұрын
@@glarynth Unprecedented cyber attack on the global financial system some time in 2024 that ushers in identification requirements online among other things. Yeah I can see how that's vague and imprecise. That could mean anything. What degree of power would this entity have had, had this hack been successful? I doubt very much.
Microservices are Technical Debt
31:59
NeetCodeIO
Рет қаралды 325 М.
Spongebob ate Michael Jackson 😱 #meme #spongebob #gmod
00:14
Mr. LoLo
Рет қаралды 9 МЛН
А ВЫ ЛЮБИТЕ ШКОЛУ?? #shorts
00:20
Паша Осадчий
Рет қаралды 9 МЛН
Linus Torvalds on why desktop Linux sucks
11:07
gentooman
Рет қаралды 1,4 МЛН
What Everyone Missed About The Linux Hack
20:24
Theo - t3․gg
Рет қаралды 286 М.
Problems You will Encounter on Linux (and How to Solve Them)
23:01
Rob Braxman Tech
Рет қаралды 94 М.
this SSH exploit is absolutely wild
11:59
Low Level
Рет қаралды 335 М.
NEVER lose dotfiles again with GNU Stow
14:33
typecraft
Рет қаралды 44 М.
Nix explained from the ground up
23:39
Surma
Рет қаралды 33 М.
Spongebob ate Michael Jackson 😱 #meme #spongebob #gmod
00:14
Mr. LoLo
Рет қаралды 9 МЛН