Miguel Bracamontes

A wwweb enthusiast

XZ-Utils backdoor

About the odd case of XZ-Utils backdoor and the creator of it

What is XZ-Utils?

XZ Utils, which used to be called LZMA Utils, is a free software toolbox for lossless data compression. It's mainly used through command-line interaction and it works on systems like Linux and also Windows starting from version 5.0. When you use XZ Utils to compress or decompress data, it uses something called the Lempel-Ziv-Markov chain algorithm, or LZMA for short. This fancy name basically means it's a smart way to crunch down data without messing it up.

Originally, XZ Utils was made as a version of another program called LZMA-SDK, which was created by a guy named Igor Pavlov. But then the XZ Utils folks tweaked it to work smoothly on Unix systems (like Linux) and to match how things usually work in those environments.

Discovery of a Backdoor

On March 29th, 2024, Andres Freund, a software engineer at Microsoft, accidentally stumbled upon a sneaky backdoor in XZ-Utils versions 5.6.0 and 5.6.1 while researching odd CPU usage by SSH processes.

The sneaky code wasn't spotted in the original code stored in the Git repository, which is like the master storage for code changes. Why? Because it was using a tool called an M4 macro, which wasn't part of the Git distribution. According to Freund, who discovered this mischief and talked about it on the OSS-Security's Openwall, this M4 macro is like the secret handshake for the backdoor to sneak into the building process. Now, here's where it gets serious: Red Hat says that this sneaky build can mess with the security of SSHD, which is a way to securely connect to computers remotely. If everything lines up just right, this meddling could let a bad actor break through SSHD's security and get into the whole system without permission.

Suspected Actor

When we're talking about an "under-the-radar" project like XZ, they are usually not backed by any big company and runs purely on volunteer power. That's the vibe of many open-source projects. The lesser-known ones, sometimes used by loads of people, are looked after by just a handful of folks who donate their time to keep things running smoothly.

This particular tool was put together by Lasse Collin from the get-go, with Jia Tan jumping in about two years back, seemingly out of the blue. Jia got the keys to the kingdom about six months later, which means this seemingly "boring" tool, used by tons of folks, was being looked after by just two people. And when Lasse needed to take a breather due to health stuff, that left Jia in charge of making changes and giving the green light to two versions that, so far, seem to be affected.

As Freund pointed out in their message on the Openwall forum, considering the activity over a few weeks, the person making the changes is either directly involved or their system got hit hard. But it seems less likely that it's just a hacked system, especially since they were talking for some time about the "fixes" needed. These fixes were basically band-aids to patch up crashes caused by XZ and the sneaky backdoor itself not interacting so well. Jia Tan teamed up with other developers to push these fixes (basically, workarounds for the backdoor glitches) into major Linux distributions, like Fedora 40 and 41. They even pitched in to write code to tackle related issues and speed up the fixes.

Now, here's where things get a bit intense. Pulling off something like this, spreading a sneaky attack through a project over two years of work and collaboration, takes serious cash. It's like, you need big bucks to make big moves. So, when you see something this slick, it's hard not to think it's being bankrolled by a government or something. It's got us wondering: could sneaking into open-source software through supply-chain attacks become the new target for certain groups? It's definitely a spooky thought.