The Worst Hack Ever Almost Just Happened

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ก.ค. 2024
  • Sponsored: Discover the new @Bitdefender Cryptomining Protection. It’s available for Bitdefender Total Security, Premium Security, and Ultimate Security protection plans at no additional cost for new and existing customers. For more information visit: www.bitdefender.com/solutions...
    ▼ Time Stamps: ▼
    0:00 - Intro
    0:26 - The Discovery
    1:08 - The Targeted Software
    1:58 - A Very Good Thing
    3:13 - How It Started
    5:57 - The Attack Finally Begins
    7:58 - The Hackers Are Forced To Hurry
    8:45 - The Full Implications
    10:29 - What Else Is Out There?
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    • My Gear & Equipment ⇨ kit.co/ThioJoe
    • Merch ⇨ teespring.com/stores/thiojoe
    • My Desktop Wallpapers ⇨ thiojoe.art/
    ⇨ / thiojoe
    ⇨ / thiojoe
    ⇨ / thiojoetv
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 653

  • @CentreMetre
    @CentreMetre หลายเดือนก่อน +1857

    Imagine how pissed off that guy who put the backdoor in is, years of work gone, all cos some guy wanted a fraction of a percentage more performance

    • @ThioJoe
      @ThioJoe  หลายเดือนก่อน +461

      He was definitely punching the air

    • @Locomaid
      @Locomaid หลายเดือนก่อน +100

      It won’t be the only one he’s working on…

    • @volvo09
      @volvo09 หลายเดือนก่อน +119

      It's scary to wonder how many hidden backdoors are out there, but remain unused.

    • @patfre
      @patfre หลายเดือนก่อน +78

      Actually it wasn’t a faction of a percent it was drastically slower than it should be. If I recall it was like .5s slower than it should be which is a lot in the computer world

    • @goiterlanternbase
      @goiterlanternbase หลายเดือนก่อน +14

      Imagine having foreseen this and loosing one of 300 similar backdoors😉

  • @gosnooky
    @gosnooky หลายเดือนก่อน +483

    Moral of the story is never come between a database engineer and performance.

    • @Stratelier
      @Stratelier หลายเดือนก่อน +48

      It is amusing that, for benchmarking purposes, the engineer who found it was sending SSH requests that shouldn't even pass a sanity check ("wrong username, etc") which explains why he got suspicious of some excess cpu cycles so quickly.

    • @Lollllllz
      @Lollllllz หลายเดือนก่อน

      If he could be working on windows' explorer/taskmanager instead 11's wouldn't be slow as it is.

    • @ivok9846
      @ivok9846 หลายเดือนก่อน +2

      @@Lollllllz usually one can keep taskman on all the time. not on win11

    • @stroodlepup
      @stroodlepup หลายเดือนก่อน

      @@Stratelier lmao

  • @blikthepro972
    @blikthepro972 หลายเดือนก่อน +924

    remember: the best backdoor is already running, is everywhere, and no one knows about it

    • @TomNook.
      @TomNook. หลายเดือนก่อน +59

      Except the NSA / MSS / FSB / Unit 8200

    • @scrapmine
      @scrapmine หลายเดือนก่อน +20

      Its called braking in irl. (This is a joke youtube, pls no ban)

    • @dokchampa9324
      @dokchampa9324 หลายเดือนก่อน +26

      Ah, fearmongering, my favorite

    • @LostShadowGD
      @LostShadowGD หลายเดือนก่อน

      The virus Microsoft puts in win 11

    • @GHaKKt
      @GHaKKt หลายเดือนก่อน +3

      Humans..

  • @ottergauze
    @ottergauze หลายเดือนก่อน +233

    The fact this was just discovered by chance really brings into question how many other packages have similar backdoors. This is the kind of stuff that should spur a major investigation.

    • @321Jarn
      @321Jarn หลายเดือนก่อน

      ​@An_EqualNot the FBI or CIA obviously, one of the founders of telegram said the FBI was trying to trick him into using open source libraries for telegram.

    • @ottergauze
      @ottergauze หลายเดือนก่อน +3

      @An_Equal Beats me, but it's probably not just gonna be one singular entity.

    • @I.____.....__...__
      @I.____.....__...__ หลายเดือนก่อน +15

      Like Andreas said himself, this was just incredibly lucky, just a massive coincidence that he happened by chance to be in the perfect position to find it (and _just barely_ in time). A confluence of events like this rarely happens, so it's possible that there is indeed a lot of stuff going undetected. 😕

    • @mega_gamer93
      @mega_gamer93 หลายเดือนก่อน +15

      There is a "major investigation". This backdoor has sparked discussion on how to prevent something similar from happening again, made some free software contributors try to audit other software and once again demonstrated the absurdity of a "software supply chain" where the companies don't pay a dime to their "suppliers" yet expect them to do the most rigorous work to avoid hurting their (the corporations) bottom line

    • @uponeric36
      @uponeric36 หลายเดือนก่อน

      @@internet8080 Ok, post proof then.

  • @DavidM2002
    @DavidM2002 หลายเดือนก่อน +216

    To quote that old adage, "You have to be good all of the time. They only have to be lucky once."

    • @dekeonus
      @dekeonus หลายเดือนก่อน +22

      I'm going to have to say: it's not an adage, it was a (very real) threat to Margaret Thatcher.
      It's still applicable in this case, just a better phrasing might have been:
      I'm reminded of the IRA's threat to Thatcher: "Today we were unlucky, but remember we only have to be lucky once - you will have to be lucky always."

    • @NinjaRunningWild
      @NinjaRunningWild หลายเดือนก่อน

      You don't have to be good all the time*

    • @Jonesy1701
      @Jonesy1701 หลายเดือนก่อน +9

      @@NinjaRunningWild No I think he was correct. We (the good guys) gotta be good all the time, they (the attackers) only gotta be lucky once.

    • @JiggyJones0
      @JiggyJones0 หลายเดือนก่อน

      ​@@NinjaRunningWildpoint:
      You

  • @D.von.N
    @D.von.N หลายเดือนก่อน +136

    I think Seytonic covered this a month ago. But it doesn't hurt to remind ourselves: 1. Social engineering is a thing, 2. Pay developers what they are worth.

    • @NigelTolley
      @NigelTolley หลายเดือนก่อน +1

      I don't think anyone ever gave the guy any money at all. Then he gave up, and the bad actor(s) took over.

    • @Fircasice
      @Fircasice หลายเดือนก่อน

      How are you going to pay software engineers working on open source software for free?

    • @D.von.N
      @D.von.N หลายเดือนก่อน +3

      @@Fircasice Many so called free software are open to donations. And people donate. Some of the money could be paid to the developers.

  • @Ascendor81
    @Ascendor81 หลายเดือนก่อน +537

    I must now change my password from "1234" to "12345" to protect myself.

    • @samuelhulme8347
      @samuelhulme8347 หลายเดือนก่อน +36

      Technically no matter how strong your password is this back door completely bypasses all passwords because it injects the hacker’s ssh keys onto the infected device.

    • @Jonesy1701
      @Jonesy1701 หลายเดือนก่อน

      @@samuelhulme8347 I remember my first joke too...

    • @NotSoMuchFrankly
      @NotSoMuchFrankly หลายเดือนก่อน +16

      How did you know what my password was?🤔🧐

    • @SereneStrategist-kk7mk
      @SereneStrategist-kk7mk หลายเดือนก่อน +18

      I don't know how you got my passwords but you don't scare me I already changed it into something more secure. With six digits it almost impossible to guess mynew one.

    • @samuelhulme8347
      @samuelhulme8347 หลายเดือนก่อน

      @@SereneStrategist-kk7mk is it “123456”?

  • @jasonlittle6542
    @jasonlittle6542 หลายเดือนก่อน +52

    This is the biggest weakness with OSS, but also the greatest strength of it. Anyone can worm their way into a seemingly innocuous part of the Linux ecosystem and taint it. But also anyone and everyone can topple years of nefarious actions through simple curiosity.

    • @squirlmy
      @squirlmy หลายเดือนก่อน +3

      the fact this got caught, while Windows CVEs get put out and many admins don't update, leaving vulnerabilities in place for years! Notpetya took advantage of an years old vulnerability in Windows, and caused over $11 billion globally

    • @TheGreatAtario
      @TheGreatAtario หลายเดือนก่อน +5

      By the same token, it's not hard for a nation-state entity to get an agent hired at a private software company

    • @marcforrester7738
      @marcforrester7738 หลายเดือนก่อน

      Yeah nothing's going to be 100% secure at all times, the payout from successful attacks is just too big. What OSS has is a living immune system, the ability to heal.

  • @MrDowntemp0
    @MrDowntemp0 หลายเดือนก่อน +89

    The whole linux sphere has been talking about this a lot, but yeah, I think you're the first tech channel with a more general focus I've seen bring it up.

    • @UmVtCg
      @UmVtCg หลายเดือนก่อน +9

      Not just the linux bubble, the whole Cyber Community.

    • @MrDowntemp0
      @MrDowntemp0 หลายเดือนก่อน +2

      @@UmVtCg I bet you're probably right, I just don't tend to haunt that corner of the net.

    • @marcellkovacs5452
      @marcellkovacs5452 หลายเดือนก่อน +3

      @@UmVtCg I wouldn't say I'm in the Linux sphere and I'm definitely not in the cyber community and I still knew about it. It was pretty much impossible not to hear about it if you're in the "IT scene" in any capacity.

    • @squirlmy
      @squirlmy หลายเดือนก่อน

      @@marcellkovacs5452 Its irritating the title is "Almost Just Happened"! no, over a month an a half ago. Clickbait.

  • @mdmackint
    @mdmackint หลายเดือนก่อน +143

    Two Thio videos in one day is a win in my books

    • @8yt3
      @8yt3 หลายเดือนก่อน +2

      правда радует

    • @kuzeyrl
      @kuzeyrl หลายเดือนก่อน +1

      yess

    • @MetsLand
      @MetsLand หลายเดือนก่อน

      Agreed

    • @balsalmalberto8086
      @balsalmalberto8086 หลายเดือนก่อน

      That's what SHE said!

    • @ToastExists
      @ToastExists หลายเดือนก่อน

      real

  • @mr.purger9185
    @mr.purger9185 หลายเดือนก่อน +254

    Bro is flexing proper subtitles 😎 my guy

  • @WindowsAurora
    @WindowsAurora หลายเดือนก่อน +68

    The xz backdoor story is crazy.

    • @andrewwatson5324
      @andrewwatson5324 หลายเดือนก่อน +6

      Not so crazy when you consider that at some point some one probably got themselves hired in order to put in the Juniper back door. This was found about 10 years ago.

  • @ronin36963
    @ronin36963 หลายเดือนก่อน +28

    Drive-By Mining. You have to give these guys credit for being innovative.

  • @theRPGmaster
    @theRPGmaster หลายเดือนก่อน +58

    As a software developer, I have no doubts that this kind of vulnerability (probably multiple) is already deployed everywhere, undetected. Never underestimate the power of social engineering, and these attacks being very easy to miss. Also I remember when ThioJoe had very few subscribers, I'm delighted to see the channel grow like this. I wonder if he remembers me 🤔

    • @NotSoMuchFrankly
      @NotSoMuchFrankly หลายเดือนก่อน +3

      Probably like Pegasus on every phone.

    • @Cutest-Bunny998
      @Cutest-Bunny998 หลายเดือนก่อน +1

      Hardware backdoors are amazing for government use but amazingly we don't hear much publicly about that obvious attack vector...

  • @_EmptyBox_
    @_EmptyBox_ หลายเดือนก่อน +6

    Nothing had made it to the news where I live regarding this. Some tech channels on YT I follow covered the bare bones when this was first discovered, yet the background you've provided has created such a broader and more chilling account of what was really happening.

  • @KaldekBoch
    @KaldekBoch หลายเดือนก่อน +24

    As someone on the defensive line working at scale (170,000 users), you do what you can with the control that you've *got* to avoid these issues, but you are mostly at the mercy of others. Where you *really* need to focus your efforts as a defender is being able to detect *when* you've been breached. Our goals are pretty clear - detect within 10 minutes, contain within 60 minutes. That's how fast you need to be, and some would argue that's not fast enough.

    • @locinolacolino1302
      @locinolacolino1302 หลายเดือนก่อน +2

      My Dad's mate was managing server infrastructure at a hosting company around 2010, and decided to deploy a crypto miner as a cheeky experiment for his team. It was a bit after a fortnight when the team found out, and they chewed him out for misusing company resources, but he immediately returned the blame to them. 'You're saying, if there was actually a piece of malicious software running on our systems, it'd take you two weeks before anyone realizes something's wrong?'

  • @sunla
    @sunla หลายเดือนก่อน +28

    We've gotten so spoiled with our technology, we need more code and more programs and more features to cover every base. Thing is, the more we have, the more hands and minds work on the code that run on our machines.
    That definitely comes with its risks.
    The truly scary thing to think about is that... logic dictates that the worst is yet to come.

    • @EmilyS-gk3st
      @EmilyS-gk3st หลายเดือนก่อน +2

      And thing is, we can live without most of it, too. Our ancestors even 200 years ago did.

  • @ChrisHeatonbigears5000
    @ChrisHeatonbigears5000 หลายเดือนก่อน +2

    I love your coverage on topics like this. I find it so interesting and you do a great job of explaining the process. Great video.

  • @Claren.c
    @Claren.c หลายเดือนก่อน +13

    Scary... I needed to check this

  • @Graham6410
    @Graham6410 หลายเดือนก่อน +19

    Wouldn't be surprised if this has happened to other bits of open source software at some point.

    • @I.____.....__...__
      @I.____.....__...__ หลายเดือนก่อน +7

      Like the xkcd comic Joe showed said, there are a LOT of bits of archaic code that underlie the world's software. We've seen cases where half the Internet broke because software relies on a single function that someone wrote for themselves 25 years and everybody copied. Software is more fragile than people would like to think.

  • @Monius13
    @Monius13 หลายเดือนก่อน

    Hey, I just want to take a second to say thank you and congrats. I found you ages ago through all the pranks. Was funny at the time, but I can see why you moved away from it. Over time, you've given us some really amazing videos that are very informative and make it easy to digest for those who are less educated on tech. Thank you for the years of entertainment and information and congrats on how far you've come. Much love, bro.

  • @brianc5788
    @brianc5788 หลายเดือนก่อน +1

    Excellent info & video. keep up the good work!!!!

  • @MichaelGrundler
    @MichaelGrundler หลายเดือนก่อน +9

    At first I thought this video is quite a bit late. I've already seen multiple videos about this backdoor right around the time it was discovered. However I'm glad I watched till the end because this video provided some additional information and context I didn't know of yet.

    • @anstropleuton
      @anstropleuton หลายเดือนก่อน +2

      I did not expect it to be a topic of XZ... thought this video was some windows thing
      Also yeah way late

  • @frankintx699
    @frankintx699 หลายเดือนก่อน +3

    Thanks, ThioJoe

  • @yesterdaysrose5446
    @yesterdaysrose5446 หลายเดือนก่อน +23

    Remember: As an open source maintainer, you should keep an eye on the stuff coming in and just not accept incoming stuff if you don't know WTF it even DOES. (That's the technical term.) But I also realise that if you have relinquished the nominal control to someone else, you're not culpable.

    • @Derpingtonshere
      @Derpingtonshere หลายเดือนก่อน +14

      I fully agree with this, but the problem was these so called contributors were intentionally bringing up so called "problems" causing the developer to burn out. Nobody remembers that these people do all this without guaranteed pay, they volunteer their time to better the open source atmosphere. It's really sad that people have to take advantage of good hearted people like this. This is why I always chip a few dollars their way whenever I can. We should try and keep these people happiness high. The actual owner was on Hiatus and gave the reigns to a person he thought he could trust, well that person was taking advantage of his burnout.

    • @dputra
      @dputra หลายเดือนก่อน +5

      My first contribution was the Harvard's cs50 class CLI tool, translating it to my language Indonesian so my high school students can use it more easily. The maintainer raised this exact issue, "how do we know he pushed something legit, not troll translations?"
      That's how I realized that while open source contribution is a cool way to collaborate, some people might have malicious intentions and maintainers should try their best to prevent it.

    • @NotAghostSpeedruns
      @NotAghostSpeedruns หลายเดือนก่อน +1

      @@dputra They could probably chuck it into deepl translate and most of it would make sense. Having a native speaker translating seems like an improvement over any automated translations though.

    • @dputra
      @dputra หลายเดือนก่อน +1

      @@NotAghostSpeedruns deepl is not even there yet at the time, only google translate which sucks at translating indonesian to english.

  • @benway23
    @benway23 หลายเดือนก่อน +1

    Thank you for your work.

  • @HKlink
    @HKlink หลายเดือนก่อน +1

    I'd heard of this, but not the full story. Essentially just heard "some guy was drag racing his computer for fun and noticed a tiny inefficiency which was a brand new back door, catastrophe prevented" and not all the cool details you gave! Thanks for this video.

  • @rodrirm
    @rodrirm หลายเดือนก่อน +2

    First time I heard about this, thank you for sharing.

  • @BombadilBeardie
    @BombadilBeardie หลายเดือนก่อน +1

    Explained very well. Heard from another youtuber but he made it all the way more complex

  • @ORANOID
    @ORANOID หลายเดือนก่อน +1

    Love the format and the story itself.

  • @delta_cosmic
    @delta_cosmic หลายเดือนก่อน +45

    2:20 norton disliked this video

    • @volvo09
      @volvo09 หลายเดือนก่อน +1

      Haha, I couldn't believe they tried that. What a scummy company.

    • @milentoshev8409
      @milentoshev8409 หลายเดือนก่อน +5

      @@volvo09 What are you referring to? What did they try?

    • @Sarah-3
      @Sarah-3 หลายเดือนก่อน

      @@milentoshev8409 Their antivirus software became the virus. Granted it was opt in but there were multiple popups urging you to opt in telling you how great crypto is. They failed to mention about the wear and tear of hardware and the performance impact on other tasks. To top it all of they would not only skip paying the electricity bill they also took a 15% cut from your earnings

    • @andreobarros
      @andreobarros หลายเดือนก่อน

      @@milentoshev8409 I dont remember all the details, but norton or one of their products had or has a crypto miner within them. They stealthily made it opt-in by default, and when found out tried some justification.

    • @AndrewYac
      @AndrewYac หลายเดือนก่อน

      @@milentoshev8409 Norton tried to install crypto miners in their software without making it clear in the install process lol

  • @5argetech56
    @5argetech56 หลายเดือนก่อน +10

    Zoinks!! Wow Scooby that was a close one.. Whew!

    • @cheesepizza98
      @cheesepizza98 หลายเดือนก่อน

      >>>>>>>>Is this>>>>>>>>>>>>>

  • @Nadia1989
    @Nadia1989 หลายเดือนก่อน +4

    The mantainer needs acknowledgement too. Having a life helped to deter the attack.

  • @likebot.
    @likebot. หลายเดือนก่อน

    Yes, I have heard of it before. I watch a few IT channels. Your unscheduled video yesterday reminded me about this backdoor in that it looks like certain actors are attempting long cons to create vulnerabilities.

  • @doge7831
    @doge7831 หลายเดือนก่อน +14

    This backdoor only affected amd64 systems (so ARM computers wouldn’t have been affected) and it would likely take some time before it got into Debian and Ubuntu LTS (used by a ton of servers), as they only receive non-security updates every ~2 years, so if it was discovered 1 month later, we would probably be fine.

    • @user-28qhfk65
      @user-28qhfk65 หลายเดือนก่อน +6

      1. If I remember correctly, there's a code that check specifically for amd64 (and x86?) architecture for it to run. (sus imo)
      2. We're very lucky that the backdoor was found before it was released into stable Ubuntu LTS 24.04 release on April 2024. That might be the attacker's main target.
      3. The fact that it was found by coincidence by microbenchmarking, ~500ms delay, is very concerning.
      4. The attacker will learn from this mistake and might pull something like this again / another party is inspired by this move will do it in the future.

    • @nicholasvinen
      @nicholasvinen หลายเดือนก่อน

      For some value of "fine". Yes it wouldn't have been a disaster but some servers would have been compromised for some time.

  • @jimmeade2976
    @jimmeade2976 หลายเดือนก่อน

    I had heard about this, in general terms. Thanks for a detailed explanation.

  • @bruce-le-smith
    @bruce-le-smith หลายเดือนก่อน

    thanks for breaking that down, very interesting

  • @disegnosys
    @disegnosys หลายเดือนก่อน +1

    Great explanation and I heard about this threat about a month ago on another channel.

  • @TravisPluss
    @TravisPluss หลายเดือนก่อน

    You are a saint for documenting what will be the history of tech.

  • @brownjames112
    @brownjames112 หลายเดือนก่อน +2

    Heard about this the other day on the 2.5 Admins Podcast and the Late Night Linux Podcast, good to hear from some other people. It's a pretty big deal.

  • @Norman_Fleming
    @Norman_Fleming หลายเดือนก่อน +1

    Was aware of this but good it is still getting coverage. Really feels like this house of cards is not gonna stay up much longer.

  • @_SJ
    @_SJ หลายเดือนก่อน +3

    Wow ThioJoe. Second video for today. I ❤ it

  • @wisteela
    @wisteela หลายเดือนก่อน +2

    When this happened it got me thinking maybe it's time for a big code audit?

  • @ca_kay
    @ca_kay หลายเดือนก่อน +1

    This guy deserves a medal.

  • @RobTheMusician1
    @RobTheMusician1 หลายเดือนก่อน +3

    Those antivirus softwares are useless. We need more performance tweakers.

  • @dualbeardedtech
    @dualbeardedtech หลายเดือนก่อน +8

    I had heard about it but, like you said, it was only from tech news outlets.
    Thank you for making a bid about this!

  • @TomNook.
    @TomNook. หลายเดือนก่อน +45

    Jia Tan is a Chinese name, Jigar Kumar is an Indian name. People who want to stay anonymous won't use their names, but also doesn't want to introduce a rival nation to investigate (so he didn't use a german name for example), so quite likely a hacker of russian origin.
    Isn't geopolitics wonderful.

    • @Reddotzebra
      @Reddotzebra หลายเดือนก่อน +4

      So the backdoor would likely quietly delete itself if it detected a Russian keyboard.
      Making it legal for your citizens to attack any system as long as it's not one your nation owns is a stroke of genius, ngl. I wonder how much money they've saved on buying day zero exploits from the usual sources?

    • @NinjaRunningWild
      @NinjaRunningWild หลายเดือนก่อน +6

      Non-sequitur. Nothing can be deduced from the name.

    • @mega_gamer93
      @mega_gamer93 หลายเดือนก่อน +12

      'Cheng" is a cantonese name while "Jia" isn't. This indicates however made the backdoor just tried to think of a name that sounds Chinese enough. Such sloppiness is typical of the US
      But trying to deduce the perpetrator from the name is stupid anyway, we could go in circles all day talking about potential 5d chess by the perpetrator

    • @MiseRaen
      @MiseRaen หลายเดือนก่อน +7

      ​@@mega_gamer93The OP just have the politics brainrot. The culprits might be multinational anyways.

    • @shanent5793
      @shanent5793 หลายเดือนก่อน +2

      "Gee-yah" isn't Chinese, it only looks that way. In Chinese it's only one syllable.

  • @Its-Just-Zip
    @Its-Just-Zip หลายเดือนก่อน

    This is an excellent demonstration of both the benefits to security that open source software has as well as the threat to it. Had this been a closed source project this back door had it been implemented would never have been caught but also it would have been much harder to implement.

    • @vlc-cosplayer
      @vlc-cosplayer หลายเดือนก่อน +1

      "it would have been much harder to implement." -- Yeah, it'd be really hard for a 3-letter agency to give that company generous funding, in exchange for a backdoor... ;3
      And in case they refuse, remind them that accidents do happen...

  • @akimezra7178
    @akimezra7178 หลายเดือนก่อน

    I remember it when it was just discovered, but i think your video lacks the explanation of just how BRILIANT this backdoor is, and the code behind it.

  • @kyouhyung
    @kyouhyung หลายเดือนก่อน

    The method and approach they took were very refined and systematical. I wouldn't be surprised if this was only one of the many similar attacks.

  • @russian_alex
    @russian_alex หลายเดือนก่อน +3

    idk what to comment (nice video thio, keep up the good job)

  • @nanopi
    @nanopi หลายเดือนก่อน

    I knew about it during the Easter weekend thanks to a general channel Discord and some Linux/programming youtubers.
    Arch really quickly updated the package and posted to their news page when discovered. Also just happened to be 1 week after I updated Arch WSL for a Samba setup involving Windows 98.
    OpenSSH does not normally use liblzma but got patched by Debian/Fedora/systemd systems to work with libsystemd which did use liblzma but then 7:58 this pull request was going to make systemd not automatically load liblzma all the time which pretty much doomed the backdoor.

  • @adriany4700
    @adriany4700 หลายเดือนก่อน

    Scary stuff

  • @TymexComputing
    @TymexComputing หลายเดือนก่อน

    7:07 - very nice idea - must try it sometimes :)

  • @AraiDigital
    @AraiDigital หลายเดือนก่อน +1

    “And I would have gotten away with it if it weren’t for that benchmarking kid!!”

  • @tstager1978
    @tstager1978 หลายเดือนก่อน

    I did hear about a problem with vulnerability with the xz software but it wasn't widely covered.

  • @zalyster
    @zalyster หลายเดือนก่อน

    Crazy story, even crazier to think about what's out there that we don't know about.

  • @Mmouse_
    @Mmouse_ หลายเดือนก่อน

    This was an amazing idea...

  • @eldibs
    @eldibs หลายเดือนก่อน +1

    This would make me paranoid about security if I wasn't already paranoid from the time I (temporarily, to test something) opened up SSH access over the internet to a Linux machine on my network and saw it immediately get hit with constant brute-force login attempts.

  • @aylivex
    @aylivex หลายเดือนก่อน +1

    I knew about the backdoor since the time it was discovered in March 2024. The backdoor was discussed, it seemed, everywhere, I also watched a few videos which explained what it was and the consequences if it weren't discovered in time.

  • @diamondblack3776
    @diamondblack3776 หลายเดือนก่อน +8

    You can do your own micro benchmarking and analysis with Process Monitor from sysinternals and run it as administrator.
    Picks up background accessing.

  • @dave_dennis
    @dave_dennis หลายเดือนก่อน

    I did hear about this through mainstream media but I don’t remember where. I do recall the detail of it being discovered at Microsoft but there was no more detail than that.

  • @TheRealTymislawMiau
    @TheRealTymislawMiau หลายเดือนก่อน +2

    I love your vids

  • @MonteVanNortwick
    @MonteVanNortwick หลายเดือนก่อน +3

    Yup. How could we know if backdoors already have been installed? Until...they are discovered. It could be a million or it could be zero.

  • @shackcf
    @shackcf หลายเดือนก่อน

    I did read about this just after it was revealed by the Microsoft employee. I think I found it in one of my Flipboard items. However I did not have all the details that you just spoke about.

  • @NinjaRunningWild
    @NinjaRunningWild หลายเดือนก่อน +2

    Low Level Learning covered this right after discovery. His video is also worth watching.

    • @nou712
      @nou712 หลายเดือนก่อน

      He also said it's the end of open source and linux.

  • @verzagen7550
    @verzagen7550 หลายเดือนก่อน +1

    So one thing to add, this was included in rolling release ditros like Arch as well, but my understanding is that, the way Arch used xz and the way Red Hat and Ubuntu used it were different enough that it wouldn't actually effect Arch systems

    • @keit99
      @keit99 หลายเดือนก่อน +2

      Arch doesn't have ssh compiled against liblzma (which debian and co had)

    • @verzagen7550
      @verzagen7550 หลายเดือนก่อน

      @@keit99 thanks for adding, couldn't remember exactly why Arch was different from the rest in this regard

    • @mega_gamer93
      @mega_gamer93 หลายเดือนก่อน

      ​@@keit99the distros did not link sshd with liblzma. The distros patched sshd on a way that linked it to libsystemd which is then linked to libzma

    • @keit99
      @keit99 หลายเดือนก่อน

      @@mega_gamer93 right that was it. IT's been a while since I read about the backdoor properly.

  • @REMY.C.
    @REMY.C. หลายเดือนก่อน +2

    I'm not a programmer and I immediately spotted the "." because I don't like when it's not tidy 😂

  • @benyomovod6904
    @benyomovod6904 หลายเดือนก่อน +1

    I bet the NSA planted the ultimate backdoor into silicon long ago. It is absolute logical

  • @tonyvn5817
    @tonyvn5817 หลายเดือนก่อน

    I hope Windows 10 never gets hit by backdoor hackers O.O
    Totally enjoy your video TJ. Peace brother.

  • @mrfoodarama
    @mrfoodarama หลายเดือนก่อน

    This is an awesome story! Important as well, not much was mentioned about it to normies. The only things I saw in the avg person scope was trying to use this as a way to badmouth open-source software and that really did not sit well with me

    • @mega_gamer93
      @mega_gamer93 หลายเดือนก่อน

      Bit defender endpoint for Linux is for file hosting servers to check if the files they are hosting are malicious, it's not for self protection

  • @Twisted_Code
    @Twisted_Code 25 วันที่ผ่านมา

    stuff like this is why I'm so serious about secure coding. Put as many self-checks in your software as possible. For example, something that might've protected against this attack: don't load libraries that don't match the checksum you expect.
    if that library that was used by SSH had been checked for integrity (which likely could have been done with libraries SSH was already using, since it's already doing some cryptography) this attack would have failed

  • @ranxlusactualmainaccount
    @ranxlusactualmainaccount หลายเดือนก่อน +2

    ThioJoe got a 2 vid in a day Streak

  • @cheeseparis1
    @cheeseparis1 หลายเดือนก่อน

    I once thought about open source risks and then forgot, since a whole community watches what changes... but if the hacker is patient (2 years!), it finally can happen... No I'm not afraid at all. _casually updates USB hub firmware, nothing bad can happen_

  • @user-hg7qw3pl7o
    @user-hg7qw3pl7o หลายเดือนก่อน

    I already knew this because i have subscribed to morning brew!

  • @Blues.Fusion
    @Blues.Fusion หลายเดือนก่อน +1

    Someone needs to write a screenplay for this and make a movie. So much drama.

    • @kubakielbasa5987
      @kubakielbasa5987 หลายเดือนก่อน

      If it doesn't happen until I'm a multibillionaire then I'll make sure to organise it and make the movie free-to-watch and free-to-pirate.

  • @itchioisshrt-jd3vl
    @itchioisshrt-jd3vl หลายเดือนก่อน

    hey thiojoe i have a question, if i delete the microsoft folder in registry editor , will it brick my pc?

  • @LeeMaiden
    @LeeMaiden หลายเดือนก่อน

    Bitdefender is good stuff, I have Win 10 on two desktops, but I'm usually on either machine using the main hard drive which one is Linux Mint's LMDE 6, and the other machine is Linux Mint's 21.3 Cinnamon. I have Bitdefender on my Mini PC that has Win 11 Pro on it, I have Bitdefender on my phone also, it's one I recommend to clients of mine also. It's a shame they don't make a version for Linux that would have caught this XZ problem. I rarely use Windows, so this one hit close to home hitting Linux with a well used tool.

  • @princess_wawa
    @princess_wawa หลายเดือนก่อน

    i remembered how much of a nerd i am when he said there wasn't much coverage about it but all my news feed was about it

  • @JB52520
    @JB52520 หลายเดือนก่อน

    It's kind of reassuring that software improvements make backdoors in other projects obsolete. If the good guys keep fighting, they can plug holes they don't even know about.

  • @DeadKoby
    @DeadKoby หลายเดือนก่อน

    Super cool... an OCD technician wants to make the performance ideal, and thus saves the day.

  • @QuotePilgrim
    @QuotePilgrim หลายเดือนก่อน

    XZ Utils is not really a behind the scenes thing for most Linux users though. Almost every Linux user will come across and extract .tar.xz files regularly, and sometimes even compress their own xz files, both of which require XZ Utils.
    In other words most Linux users are aware of xz and use it frequently.

  • @xX_ang3Lz
    @xX_ang3Lz หลายเดือนก่อน +1

    this is crazy i remember you telling me to tape batteries to my cat5 to make my internet go faster

  • @o0shad0oo
    @o0shad0oo หลายเดือนก่อน +1

    Microbenchmarking, huh? What do you think the odds are that a different state actor has been monitoring the codebase and looking for inserted backdoors. They might even have been behind the security enhancement to the other library that would've disabled the backdoor and only revealed it publicly when the backdoored library's release looked like it might be getting pushed forward.

  • @TrimutiusToo
    @TrimutiusToo หลายเดือนก่อน

    I heard about it a couple of times before... But i fall several tech specific channels that talk about stuff like this all the time

  • @wangel81
    @wangel81 หลายเดือนก่อน

    As an IT Professional for over 30+ years, the world is a SCARY place. I just wanna go live in the mountains. Tired of playing whack-a-mole all the time. No matter what we do, there's always someone or something else out there that is better.

  • @robcat2075
    @robcat2075 หลายเดือนก่อน

    I always wondered how they kept open-source software safe from back doors and other malign code. Turns out...they can't.
    How many other attacks like this have succeeded and remain undetected?

  • @soulman902
    @soulman902 หลายเดือนก่อน

    I saw this with another OSS project where Bitcoin mining was added to a library which was being used by a commercial project which was used by the company I used to work at. Our Anti-virus caught it being installed by the Dev and the company that put out the update had to release a new update.

  • @EnergizerTX
    @EnergizerTX หลายเดือนก่อน

    It was discussed by Dave's garage on April 4, and other sources as well.

  • @peter-uy2iv
    @peter-uy2iv หลายเดือนก่อน

    as a owner of few public servers, i almost shitted myself

  • @Lampe2020
    @Lampe2020 หลายเดือนก่อน +1

    Yay, another video about the xz backdoor…

  • @realMrVent
    @realMrVent หลายเดือนก่อน

    Ugh, this is just gonna be a feast for proponents of closed-source...

  • @timothyvaher2421
    @timothyvaher2421 หลายเดือนก่อน

    Theo, you do a cold impression of a North Korean Cyber 🪖 Officer.!

  • @BigWhoopZH
    @BigWhoopZH หลายเดือนก่อน +1

    Warns about one malware, advertises another.

  • @edalder2000
    @edalder2000 หลายเดือนก่อน

    Wow. Used as intended, this is scary.

  • @jaybingham3711
    @jaybingham3711 หลายเดือนก่อน

    Nothing worse than not finding the backdoor!

  • @evertonshorts9376
    @evertonshorts9376 หลายเดือนก่อน

    Reflections on trusting trust.

  • @MalwareLab150
    @MalwareLab150 หลายเดือนก่อน

    I love your video ❤❤

  • @id104335409
    @id104335409 หลายเดือนก่อน

    People all over the world: Oh no, my gaming pc is compromised! I will share this on my social media!

  • @erikhicks07
    @erikhicks07 หลายเดือนก่อน +1

    Imagine the backdoors and obfuscated malware code we _don't_ know about. Too much code to review in a time where people are barely paid to do the minimum requirements. A ticking timebomb.