Same story, but this one adds some more details and other links.

  • treadful@lemmy.zip
    link
    fedilink
    English
    arrow-up
    45
    arrow-down
    1
    ·
    edit-2
    7 months ago

    TL;DR: Nothing really new here. They just summarize the social engineering of the attack.

  • Axisential@lemmy.nz
    link
    fedilink
    arrow-up
    15
    arrow-down
    1
    ·
    7 months ago

    Fascinating read - interesting that the origin of the hack is not yet known (or at least, released). I wonder what the stats are on these sorts of exploits in OSS - the concept relies so much on trust and individuals.

  • just another dev@lemmy.my-box.dev
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    2
    ·
    edit-2
    7 months ago

    World’s biggest backdoor

    Puh-lease. At least Heartbleed made it into production at enormous scale.

    I stand corrected.

    • xlash123@sh.itjust.works
      link
      fedilink
      arrow-up
      19
      ·
      edit-2
      7 months ago

      A backdoor is very distinct from a vanilla vulnerability. Heartbleed was a vulnerability, meaning the devs made a mistake in the code, introducing a method of attack. XZ was backdoored, meaning a malicious actor intentionally introduced a method by which he could exploit systems.

      Both are pretty serious vulnerabilities, but a backdoor, especially introduced so high in the supply chain, would have been devastating had it not been caught so early.

    • yoevli@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      7 months ago

      Heartbleed was the result of an accidental buffer overread bug, not a backdoor.