Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Google Messages finally gets proper unsend functionality with ‘Delete for everyone’

9 May 2025

Microsoft Surface Laptop and Pro raise the price barrier for budget shoppers

9 May 2025

Samsung Galaxy S25 Edge to Use Corning Gorilla Glass Ceramic 2 Display Protection

9 May 2025
Facebook X (Twitter) Instagram
Just In
  • Google Messages finally gets proper unsend functionality with ‘Delete for everyone’
  • Microsoft Surface Laptop and Pro raise the price barrier for budget shoppers
  • Samsung Galaxy S25 Edge to Use Corning Gorilla Glass Ceramic 2 Display Protection
  • Watch CDs conquer car skips in this classic BBC clip
  • Oppo Reno 14, Reno 14 Pro Design Teased Again; RAM and Storage Options Revealed
  • 3 underrated Netflix shows you should watch this weekend (May 9-11)
  • Sony WH-1000XM6 headphones launch confirmed; folding metal hinge leaked with new button
  • 3 great free movies to stream this weekend (May 9-11)
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
News

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

News RoomBy News Room3 April 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Ultimately, Scott argues that those three years of code changes and polite emails were likely not spent sabotaging multiple software projects, but rather building up a history of credibility in preparation for the sabotage of XZ Utils specifically—and potentially other projects in the future. “He just never got to that step because we got lucky and found his stuff,” says Scott. “So that’s burned now, and he’s gonna have to go back to square one.”

Technical Ticks and Time Zones

Despite Jia Tan’s persona as a single individual, their years-long preparation is a hallmark of a well-organized state-sponsored hacker group, argues Raiu, the former Kaspersky lead researcher. So too are the technical hallmarks of the XZ Utils malicious code Jia Tan added. Raiu notes that, at a glance, the code does truly look like a compression tool. “It’s written in a very subversive manner,” he says. It’s also a “passive” backdoor, Raiu says, so it wouldn’t reach out to a command-and-control server that might help identify the backdoor’s operator. Instead, it waits for the operator to connect to the target machine via SSH and authenticate with a private key—one generated with a particularly strong cryptographic function known as ED448.

The backdoor’s careful design could be the work of US hackers, Raiu notes, but he suggests that’s unlikely, since the US wouldn’t typically sabotage open-source projects—and if it did, the NSA would probably use a quantum-resistant cryptographic function, which ED448 is not. That leaves non-US groups with a history of supply chain attacks, Raiu suggests, like China’s APT41, North Korea’s Lazarus Group, and Russia’s APT29.

At a glance, Jia Tan certainly looks East Asian—or is meant to. The time zone of Jia Tan’s commits are UTC+8: That’s China’s time zone, and only an hour off from North Korea’s. However, an analysis by two researchers, Rhea Karty and Simon Henniger, suggests that Jia Tan may have simply changed the time zone of their computer to UTC+8 before every commit. In fact, several commits were made with a computer set to an Eastern European time zone instead, perhaps when Jia Tan forgot to make the change.

“Another indication that they are not from China is the fact that they worked on notable Chinese holidays,” say Karty and Henniger, students at Dartmouth College and TU Munich, respectively. Boehs, the developer, adds that much of the work starts at 9 am and ends at 5 pm for Eastern European time zones. “The time range of commits suggests this was not some project that they did outside of work,” Boehs says.

All of those clues lead back to Russia, and specifically Russia’s APT29 hacking group, argues Dave Aitel, a former NSA hacker and founder of the cybersecurity firm Immunity. Aitel points out that APT29, widely believed to work for Russia’s foreign intelligence agency known as the SVR has a reputation for technical care of a kind that few other hacker groups show. APT29 also carried out the Solar Winds compromise, perhaps the most deftly coordinated and effective software supply chain attack in history. That operation matches the style of the XZ Utils backdoor far more than the cruder supply chain attacks of APT41 or Lazarus, by comparison.

“It could very well be someone else,” says Aitel. “But I mean, if you’re looking for the most sophisticated malicious operations on the planet, that’s going to be our dear friends at the SVR.”

Security researchers agree, at least, that it’s unlikely that Jia Tan is a real person, or even one person working alone. Instead, it seems clear that the persona was the online embodiment of a new tactic from a new, well-organized organization—and one that nearly worked. That means we should expect to see Jia Tan return by other names: seemingly polite and enthusiastic contributors to open source projects, hiding a government’s secret intentions in their code commits.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe Final Fantasy XIV And XVI Crossover Event Is Live And Features New Storyline, Clive’s Outfit, Torgal, And More
Next Article Check your Google Pixel Watch right now for two new features

Related Articles

News

Google Messages finally gets proper unsend functionality with ‘Delete for everyone’

9 May 2025
News

Microsoft Surface Laptop and Pro raise the price barrier for budget shoppers

9 May 2025
News

Watch CDs conquer car skips in this classic BBC clip

9 May 2025
News

3 underrated Netflix shows you should watch this weekend (May 9-11)

9 May 2025
News

Sony WH-1000XM6 headphones launch confirmed; folding metal hinge leaked with new button

9 May 2025
News

3 great free movies to stream this weekend (May 9-11)

9 May 2025
Demo
Top Articles

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202493 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202482 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202457 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

3 underrated Netflix shows you should watch this weekend (May 9-11)

News Room9 May 2025
News

Sony WH-1000XM6 headphones launch confirmed; folding metal hinge leaked with new button

News Room9 May 2025
News

3 great free movies to stream this weekend (May 9-11)

News Room9 May 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025118 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202493 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202482 Views
Our Picks

Watch CDs conquer car skips in this classic BBC clip

9 May 2025

Oppo Reno 14, Reno 14 Pro Design Teased Again; RAM and Storage Options Revealed

9 May 2025

3 underrated Netflix shows you should watch this weekend (May 9-11)

9 May 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.